instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
---|---|---|
null | Describe the vulnerability CVE-CVE-2018-10376 | CVE-CVE-2018-10376 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2020-4700. | CVE ID: CVE-2020-4700
Date Updated: 2024-09-16T18:29:13.906Z
Date Published: 2020-11-16T16:40:37.240025Z
Description:
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 could allow an authenticated user belonging to a specific user group to create a user or group with administrative privileges. IBM X-Force ID: 187077.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6367979
- https://exchange.xforce.ibmcloud.com/vulnerabilities/187077
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-2172. | CVE ID: CVE-2009-2172
Date Updated: 2024-08-07T05:44:55.024Z
Date Published: 2009-06-23T21:21:00
Description:
Cross-site scripting (XSS) vulnerability in forum/radioandtv.php in the Radio and TV Player addon for vBulletin allows remote registered users to inject arbitrary web script or HTML via the station parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/35385
- https://www.exploit-db.com/exploits/8965
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-30999. | CVE ID: CVE-2021-30999
Date Updated: 2024-08-03T22:48:14.263Z
Date Published: 2021-08-24T18:51:37
Description:
The issue was addressed with improved permissions logic. This issue is fixed in iOS 14.6 and iPadOS 14.6. A user may be unable to fully delete browsing history.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212528
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-17281. | CVE ID: CVE-2019-17281
Date Updated: 2020-05-08T15:16:43
Date Published: 2020-05-08T15:16:43
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-36749. | CVE ID: CVE-2022-36749
Date Updated: 2024-08-03T10:14:27.993Z
Date Published: 2022-08-30T21:27:46
Description:
RPi-Jukebox-RFID v2.3.0 was discovered to contain a command injection vulnerability via the component /htdocs/utils/Files.php. This vulnerability is exploited via a crafted payload injected into the file name of an uploaded file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-3199. | CVE ID: CVE-2013-3199
Date Updated: 2024-08-06T16:00:10.161Z
Date Published: 2013-08-14T10:00:00
Description:
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059
- http://www.us-cert.gov/ncas/alerts/TA13-225A
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18203
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-5750. | CVE ID: CVE-2017-5750
Date Updated: 2021-06-11T20:59:37
Date Published: 2021-06-11T20:59:37
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-3317. | CVE ID: CVE-2024-3317
Date Updated: 2024-08-01T20:05:08.372Z
Date Published: 2024-05-15T15:55:07.011Z
Description:
An improper access control was identified in the Identity Security Cloud (ISC) message server API that allowed an authenticated user to exfiltrate job processing metadata (opaque messageIDs, work queue depth and counts) for other tenants.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.sailpoint.com/security-advisories/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-24639. | CVE ID: CVE-2021-24639
Date Updated: 2024-08-03T19:35:20.417Z
Date Published: 2021-09-20T10:06:45
Description:
The OMGF WordPress plugin before 4.5.4 does not enforce path validation, authorisation and CSRF checks in the omgf_ajax_empty_dir AJAX action, which allows any authenticated users to delete arbitrary files or folders on the server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-7003. | CVE ID: CVE-2014-7003
Date Updated: 2024-08-06T12:31:47.307Z
Date Published: 2014-10-16T19:00:00
Description:
The Goodwin (aka com.goodwin.Goodwin) application 1.15 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/719337
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-4382. | CVE ID: CVE-2012-4382
Date Updated: 2024-08-06T20:35:08.977Z
Date Published: 2017-10-19T21:00:00
Description:
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not properly protect user block metadata, which allows remote administrators to read a user block reason via a reblock attempt.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41823
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-30935. | CVE ID: CVE-2023-30935
Date Updated: 2024-08-02T14:37:15.500Z
Date Published: 2023-07-12T08:31:40.534Z
Description:
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-14758. | CVE ID: CVE-2020-14758
Date Updated: 2024-09-26T20:28:36.283Z
Date Published: 2020-10-21T14:04:23
Description:
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.6 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuoct2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-4440. | CVE ID: CVE-2010-4440
Date Updated: 2024-08-07T03:43:14.752Z
Date Published: 2011-01-19T16:00:00
Description:
Unspecified vulnerability in Oracle 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/42984
- http://osvdb.org/70575
- http://www.securityfocus.com/bid/45888
- http://www.securitytracker.com/id?1024975
- http://www.vupen.com/english/advisories/2011/0151
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64802
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-2999. | CVE ID: CVE-2012-2999
Date Updated: 2024-08-06T19:50:05.454Z
Date Published: 2012-10-04T19:00:00
Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface in Cerberus FTP Server before 5.0.5.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user account or (2) reconfigure the state of the FTP service, as demonstrated by a request to usermanager/users/modify.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/989684
- http://www.cerberusftp.com/products/releasenotes.html
- http://www.securityfocus.com/bid/55788
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-37315. | CVE ID: CVE-2021-37315
Date Updated: 2024-08-04T01:16:03.922Z
Date Published: 2023-02-03T00:00:00
Description:
Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://robertchen.cc/blog/2021/03/31/asus-rce
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-38507. | CVE ID: CVE-2023-38507
Date Updated: 2024-09-25T18:05:58.465Z
Date Published: 2023-09-15T19:15:06.391Z
Description:
Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r
- https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31
- https://github.com/strapi/strapi/releases/tag/v4.12.1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-6318. | CVE ID: CVE-2017-6318
Date Updated: 2024-08-05T15:25:48.953Z
Date Published: 2017-03-20T16:00:00
Description:
saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html
- http://www.securityfocus.com/bid/97028
- https://alioth.debian.org/tracker/index.php?func=detail&aid=315576
- https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html
- http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html
- http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html
- https://usn.ubuntu.com/4470-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-0979. | CVE ID: CVE-2008-0979
Date Updated: 2024-08-07T08:01:40.200Z
Date Published: 2008-02-25T23:00:00
Description:
Stack consumption vulnerability in Double-Take 5.0.0.2865 and earlier, distributed under the HP StorageWorks Storage Mirroring name and other names, allows remote attackers to cause a denial of service (daemon crash) via a certain packet that triggers the recursive calling of a function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2008/0666
- http://aluigi.altervista.org/adv/doubletakedown-adv.txt
- http://securityreason.com/securityalert/3698
- http://www.securityfocus.com/bid/27951
- http://aluigi.org/poc/doubletakedown.zip
- http://secunia.com/advisories/29075
- http://www.securityfocus.com/archive/1/488632/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-15673. | CVE ID: CVE-2017-15673
Date Updated: 2024-08-05T19:57:27.597Z
Date Published: 2017-11-28T15:00:00
Description:
The files function in the administration section in CS-Cart 4.6.2 and earlier allows attackers to execute arbitrary PHP code via vectors involving a custom page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/145096/CSC-Cart-4.6.2-Shell-Upload.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-50243. | CVE ID: CVE-2023-50243
Date Updated: 2024-08-02T22:09:49.851Z
Date Published: 2024-07-08T15:22:24.242Z
Description:
Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `comment` request's parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-0863. | CVE ID: CVE-2009-0863
Date Updated: 2024-08-07T04:48:52.633Z
Date Published: 2009-03-10T14:00:00
Description:
SQL injection vulnerability in admin/delete_page.php in S-Cms 1.1 Stable allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/33799
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48806
- https://www.exploit-db.com/exploits/8071
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-7577. | CVE ID: CVE-2014-7577
Date Updated: 2024-08-06T12:56:11.876Z
Date Published: 2014-10-20T10:00:00
Description:
The B&H Photo Video Pro Audio (aka com.bhphoto) application 2.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/177521
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-24344. | CVE ID: CVE-2020-24344
Date Updated: 2024-08-04T15:12:08.671Z
Date Published: 2020-08-13T18:53:53
Description:
JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/jerryscript-project/jerryscript/issues/3976
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-9381. | CVE ID: CVE-2020-9381
Date Updated: 2024-08-04T10:26:16.098Z
Date Published: 2020-02-24T21:25:54
Description:
controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/totaljs/cms/commit/2a26c4c6a61d3fda4527a761716ef7e1c5f7c970
- https://github.com/saddean/research/blob/master/totaljs/Broken-acces-control.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-9542. | CVE ID: CVE-2018-9542
Date Updated: 2024-08-05T07:24:56.246Z
Date Published: 2018-11-14T18:00:00
Description:
In avrc_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-111896861
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/105849
- https://source.android.com/security/bulletin/2018-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-3513. | CVE ID: CVE-2011-3513
Date Updated: 2024-08-06T23:37:47.842Z
Date Published: 2011-10-18T22:00:00
Description:
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity, related to HTML Pages.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70791
- http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html
- http://secunia.com/advisories/46504
- http://www.securityfocus.com/bid/50217
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-4654. | CVE ID: CVE-2024-4654
Date Updated: 2024-08-01T20:47:41.435Z
Date Published: 2024-05-08T15:00:05.543Z
