instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
---|---|---|
Provide detailed information about CVE-2010-2003. | CVE ID: CVE-2010-2003
Date Updated: 2024-08-07T02:17:14.178Z
Date Published: 2010-05-20T17:00:00
Description:
Cross-site scripting (XSS) vulnerability in misc/get_admin.php in Advanced Poll 2.08 allows remote attackers to inject arbitrary web script or HTML via the mysql_host parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/64524
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58503
- http://www.securityfocus.com/bid/40045
- http://www.securityfocus.com/archive/1/511210/100/0/threaded
- http://www.htbridge.ch/advisory/xss_vulnerability_in_advanced_poll.html
- http://packetstormsecurity.org/1005-exploits/advancedpoll208-xss.txt
- http://secunia.com/advisories/39768
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-11738. | CVE ID: CVE-2020-11738
Date Updated: 2024-08-04T11:41:59.578Z
Date Published: 2020-04-13T21:20:00
Description:
The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://snapcreek.com/duplicator/docs/changelog/?lite
- https://www.wordfence.com/blog/2020/02/active-attack-on-recently-patched-duplicator-plugin-vulnerability-affects-over-1-million-sites/
- https://cwe.mitre.org/data/definitions/23.html
- http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html
- http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0776. | CVE ID: CVE-2013-0776
Date Updated: 2024-08-06T14:41:47.175Z
Date Published: 2013-02-19T23:00:00
Description:
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.debian.org/security/2013/dsa-2699
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
- http://www.ubuntu.com/usn/USN-1748-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=796475
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16666
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-2798. | CVE ID: CVE-2012-2798
Date Updated: 2024-08-06T19:42:32.600Z
Date Published: 2012-09-10T22:00:00
Description:
Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2012/09/02/4
- http://libav.org/releases/libav-0.8.5.changelog
- http://libav.org/releases/libav-0.8.4.changelog
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f
- http://www.securityfocus.com/bid/55355
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:079
- http://www.openwall.com/lists/oss-security/2012/08/31/3
- http://ffmpeg.org/security.html
- http://libav.org/releases/libav-0.7.7.changelog
- http://www.ubuntu.com/usn/USN-1705-1
- http://secunia.com/advisories/50468
- http://secunia.com/advisories/51257
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-4929. | CVE ID: CVE-2013-4929
Date Updated: 2024-08-06T16:59:41.001Z
Date Published: 2013-07-29T19:00:00
Description:
The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/54371
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html
- http://secunia.com/advisories/54425
- http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50450
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450&r2=50449&pathrev=50450
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html
- http://secunia.com/advisories/54296
- https://www.wireshark.org/security/wnpa-sec-2013-47.html
- http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-8461. | CVE ID: CVE-2017-8461
Date Updated: 2024-08-05T16:34:23.323Z
Date Published: 2017-06-15T20:00:00
Description:
Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an attacker to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.microsoft.com/en-us/help/4024323/security-update-of-windows-xp-and-windows-server-2003
- http://www.securityfocus.com/bid/99012
- http://www.securitytracker.com/id/1038701
- http://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-4781. | CVE ID: CVE-2018-4781
Date Updated: 2023-09-14T18:43:28.875Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the vulnerability CVE-CVE-2020-1025 | CVE-CVE-2020-1025 is a vulnerability in Skype for Business Server 2019 CU2. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2023-3443. | CVE ID: CVE-2023-3443
Date Updated: 2024-10-03T06:23:11.916Z
Date Published: 2023-12-01T07:02:33.126Z
Description:
An issue has been discovered in GitLab affecting all versions starting from 12.1 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a Guest user to add an emoji on confidential work items.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/gitlab/-/issues/416497
- https://hackerone.com/reports/2036500
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-1024. | CVE ID: CVE-2022-1024