Description:
A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/cloudInterface.php. The manipulation of the argument INSTI_CODE leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263499.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.263499
- https://vuldb.com/?ctiid.263499
- https://vuldb.com/?submit.330631
- https://github.com/Hefei-Coffee/cve/blob/main/sql2.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-5036. | CVE ID: CVE-2019-5036
Date Updated: 2024-08-04T19:40:49.272Z
Date Published: 2019-08-20T21:08:40
Description:
An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0799
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-0304. | CVE ID: CVE-2014-0304
Date Updated: 2024-08-06T09:13:09.485Z
Date Published: 2014-03-12T01:00:00
Description:
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-012
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-9759. | CVE ID: CVE-2017-9759
Date Updated: 2024-08-05T17:18:01.912Z
Date Published: 2017-06-19T14:00:00
Description:
SQL Injection exists in admin/index.php in Zenbership 1.0.8 via the filters array parameter, exploitable by a privileged account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/99147
- https://www.vulnerability-lab.com/get_content.php?id=2073
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-0401. | CVE ID: CVE-2015-0401
Date Updated: 2024-08-06T04:10:10.893Z
Date Published: 2015-01-21T18:00:00
Description:
Unspecified vulnerability in the Oracle Directory Server Enterprise Edition component in Oracle Fusion Middleware 7.0 and 11.1.1.7 allows remote authenticated users to affect integrity via unknown vectors related to Admin Console.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/72212
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-25097. | CVE ID: CVE-2018-25097
Date Updated: 2024-09-06T17:53:31.410Z
Date Published: 2024-01-02T15:31:03.846Z
Description:
A vulnerability, which was classified as problematic, was found in Acumos Design Studio up to 2.0.7. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The name of the patch is 0df8a5e8722188744973168648e4c74c69ce67fd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249420.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.249420
- https://vuldb.com/?ctiid.249420
- https://github.com/acumos/design-studio/commit/0df8a5e8722188744973168648e4c74c69ce67fd
- https://github.com/acumos/design-studio/releases/tag/2.0.8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-44563. | CVE ID: CVE-2022-44563
Date Updated: 2024-08-03T13:54:03.894Z
Date Published: 2022-11-09T00:00:00
Description:
There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://consumer.huawei.com/en/support/bulletin/2022/11/
- https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-2106. | CVE ID: CVE-2010-2106
Date Updated: 2024-08-07T02:25:06.666Z
Date Published: 2010-05-28T18:00:00
Description:
Unspecified vulnerability in Google Chrome before 5.0.375.55 might allow remote attackers to spoof the URL bar via vectors involving unload event handlers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html
- http://code.google.com/p/chromium/issues/detail?id=16535
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11644
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-36350. | CVE ID: CVE-2021-36350
Date Updated: 2024-09-17T02:27:29.534Z
Date Published: 2021-12-21T17:05:30.703143Z
Description:
Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain an authentication bypass by primary weakness in one of the authentication factors. A remote unauthenticated attacker may potentially exploit this vulnerability and bypass one of the factors of authentication.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/000194157
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-2675. | CVE ID: CVE-2018-2675
Date Updated: 2024-10-03T20:34:03.151Z
Date Published: 2018-01-18T02:00:00
Description:
Vulnerability in the Java Advanced Management Console component of Oracle Java SE (subcomponent: Server). The supported version that is affected is Java Advanced Management Console: 2.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java Advanced Management Console. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java Advanced Management Console accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- http://www.securityfocus.com/bid/102670
- http://www.securitytracker.com/id/1040203
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-25390. | CVE ID: CVE-2022-25390
Date Updated: 2024-08-03T04:36:06.971Z
Date Published: 2022-03-18T21:31:17
Description:
DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.adminxe.com/3276.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-2801. | CVE ID: CVE-2017-2801
Date Updated: 2024-08-05T14:02:07.813Z
Date Published: 2017-05-24T14:00:00
Description:
A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/98106
- http://www.debian.org/security/2017/dsa-3939
- http://talosintelligence.com/vulnerability_reports/TALOS-2017-0294
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-43728. | CVE ID: CVE-2021-43728
Date Updated: 2024-08-04T04:03:08.689Z
Date Published: 2022-05-20T14:51:49
Description:
Pix-Link MiNi Router 28K.MiniRouter.20190211 was discovered to contain a stored cross-site scripting (XSS) vulnerability due to an unsanitized SSID parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.pix-link.com/page50?product_id=144
- https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-21337. | CVE ID: CVE-2024-21337
Date Updated: 2024-08-01T22:20:40.462Z
Date Published: 2024-01-11T21:27:10.409Z
Description:
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21337
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-2276. | CVE ID: CVE-2013-2276
Date Updated: 2024-09-17T03:37:28.215Z
Date Published: 2013-02-27T16:00:00Z
Description:
The avcodec_decode_audio4 function in utils.c in libavcodec in FFmpeg before 1.1.3 does not verify the decoding state before proceeding with certain skip operations, which allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted audio data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8a6449167a6da8cb747cfe3502ae86ffaac2ed48
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-6187. | CVE ID: CVE-2014-6187
Date Updated: 2024-08-06T12:10:12.606Z
Date Published: 2014-12-24T11:00:00
Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in IBM WebSphere Service Registry and Repository (WSRR) 6.3.x before 6.3.0.5, 7.0.x before 7.0.0.5, 7.5.x before 7.5.0.3, and 8.0.x before 8.0.0.2 allow remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98553
- http://www.ibm.com/support/docview.wss?uid=swg21693384
- http://www.securityfocus.com/bid/71906
- http://www.ibm.com/support/docview.wss?uid=swg21693379
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV26727
- http://www.ibm.com/support/docview.wss?uid=swg21693381
- http://www.ibm.com/support/docview.wss?uid=swg21693387
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-2541. | CVE ID: CVE-2016-2541
Date Updated: 2024-08-05T23:32:20.762Z
Date Published: 2018-02-07T17:00:00
Description:
Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP2 file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://wiki.audacityteam.org/wiki/Release_Notes_2.1.2
- https://fortiguard.com/zeroday/FG-VD-15-118
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-5056. | CVE ID: CVE-2011-5056
Date Updated: 2024-08-07T00:23:39.905Z
Date Published: 2012-01-08T00:00:00
Description:
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72258
- http://samiam.org/blog/20111229.html
- http://www.securitytracker.com/id?1026820
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-8084. | CVE ID: CVE-2019-8084
Date Updated: 2024-08-04T21:10:32.624Z
Date Published: 2019-10-25T14:57:36
Description:
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb19-48.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-33691. | CVE ID: CVE-2021-33691
Date Updated: 2024-08-03T23:58:22.507Z
Date Published: 2021-09-15T18:01:48
Description:
NWDI Notification Service versions - 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.SAP NetWeaver Development Infrastructure Notification Service allows a threat actor to send crafted scripts to a victim. If the victim has an active session when the crafted script gets executed, the threat actor could compromise information in victims session, and gain access to some sensitive information also.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806
- https://launchpad.support.sap.com/#/notes/3073450
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-27139. | CVE ID: CVE-2021-27139
Date Updated: 2024-08-03T20:40:47.465Z
Date Published: 2021-02-10T18:41:19
Description:
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#httpd-infoleak
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-20726. | CVE ID: CVE-2020-20726
Date Updated: 2024-08-04T14:22:25.167Z
Date Published: 2023-06-20T00:00:00
Description:
Cross Site Request Forgery vulnerability in Gila GilaCMS v.1.11.4 allows a remote attacker to execute arbitrary code via the cm/update_rows/user parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/GilaCMS/gila/issues/51
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-1272. | CVE ID: CVE-2020-1272
Date Updated: 2024-08-04T06:31:59.962Z
Date Published: 2020-06-09T19:43:47
Description:
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1277, CVE-2020-1302, CVE-2020-1312.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1272
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-7672. | CVE ID: CVE-2017-7672
Date Updated: 2024-09-17T01:41:33.467Z
Date Published: 2017-07-13T15:00:00Z
Description:
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
- http://www.securityfocus.com/bid/99563
- http://struts.apache.org/docs/s2-047.html
- https://security.netapp.com/advisory/ntap-20180706-0002/
- http://www.securitytracker.com/id/1039114
- https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-1807. | CVE ID: CVE-2022-1807
Date Updated: 2024-08-03T00:16:59.853Z
Date Published: 2022-09-07T18:00:14
Description:
Multiple SQLi vulnerabilities in Webadmin allow for privilege escalation from admin to super-admin in Sophos Firewall older than version 18.5 MR4 and version 19.0 MR1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-18-5-4
- https://www.sophos.com/en-us/security-advisories/sophos-sa-20220907-sfos-19-0-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-14666. | CVE ID: CVE-2018-14666
Date Updated: 2024-08-05T09:38:13.123Z
Date Published: 2019-01-22T15:00:00
Description:
An improper authorization flaw was found in the Smart Class feature of Foreman. An attacker can use it to change configuration of any host registered in Red Hat Satellite, independent of the organization the host belongs to. This flaw affects all Red Hat Satellite 6 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/106490
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14666
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-5006. | CVE ID: CVE-2010-5006
Date Updated: 2024-08-07T04:09:38.212Z
Date Published: 2011-11-02T21:00:00
Description:
SQL injection vulnerability in googlemap/index.php in EMO Realty Manager allows remote attackers to execute arbitrary SQL commands via the cat1 parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/40625
- http://packetstormsecurity.org/1006-exploits/emorealtymanager-sql.txt
- http://www.vupen.com/english/advisories/2010/1404
- http://securityreason.com/securityalert/8505
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-1048. | CVE ID: CVE-2021-1048
Date Updated: 2024-08-03T15:55:18.641Z
Date Published: 2021-12-15T18:05:35
Description:
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2021-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-15049. | CVE ID: CVE-2017-15049
Date Updated: 2024-08-05T19:42:22.357Z
Date Published: 2017-12-19T15:00:00
Description:
The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html
- https://www.exploit-db.com/exploits/43354/
- https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt
- http://seclists.org/fulldisclosure/2017/Dec/47
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-26414. | CVE ID: CVE-2023-26414
Date Updated: 2024-08-02T11:46:24.705Z
Date Published: 2023-04-13T00:00:00
Description:
Adobe Substance 3D Designer version 12.4.0 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/substance3d_designer/apsb23-28.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-2320. | CVE ID: CVE-2018-2320
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-4234. | CVE ID: CVE-2018-4234
Date Updated: 2024-08-05T05:11:21.340Z
Date Published: 2018-06-08T18:00:00
Description:
An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "IOHIDFamily" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1041027
- https://support.apple.com/HT208849
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-2297. | CVE ID: CVE-2020-2297
Date Updated: 2024-08-04T07:01:41.292Z
Date Published: 2020-10-08T12:40:29
Description:
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2054
- http://www.openwall.com/lists/oss-security/2020/10/08/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-0933. | CVE ID: CVE-2012-0933
Date Updated: 2024-08-06T18:38:15.094Z
Date Published: 2012-01-29T02:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Acidcat CMS 3.5.1, 3.5.2, 3.5.6, and possibly earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) admin_colors.asp, (2) admin_config.asp, and (3) admin_cat_add.asp in admin/.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/47705
- http://osvdb.org/78458
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72624
- http://packetstormsecurity.org/files/108869/acidcat-xss.txt
- http://www.securityfocus.com/bid/51608
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-6474. | CVE ID: CVE-2008-6474
Date Updated: 2024-08-07T11:34:45.925Z
Date Published: 2009-03-16T16:00:00
Description:
The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code injection.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/51116
- http://www.securityfocus.com/bid/28639
- http://www.securityfocus.com/archive/1/490496/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49308
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-9219. | CVE ID: CVE-2017-9219
Date Updated: 2024-08-05T17:02:43.425Z
Date Published: 2017-06-27T12:00:00
Description:
The mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted mp4 file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/fulldisclosure/2017/Jun/32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-3750. | CVE ID: CVE-2018-3750
Date Updated: 2024-09-17T02:05:32.183Z
Date Published: 2018-07-03T21:00:00Z
Description:
The utilities function in all versions <= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/reports/311333
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-36263. | CVE ID: CVE-2020-36263
Date Updated: 2022-08-22T15:02:37
Date Published: 2022-08-22T15:02:37
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-4202. | CVE ID: CVE-2021-4202
Date Updated: 2024-08-03T17:16:04.245Z
Date Published: 2022-03-25T18:02:45
Description:
A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2036682
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
- https://security.netapp.com/advisory/ntap-20220513-0002/
- http://www.openwall.com/lists/oss-security/2022/06/01/2
- http://www.openwall.com/lists/oss-security/2022/06/04/2
- http://www.openwall.com/lists/oss-security/2022/06/07/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-5535. | CVE ID: CVE-2019-5535
Date Updated: 2024-08-04T20:01:51.615Z
Date Published: 2019-10-10T16:29:16
Description:
VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vmware.com/security/advisories/VMSA-2019-0014.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-1003028. | CVE ID: CVE-2019-1003028
Date Updated: 2024-08-05T03:00:19.318Z
Date Published: 2019-02-20T21:00:00
Description:
A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1033
- http://www.securityfocus.com/bid/107295