Date Updated: 2022-08-29T14:03:07
Date Published: 2022-08-29T14:03:07
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-24992. | CVE ID: CVE-2021-24992
Date Updated: 2024-08-03T19:49:14.555Z
Date Published: 2021-12-27T10:33:25
Description:
The Smart Floating / Sticky Buttons WordPress plugin before 2.5.5 does not sanitise and escape some parameter before outputting them in attributes and page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/db0b9480-2ff4-423c-a745-68e983ffa12b
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-49908. | CVE ID: CVE-2023-49908
Date Updated: 2024-08-02T22:09:48.855Z
Date Published: 2024-04-09T14:12:46.306Z
Description:
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-4204. | CVE ID: CVE-2009-4204
Date Updated: 2024-08-07T06:54:09.939Z
Date Published: 2009-12-04T19:00:00
Description:
SQL injection vulnerability in read.php in Flashlight Free Edition allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50906
- http://www.exploit-db.com/exploits/8856
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-39034. | CVE ID: CVE-2022-39034
Date Updated: 2024-09-16T22:40:32.447Z
Date Published: 2022-09-28T03:25:39.361561Z
Description:
Smart eVision has a path traversal vulnerability in the Report API function due to insufficient filtering for special characters in URLs. A remote attacker with general user privilege can exploit this vulnerability to bypass authentication, access restricted paths and download system files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-6571-fc930-1.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-35374. | CVE ID: CVE-2022-35374
Date Updated: 2022-07-11T19:39:33
Date Published: 2022-07-11T19:39:33
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-52496. | CVE ID: CVE-2023-52496
Date Updated: 2024-03-08T10:27:07.841Z
Date Published: 2024-02-29T15:52:12.857Z
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-0682. | CVE ID: CVE-2020-0682
Date Updated: 2024-08-04T06:11:04.599Z
Date Published: 2020-02-11T21:22:57
Description:
An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0679, CVE-2020-0680.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0682
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-2583. | CVE ID: CVE-2014-2583
Date Updated: 2024-08-06T10:21:35.162Z
Date Published: 2014-04-10T14:00:00
Description:
Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2014/03/24/5
- http://www.securityfocus.com/bid/66493
- https://security.gentoo.org/glsa/201605-05
- http://secunia.com/advisories/57317
- http://www.ubuntu.com/usn/USN-2935-2
- http://www.openwall.com/lists/oss-security/2014/03/31/6
- http://www.ubuntu.com/usn/USN-2935-3
- http://www.ubuntu.com/usn/USN-2935-1
- https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8
- http://www.openwall.com/lists/oss-security/2014/03/26/10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-45482. | CVE ID: CVE-2022-45482
Date Updated: 2024-08-03T14:17:03.568Z
Date Published: 2022-12-02T00:00:00
Description:
Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated users to easily and quickly brute force the PIN and execute arbitrary commands. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-0128. | CVE ID: CVE-2022-0128
Date Updated: 2024-08-02T23:18:41.963Z
Date Published: 2022-01-06T16:45:14
Description:
vim is vulnerable to Out-of-bounds Read
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://support.apple.com/kb/HT213183
- http://seclists.org/fulldisclosure/2022/Mar/29
- https://support.apple.com/kb/HT213256
- http://seclists.org/fulldisclosure/2022/May/35
- https://support.apple.com/kb/HT213343
- http://seclists.org/fulldisclosure/2022/Jul/14
- https://security.gentoo.org/glsa/202208-32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-7811. | CVE ID: CVE-2018-7811
Date Updated: 2024-08-05T06:37:59.588Z
Date Published: 2018-11-30T19:00:00
Description:
An Unverified Password Change vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 which could allow an unauthenticated remote user to access the change password function of the web server
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2018-38
- https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/
- https://security.cse.iitk.ac.in/responsible-disclosure
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-3896. | CVE ID: CVE-2022-3896
Date Updated: 2024-08-03T01:20:59.217Z
Date Published: 2022-11-29T20:41:47.681Z
Description:
The WP Affiliate Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER["REQUEST_URI"] in versions up to, and including, 6.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is unlikely to work in modern browsers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3896
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the MITRE ATT&CK technique T1499.004 | The MITRE ATT&CK technique T1499.004: Application or System Exploitation is related to the vulnerability CVE-CVE-2019-0576. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact. |
Provide detailed information about CVE-2022-47422. | CVE ID: CVE-2022-47422
Date Updated: 2024-08-03T14:55:07.811Z
Date Published: 2023-03-14T08:47:07.947Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in HM Plugin Accept Stripe Donation – AidWP plugin <= 3.1.5 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wp-stripe-donation/wordpress-wordpress-stripe-donation-plugin-3-1-5-cross-site-request-forgery-csrf?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-0662. | CVE ID: CVE-2019-0662
Date Updated: 2024-08-04T17:51:26.930Z
Date Published: 2019-03-06T00:00:00
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0618.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0662
- http://www.securityfocus.com/bid/106888
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-9833. | CVE ID: CVE-2020-9833
Date Updated: 2024-08-04T10:43:05.270Z
Date Published: 2020-06-09T16:15:33
Description:
A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.5. A local user may be able to read kernel memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT211170
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-10938. | CVE ID: CVE-2016-10938
Date Updated: 2024-08-06T03:38:56.684Z
Date Published: 2019-09-13T11:46:28
Description:
The copy-me plugin 1.0.0 for WordPress has CSRF for copying non-public posts to a public location.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpvulndb.com/vulnerabilities/8706
- https://wordpress.org/plugins/copy-me/#developers
- https://advisories.dxw.com/advisories/copy-me-vulnerable-to-csrf-allowing-unauthenticated-attacker-to-copy-posts/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-5167. | CVE ID: CVE-2013-5167
Date Updated: 2024-09-17T00:22:03.164Z
Date Published: 2013-10-24T01:00:00Z
Description:
CFNetwork in Apple Mac OS X before 10.9 does not properly support Safari's deletion of session cookies in response to a reset operation, which makes it easier for remote web servers to track users via Set-Cookie HTTP headers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-31056. | CVE ID: CVE-2022-31056
Date Updated: 2024-08-03T07:03:40.258Z
Date Published: 2022-06-28T00:00:00
Description:
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg
- http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-12500. | CVE ID: CVE-2017-12500
Date Updated: 2024-09-17T02:46:27.805Z
Date Published: 2018-02-15T22:00:00Z
Description:
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1039152
- https://www.exploit-db.com/exploits/44648/
- http://www.securityfocus.com/bid/100367
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-1609. | CVE ID: CVE-2012-1609
Date Updated: 2021-07-09T12:05:27
Date Published: 2021-07-09T12:05:27
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-2074. | CVE ID: CVE-2021-2074
Date Updated: 2024-09-26T18:20:58.660Z
Date Published: 2021-01-20T14:50:08
Description:
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://security.gentoo.org/glsa/202101-15
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-35955. | CVE ID: CVE-2021-35955
Date Updated: 2024-08-04T00:47:42.583Z
Date Published: 2021-08-12T14:33:44
Description:
Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html
- https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-21992. | CVE ID: CVE-2020-21992
Date Updated: 2024-08-04T14:30:33.668Z
Date Published: 2021-04-29T14:04:03
Description:
Inim Electronics SmartLiving SmartLAN/G/SI <=6.x suffers from an authenticated remote command injection vulnerability. The issue exist due to the 'par' POST parameter not being sanitized when called with the 'testemail' module through web.cgi binary. The vulnerable CGI binary (ELF 32-bit LSB executable, ARM) is calling the 'sh' executable via the system() function to issue a command using the mailx service and its vulnerable string format parameter allowing for OS command injection with root privileges. An attacker can remotely execute system commands as the root user using default credentials and bypass access controls in place.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-7762. | CVE ID: CVE-2016-7762
Date Updated: 2024-08-06T02:04:56.070Z
Date Published: 2017-02-20T08:35:00
Description:
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "WebKit" component, which allows XSS attacks against Safari.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT207422
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-35450. | CVE ID: CVE-2021-35450
Date Updated: 2024-08-04T00:40:45.895Z
Date Published: 2021-08-02T19:03:30
Description:
A Server Side Template Injection in the Entando Admin Console 6.3.9 and before allows a user with privileges to execute FreeMarker template with command execution via freemarker.template.utility.Execute
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/entando/entando-admin-console
- https://www.swascan.com/entando/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-20822. | CVE ID: CVE-2022-20822
Date Updated: 2024-09-17T02:37:36.096Z
Date Published: 2022-10-26T14:00:26.541523Z
Description:
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM
- https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-35209. | CVE ID: CVE-2021-35209
Date Updated: 2024-08-04T00:33:51.186Z
Date Published: 2021-07-02T18:54:43
Description:
An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.x before 9.0.0 Patch 16. The value of the X-Host header overwrites the value of the Host header in proxied requests. The value of X-Host header is not checked against the whitelist of hosts Zimbra is allowed to proxy to (the zimbraProxyAllowedDomains setting).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- https://wiki.zimbra.com/wiki/Security_Center
- https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23
- https://blog.sonarsource.com/zimbra-webmail-compromise-via-email
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-1254. | CVE ID: CVE-2009-1254
Date Updated: 2024-08-07T05:04:49.109Z
Date Published: 2009-04-09T00:00:00
Description:
James Stone Tunapie 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a stream URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://launchpad.net/bugs/314591
- https://launchpad.net/bugs/cve/2009-1254
- http://www.securityfocus.com/bid/34418
- http://www.vupen.com/english/advisories/2009/0972
- http://osvdb.org/53427
- http://secunia.com/advisories/34643
- http://www.debian.org/security/2009/dsa-1764
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-6252. | CVE ID: CVE-2013-6252
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-15911. | CVE ID: CVE-2018-15911
Date Updated: 2024-08-05T10:10:04.990Z
Date Published: 2018-08-28T04:00:00
Description:
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201811-12
- https://usn.ubuntu.com/3768-1/
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- https://access.redhat.com/errata/RHSA-2018:3834
- https://www.kb.cert.org/vuls/id/332928
- https://www.debian.org/security/2018/dsa-4288
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8e9ce5016db968b40e4ec255a3005f2786cce45f
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- http://www.securityfocus.com/bid/105122
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-1767. | CVE ID: CVE-2016-1767
Date Updated: 2024-08-05T23:10:39.217Z
Date Published: 2016-03-24T01:00:00
Description:
QuickTime in Apple OS X before 10.11.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FlashPix image, a different vulnerability than CVE-2016-1768.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- https://support.apple.com/HT206167
- https://www.exploit-db.com/exploits/39633/
- http://www.securitytracker.com/id/1035363
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-16426. | CVE ID: CVE-2018-16426
Date Updated: 2024-08-05T10:24:32.081Z
Date Published: 2018-09-04T00:00:00
Description:
Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://access.redhat.com/errata/RHSA-2019:2154
- https://lists.debian.org/debian-lts-announce/2019/09/msg00009.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-46044. | CVE ID: CVE-2021-46044
Date Updated: 2024-08-04T04:54:31.155Z
Date Published: 2022-01-06T00:00:00
Description:
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gpac/gpac/issues/2006
- https://www.debian.org/security/2023/dsa-5411
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-31217. | CVE ID: CVE-2024-31217
Date Updated: 2024-08-02T01:46:04.759Z
Date Published: 2024-06-12T14:50:37.999Z
Description:
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm
- https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-0671. | CVE ID: CVE-2019-0671
Date Updated: 2024-08-04T17:51:27.085Z
Date Published: 2019-03-06T00:00:00
Description:
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/106928
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0671
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-5952. | CVE ID: CVE-2023-5952
Date Updated: 2024-08-02T08:14:25.117Z
Date Published: 2023-12-04T21:27:54.563Z
Description:
The Welcart e-Commerce WordPress plugin before 2.9.5 unserializes user input from cookies, which could allow unautehtniacted users to perform PHP Object Injection when a suitable gadget is present on the blog
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/0acd613e-dbd6-42ae-9f3d-6d6e77a4c1b7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-1595. | CVE ID: CVE-2013-1595
Date Updated: 2024-08-06T15:04:49.545Z
Date Published: 2020-01-24T17:10:08
Description:
A Buffer Overflow vulnerability exists in Vivotek PT7135 IP Camera 0300a and 0400a via a specially crafted packet in the Authorization header field sent to the RTSP service, which could let a remote malicious user execute arbitrary code or cause a Denial of Service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/59573
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83944
- https://www.coresecurity.com/advisories/vivotek-ip-cameras-multiple-vulnerabilities
- https://github.com/offensive-security/exploitdb/blob/master/exploits/hardware/webapps/25139.txt
- https://packetstormsecurity.com/files/cve/CVE-2013-1595
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-42645. | CVE ID: CVE-2021-42645
Date Updated: 2024-08-04T03:38:50.101Z
Date Published: 2022-05-10T11:14:13
Description:
CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Net-hunter121/CMSimple_XH-Unauth-RCE
- https://github.com/cmsimple-xh/cmsimple-xh/releases/tag/1.7.5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-1448. | CVE ID: CVE-2010-1448
Date Updated: 2024-08-07T01:21:19.167Z
Date Published: 2010-06-23T18:00:00
Description:
Cross-site scripting (XSS) vulnerability in lib/LXR/Common.pm in LXR Cross Referencer before 0.9.8 allows remote attackers to inject arbitrary web script or HTML via vectors related to a string in the search page's TITLE element, a different vulnerability than CVE-2009-4497 and CVE-2010-1625.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58294
- http://sourceforge.net/projects/lxr/files/stable/lxr-0.9.8/lxr-0.9.8.tgz/download
- http://www.openwall.com/lists/oss-security/2010/05/14/3
- http://marc.info/?l=oss-security&m=127316953819027&w=2
- http://www.openwall.com/lists/oss-security/2010/05/03/7
- http://www.openwall.com/lists/oss-security/2010/05/06/2
- http://marc.info/?l=oss-security&m=127289957223005&w=2
- http://secunia.com/advisories/39686
- http://www.securityfocus.com/bid/39865
- http://lxr.cvs.sourceforge.net/viewvc/lxr/lxr/lib/LXR/Common.pm?r1=1.63&r2=1.64
- http://lxr.cvs.sourceforge.net/viewvc/lxr/lxr/lib/LXR/Common.pm?view=log#rev1.64
- http://marc.info/?l=oss-security&m=127291817517567&w=2
- http://www.openwall.com/lists/oss-security/2010/05/03/1
- http://www.osvdb.org/64216
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-4429. | CVE ID: CVE-2023-4429
Date Updated: 2024-08-02T07:24:04.728Z
Date Published: 2023-08-22T23:56:14.017Z
Description:
Use after free in Loader in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
- https://crbug.com/1469754
- https://www.debian.org/security/2023/dsa-5483
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
- https://security.gentoo.org/glsa/202401-34
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-36212. | CVE ID: CVE-2024-36212
Date Updated: 2024-08-02T03:30:13.220Z
Date Published: 2024-06-13T07:52:34.545Z
Description:
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-29923. | CVE ID: CVE-2023-29923
Date Updated: 2024-08-02T14:14:39.991Z
Date Published: 2023-04-19T00:00:00
Description:
PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/PowerJob/PowerJob/issues/587
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide information about the following MITRE ATT&CK technique: | T1212 : Exploitation for Credential Access | Name: Exploitation for Credential Access
ID: T1212
URL: https://attack.mitre.org/techniques/T1212
Platforms: Linux, Windows, macOS, Azure AD
Kill Chain Phases: Credential Access
Description: Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.
Credentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is `MS14-068`, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)
Such exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)
Exploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.
Data Sources: User Account: User Account Authentication, Process: Process Creation, Application Log: Application Log Content
Detection: Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Also look for behavior on the system that might indicate successful compromise, such as abnormal behavior of processes. Credential resources obtained through exploitation may be detectable in use if they are not normally used or seen. |
Provide detailed information about CVE-2023-26059. | CVE ID: CVE-2023-26059
Date Updated: 2024-08-02T11:39:06.567Z
Date Published: 2023-04-24T00:00:00
Description:
An issue was discovered in Nokia NetAct before 22 SP1037. On the Site Configuration Tool tab, attackers can upload a ZIP file which, when processed, exploits Stored XSS. The upload option of the Site Configuration tool does not validate the file contents. The application is in a demilitarised zone behind a perimeter firewall and without exposure to the internet. The attack can only be performed by an internal user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nokia.com
- https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2022-03/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-17304. | CVE ID: CVE-2017-17304
Date Updated: 2024-08-05T20:51:30.518Z
Date Published: 2018-03-09T17:00:00
Description:
The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-02-cidam-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-2703. | CVE ID: CVE-2024-2703
Date Updated: 2024-08-21T23:00:23.349Z
Date Published: 2024-03-20T16:00:06.080Z
Description:
A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49. Affected is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257454 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.257454
- https://vuldb.com/?ctiid.257454
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-5342. | CVE ID: CVE-2020-5342
Date Updated: 2024-09-16T21:56:57.960Z
Date Published: 2020-03-09T19:45:13.366401Z
Description:
Dell Digital Delivery versions prior to 3.5.2015 contain an incorrect default permissions vulnerability. A locally authenticated low-privileged malicious user could exploit this vulnerability to run an arbitrary executable with administrative privileges on the affected system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/article/SLN320561
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-22048. | CVE ID: CVE-2023-22048
Date Updated: 2024-09-13T16:42:24.968Z
Date Published: 2023-07-18T20:18:31.384Z
Description:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2023.html
- https://security.netapp.com/advisory/ntap-20230725-0005/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-14415. | CVE ID: CVE-2019-14415
Date Updated: 2024-08-05T00:19:40.869Z
Date Published: 2019-07-29T19:04:45
Description:
An issue was discovered in Veritas Resiliency Platform (VRP) before 3.4 HF1. A persistent cross-site scripting (XSS) vulnerability allows a malicious VRP user to inject malicious script into another user's browser, related to resiliency plans functionality. A victim must open a resiliency plan that an attacker has access to.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.veritas.com/content/support/en_US/security/VTS19-002.html#Issue4
- http://seclists.org/fulldisclosure/2019/Jul/39
- http://packetstormsecurity.com/files/153842/Veritas-Resiliency-Platform-VRP-Traversal-Command-Execution.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-2969. | CVE ID: CVE-2010-2969
Date Updated: 2024-09-16T20:38:11.680Z
Date Published: 2010-08-04T21:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.7.3 and earlier, and 1.9.x before 1.9.3, allow remote attackers to inject arbitrary web script or HTML via crafted content, related to (1) action/LikePages.py, (2) action/chart.py, and (3) action/userprofile.py, a similar issue to CVE-2010-2487.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2010/1981
- http://moinmo.in/MoinMoinRelease1.9
- http://moinmo.in/SecurityFixes
- http://www.securityfocus.com/bid/40549
- http://www.debian.org/security/2010/dsa-2083
- http://hg.moinmo.in/moin/1.9/rev/e50b087c4572
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809
- http://marc.info/?l=oss-security&m=127799369406968&w=2
- http://marc.info/?l=oss-security&m=127809682420259&w=2
- http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES
- http://hg.moinmo.in/moin/1.7/rev/37306fba2189
- http://secunia.com/advisories/40836
- http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-4740. | CVE ID: CVE-2012-4740
Date Updated: 2024-08-06T20:42:55.052Z
Date Published: 2012-08-31T22:00:00
Description:
Cross-site scripting (XSS) vulnerability in the captive portal in PacketFence before 3.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://sourceforge.net/mailarchive/message.php?msg_id=29126135
- http://www.securityfocus.com/bid/53027
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74887
- http://secunia.com/advisories/48833
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-0160. | CVE ID: CVE-2017-0160
Date Updated: 2024-08-05T12:55:19.118Z
Date Published: 2017-04-12T14:00:00
Description:
Microsoft .NET Framework 2.0, 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allows an attacker with access to the local system to execute malicious code, aka ".NET Remote Code Execution Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0160
- http://www.securityfocus.com/bid/97447
- https://www.exploit-db.com/exploits/41903/
- http://www.securitytracker.com/id/1038236
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-1407. | CVE ID: CVE-2008-1407
Date Updated: 2024-08-07T08:24:41.628Z
Date Published: 2008-03-20T10:00:00
Description:
SQL injection vulnerability in index.php in the WebChat 1.60 module for eXV2 allows remote attackers to execute arbitrary SQL commands via the roomid parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/29390
- http://www.securityfocus.com/bid/28256
- https://www.exploit-db.com/exploits/5255
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41213
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-1308. | CVE ID: CVE-2023-1308
Date Updated: 2024-08-02T05:40:59.865Z
Date Published: 2023-03-10T07:35:22.681Z
Description:
A vulnerability classified as critical has been found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/adminlog.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222696.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.222696
- https://vuldb.com/?ctiid.222696
- https://github.com/gtest1112/111/blob/main/sqli-1.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-28715. | CVE ID: CVE-2022-28715
Date Updated: 2024-08-03T06:03:52.057Z
Date Published: 2022-08-18T07:10:47
Description:
Cross-site scripting vulnerability in the specific parameters of Cybozu Office 10.0.0 to 10.8.5 allows a remote attacker to inject an arbitrary script via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cs.cybozu.co.jp/2022/007584.html
- https://jvn.jp/en/jp/JVN20573662/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-4891. | CVE ID: CVE-2019-4891
Date Updated: 2019-12-30T16:19:32
Date Published: 2019-12-30T16:19:32
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-0139. | CVE ID: CVE-2022-0139
Date Updated: 2024-08-02T23:18:41.675Z
Date Published: 2022-02-08T18:40:10
Description:
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c
- https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-7648. | CVE ID: CVE-2019-7648
Date Updated: 2024-08-04T20:54:27.851Z
Date Published: 2019-02-08T17:00:00
Description:
controller/fetchpwd.php and controller/doAction.php in Hotels_Server through 2018-11-05 rely on base64 in an attempt to protect password storage.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/FantasticLBP/Hotels_Server/issues/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-33749. | CVE ID: CVE-2022-33749
Date Updated: 2024-08-03T08:09:22.664Z
Date Published: 2022-10-11T00:00:00
Description:
XAPI open file limit DoS It is possible for an unauthenticated client on the network to cause XAPI to hit its file-descriptor limit. This causes XAPI to be unable to accept new requests for other (trusted) clients, and blocks XAPI from carrying out any tasks that require the opening of file descriptors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://xenbits.xenproject.org/xsa/advisory-413.txt
- http://xenbits.xen.org/xsa/advisory-413.html
- http://www.openwall.com/lists/oss-security/2022/10/11/4
- https://security.gentoo.org/glsa/202402-07
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-43179. | CVE ID: CVE-2021-43179
Date Updated: 2022-08-03T19:42:20
Date Published: 2022-08-03T19:42:20
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-5927. | CVE ID: CVE-2015-5927
Date Updated: 2024-08-06T07:06:34.550Z
Date Published: 2015-10-23T21:00:00
Description:
FontParser in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-5942.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html
- https://support.apple.com/HT205375
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html
- https://support.apple.com/HT205370
- https://support.apple.com/HT205378
- http://www.securitytracker.com/id/1033929
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-43043. | CVE ID: CVE-2021-43043
Date Updated: 2024-08-04T03:47:13.241Z
Date Published: 2021-12-06T00:00:00
Description:
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The apache user could read arbitrary files such as /etc/shadow by abusing an insecure Sudo rule.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961
- https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-1
- https://www.cyberonesecurity.com/blog/exploiting-kaseya-unitrends-backup-appliance-part-2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-0657. | CVE ID: CVE-2015-0657
Date Updated: 2024-08-06T04:17:32.484Z
Date Published: 2015-03-06T02:00:00
Description:
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1031841
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0657
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-4224. | CVE ID: CVE-2023-4224
Date Updated: 2024-08-02T07:17:12.200Z
Date Published: 2023-11-28T07:19:31.720Z
Description:
Unrestricted file upload in `/main/inc/ajax/dropbox.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-129-2023-09-04-Critical-impact-Moderate-risk-Authenticated-users-may-gain-unauthenticated-RCE-CVE-2023-4223CVE-2023-4224CVE-2023-4225CVE-2023-4226
- https://starlabs.sg/advisories/23/23-4224
- https://github.com/chamilo/chamilo-lms/commit/6f32625a012d5de2dfe8edbccb4ed14a85e310d4
- https://github.com/chamilo/chamilo-lms/commit/f3d62b65ad60d68096c2674d5695339f04de0b8a
- https://github.com/chamilo/chamilo-lms/commit/e864127a440c2cab0eb62c113a04e2e904543a1f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-12839. | CVE ID: CVE-2017-12839
Date Updated: 2024-08-05T18:51:06.644Z
Date Published: 2019-05-09T16:46:40
Description:
A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mpg123.de/
- https://sourceforge.net/p/mpg123/bugs/255/
- https://www.mpg123.de/cgi-bin/scm/mpg123/trunk/src/libmpg123/getbits.h?r1=2024&r2=4323&sortby=date
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-31635. | CVE ID: CVE-2022-31635
Date Updated: 2024-08-03T07:26:00.589Z
Date Published: 2023-06-13T16:10:26.319Z
Description:
Potential time-of-check to time-of-use (TOCTOU) vulnerabilities have been identified in the BIOS for certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hp.com/us-en/document/ish_7149996-7150021-16/hpsbhf03814
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-11975. | CVE ID: CVE-2020-11975
Date Updated: 2024-08-04T11:48:57.089Z
Date Published: 2020-06-05T14:10:57
Description:
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://unomi.apache.org/security/cve-2020-11975.txt
- https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95%40%3Ccommits.unomi.apache.org%3E
- https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460%40%3Ccommits.unomi.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-36362. | CVE ID: CVE-2023-36362
Date Updated: 2024-08-02T16:45:56.718Z
Date Published: 2023-06-22T00:00:00
Description:
An issue in the rel_sequences component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/MonetDB/MonetDB/issues/7387
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-2989. | CVE ID: CVE-2024-2989
Date Updated: 2024-08-22T19:16:36.655Z
Date Published: 2024-03-27T18:00:07.769Z
Description:
A vulnerability, which was classified as critical, has been found in Tenda FH1203 2.0.1.6. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.258158
- https://vuldb.com/?ctiid.258158
- https://vuldb.com/?submit.301364
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromNatStaticSetting.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-0949. | CVE ID: CVE-2023-0949
Date Updated: 2024-08-02T05:32:45.083Z
Date Published: 2023-02-22T00:00:00
Description:
Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19
- https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-31123. | CVE ID: CVE-2022-31123
Date Updated: 2024-08-03T07:11:39.205Z
Date Published: 2022-10-13T00:00:00
Description:
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8
- https://github.com/grafana/grafana/releases/tag/v9.1.8
- https://security.netapp.com/advisory/ntap-20221124-0002/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the MITRE ATT&CK technique T1059.007 | The MITRE ATT&CK technique T1059.007: JavaScript is related to the vulnerability CVE-CVE-2