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-9248. | CVE ID: CVE-2020-9248
Date Updated: 2024-08-04T10:19:20.113Z
Date Published: 2020-07-31T12:24:25
Description:
Huawei FusionComput 8.0.0 have an improper authorization vulnerability. A module does not verify some input correctly and authorizes files with incorrect access. Attackers can exploit this vulnerability to launch privilege escalation attack. This can compromise normal service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-01-fc-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-6890. | CVE ID: CVE-2014-6890
Date Updated: 2024-08-06T12:31:47.174Z
Date Published: 2014-10-02T10:00:00
Description:
The CouponCabin - Coupons & Deals (aka com.couponcabin) application 3.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/367777
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-27495. | CVE ID: CVE-2022-27495
Date Updated: 2024-09-16T16:38:41.397Z
Date Published: 2022-05-05T16:10:52.847186Z
Description:
On all versions 1.3.x (fixed in 1.4.0) NGINX Service Mesh control plane endpoints are exposed to the cluster overlay network. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K94093538
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the vulnerability CVE-CVE-2019-3704 | CVE-CVE-2019-3704 is a vulnerability in VNX Control Station in Dell EMC VNX2 OE for File. It is related to the MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2023-2515. | CVE ID: CVE-2023-2515
Date Updated: 2024-08-02T06:26:09.153Z
Date Published: 2023-05-12T08:53:44.111Z
Description:
Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mattermost.com/security-updates
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-18425. | CVE ID: CVE-2017-18425
Date Updated: 2024-08-05T21:20:50.981Z
Date Published: 2019-08-02T15:43:39
Description:
In cPanel before 66.0.2, the cpdavd_error_log file can be created with weak permissions (SEC-280).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://documentation.cpanel.net/display/CL/66+Change+Log
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-7222. | CVE ID: CVE-2008-7222
Date Updated: 2024-08-07T11:56:14.499Z
Date Published: 2009-09-14T14:00:00
Description:
Cross-site scripting (XSS) vulnerability in system/admin.php in RunCMS 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the rank_title parameter in a RankForumAdd action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/488287/100/200/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40630
- http://www.securityfocus.com/bid/27852
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-20916. | CVE ID: CVE-2024-20916
Date Updated: 2024-08-01T22:06:37.345Z
Date Published: 2024-01-16T21:41:14.656Z
Description:
Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). The supported version that is affected is 13.5.0.0. Easily exploitable vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Enterprise Manager Base Platform executes to compromise Oracle Enterprise Manager Base Platform. While the vulnerability is in Oracle Enterprise Manager Base Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Manager Base Platform accessible data as well as unauthorized access to critical data or complete access to all Oracle Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Enterprise Manager Base Platform. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujan2024.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-21162. | CVE ID: CVE-2024-21162
Date Updated: 2024-08-01T22:13:42.699Z
Date Published: 2024-07-16T22:40:03.984Z
Description:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2024.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-4492. | CVE ID: CVE-2016-4492
Date Updated: 2024-08-06T00:32:25.859Z
Date Published: 2017-02-24T20:00:00
Description:
Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
- http://www.openwall.com/lists/oss-security/2016/05/05/5
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
- http://www.securityfocus.com/bid/90014
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide information about the following MITRE ATT&CK technique: | T1552.007 : Container API | Name: Container API
ID: T1552.007
URL: https://attack.mitre.org/techniques/T1552/007
Platforms: Containers
Kill Chain Phases: Credential Access
Description: Adversaries may gather credentials via APIs within a containers environment. APIs in these environments, such as the Docker API and Kubernetes APIs, allow a user to remotely manage their container resources and cluster components.(Citation: Docker API)(Citation: Kubernetes API)
An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment.(Citation: Unit 42 Unsecured Docker Daemons) An adversary with sufficient permissions, such as via a pod's service account, may also use the Kubernetes API to retrieve credentials from the Kubernetes API server. These credentials may include those needed for Docker API authentication or secrets from Kubernetes cluster components.
Data Sources: User Account: User Account Authentication, Command: Command Execution
Detection: Establish centralized logging for the activity of container and Kubernetes cluster components. Monitor logs for actions that could be taken to gather credentials to container and cloud infrastructure, including the use of discovery API calls by new or unexpected users and APIs that access Docker logs.
It may be possible to detect adversary use of credentials they have obtained such as in [Valid Accounts](T1078). |
Provide detailed information about CVE-2023-32130. | CVE ID: CVE-2023-32130
Date Updated: 2024-09-25T16:15:15.268Z
Date Published: 2023-08-18T15:05:49.069Z
Description:
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.6 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-scripting-xss?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-40089. | CVE ID: CVE-2021-40089
Date Updated: 2024-08-04T02:27:31.590Z
Date Published: 2021-08-25T01:24:31
Description:
An issue was discovered in PrimeKey EJBCA before 7.6.0. The General Purpose Custom Publisher, which is normally run to invoke a local script upon a publishing operation, was still able to run if the System Configuration setting Enable External Script Access was disabled. With this setting disabled it's not possible to create new such publishers, but existing publishers would continue to run.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.primekey.com/news/posts/54
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-9229. | CVE ID: CVE-2016-9229
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-4571. | CVE ID: CVE-2024-4571
Date Updated: 2024-05-09T17:58:55.419Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-18931. | CVE ID: CVE-2018-18931
Date Updated: 2024-08-05T11:23:08.578Z
Date Published: 2019-10-29T19:36:40
Description:
An issue was discovered in the Tightrope Media Carousel digital signage product 7.0.4.104. Due to insecure default permissions on the C:\TRMS\Services directory, an attacker who has gained access to the system can elevate their privileges from a restricted account to full SYSTEM by replacing the Carousel.Service.exe file with a custom malicious executable. This service is independent of the associated IIS web site, which means that this service can be manipulated by an attacker without losing access to vulnerabilities in the web interface (which would potentially be used in conjunction with this attack, to control the service). Once the attacker has replaced Carousel.Service.exe, the server can be restarted using the command "shutdown -r -t 0" from a web shell, causing the system to reboot and launching the malicious Carousel.Service.exe as SYSTEM on startup. If this malicious Carousel.Service.exe is configured to launch a reverse shell back to the attacker, then upon reboot the attacker will have a fully privileged remote command-line environment to manipulate the system further.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.drewgreen.net/vulnerabilities-in-tightrope-media-systems-carousel/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-47742. | CVE ID: CVE-2023-47742
Date Updated: 2024-09-20T19:04:34.016Z
Date Published: 2024-03-03T12:18:58.199Z
Description:
IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could disclose sensitive information using man in the middle techniques due to not correctly enforcing all aspects of certificate validation in some circumstances. IBM X-Force ID: 272533.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7129328
- https://exchange.xforce.ibmcloud.com/vulnerabilities/272533
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-39459. | CVE ID: CVE-2023-39459
Date Updated: 2024-08-02T18:10:20.767Z
Date Published: 2024-05-03T01:59:23.567Z
Description:
Triangle MicroWorks SCADA Data Gateway Directory Traversal Arbitrary File Creation Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of workspace files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create files in the context of Administrator. Was ZDI-CAN-20531.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1027/
- https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-3840. | CVE ID: CVE-2020-3840
Date Updated: 2024-08-04T07:44:51.195Z
Date Published: 2020-02-27T20:45:04
Description:
An off by one issue existed in the handling of racoon configuration files. This issue was addressed through improved bounds checking. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1. Loading a maliciously crafted racoon configuration file may lead to arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT210919
- https://support.apple.com/HT210918
- https://support.apple.com/HT210920
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-34986. | CVE ID: CVE-2021-34986
Date Updated: 2024-08-04T00:26:55.736Z
Date Published: 2022-07-15T19:05:14
Description:
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.parallels.com/en/125013
- https://www.zerodayinitiative.com/advisories/ZDI-22-385/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-1212. | CVE ID: CVE-2012-1212
Date Updated: 2024-08-06T18:53:36.423Z
Date Published: 2012-02-20T19:00:00
Description:
Cross-site scripting (XSS) vulnerability in the smwfOnSfSetTargetName function in extensions/SMWHalo/includes/SMW_Initialize.php in Semantic Enterprise Wiki (SMW+) 1.5.6, 1.6.0_2 and earlier allows remote attackers to inject arbitrary web script or HTML via the target parameter to index.php/Special:FormEdit. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/47968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73167
- http://www.securityfocus.com/bid/51980
- http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html
- http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-2210. | CVE ID: CVE-2015-2210
Date Updated: 2024-08-06T05:10:15.862Z
Date Published: 2017-09-06T21:00:00
Description:
The help window in Epicor CRS Retail Store before 3.2.03.01.008 allows local users to execute arbitrary code by injecting Javascript into the window source to create a button that spawns a command shell.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/131732/Epicor-Retail-Store-Help-System-3.2.03.01.008-Code-Execution.html
- http://www.securityfocus.com/archive/1/535423/100/1000/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-6456. | CVE ID: CVE-2014-6456
Date Updated: 2024-08-06T12:17:24.162Z
Date Published: 2014-10-15T15:15:00
Description:
Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://rhn.redhat.com/errata/RHSA-2014-1880.html
- http://rhn.redhat.com/errata/RHSA-2014-1657.html
- http://secunia.com/advisories/61609
- http://www-01.ibm.com/support/docview.wss?uid=swg21688283
- http://marc.info/?l=bugtraq&m=141775382904016&w=2
- http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2014-1876.html
- http://www.securityfocus.com/bid/70522
- http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
- http://rhn.redhat.com/errata/RHSA-2014-1882.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://secunia.com/advisories/61164
- http://marc.info/?l=bugtraq&m=141775382904016&w=2
- http://security.gentoo.org/glsa/glsa-201502-12.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-125037. | CVE ID: CVE-2014-125037
Date Updated: 2024-08-06T14:10:56.370Z
Date Published: 2023-01-02T17:13:57.772Z
Description:
A vulnerability, which was classified as critical, was found in License to Kill. This affects an unknown part of the file models/injury.rb. The manipulation of the argument name leads to sql injection. The patch is named cd11cf174f361c98e9b1b4c281aa7b77f46b5078. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217191.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.217191
- https://vuldb.com/?ctiid.217191
- https://github.com/elizabrock/license-to-kill/commit/cd11cf174f361c98e9b1b4c281aa7b77f46b5078
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-17215. | CVE ID: CVE-2019-17215
Date Updated: 2024-08-05T01:33:17.367Z
Date Published: 2019-10-06T15:24:12
Description:
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. There is no bruteforce protection (e.g., lockout) established. An attacker might be able to bruteforce the password to authenticate on the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.140463
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-46666. | CVE ID: CVE-2021-46666
Date Updated: 2024-08-04T05:17:41.593Z
Date Published: 2022-02-01T01:47:03
Description:
MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jira.mariadb.org/browse/MDEV-25635
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://mariadb.com/kb/en/security/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-4822. | CVE ID: CVE-2015-4822
Date Updated: 2024-08-06T06:25:21.888Z
Date Published: 2015-10-21T21:00:00
Description:
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4831.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securitytracker.com/id/1033881
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-11671. | CVE ID: CVE-2017-11671
Date Updated: 2024-08-05T18:12:40.692Z
Date Published: 2017-07-26T21:00:00
Description:
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://openwall.com/lists/oss-security/2017/07/27/2
- http://www.securityfocus.com/bid/100018
- https://access.redhat.com/errata/RHSA-2018:0849
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80180
- https://gcc.gnu.org/ml/gcc-patches/2017-03/msg01349.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-2844. | CVE ID: CVE-2011-2844
Date Updated: 2024-08-06T23:15:31.202Z
Date Published: 2011-09-17T10:00:00
Description:
Google Chrome before 14.0.835.163 does not properly process MP3 files, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14696
- http://code.google.com/p/chromium/issues/detail?id=85041
- http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69871
- http://osvdb.org/75544
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-8291. | CVE ID: CVE-2024-8291
Date Updated: 2024-09-25T17:05:48.269Z
Date Published: 2024-09-24T21:17:00.734Z
Description:
Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, Alexey Solovyev for reporting.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/concretecms/concretecms/pull/12183
- https://github.com/concretecms/concretecms/commit/dbce253166f6b10ff3e0c09e50fd395370b8b065
- https://documentation.concretecms.org/developers/introduction/version-history/8519-release-notes
- https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-4424. | CVE ID: CVE-2014-4424
Date Updated: 2024-08-06T11:12:35.537Z
Date Published: 2014-09-19T10:00:00
Description:
SQL injection vulnerability in Wiki Server in CoreCollaboration in Apple OS X Server before 2.2.3 and 3.x before 3.2.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT6448
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96048
- http://secunia.com/advisories/61305
- http://www.securityfocus.com/bid/69918
- http://support.apple.com/kb/HT6449
- https://support.apple.com/kb/HT6536
- http://www.securitytracker.com/id/1030869
- http://secunia.com/advisories/61307
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |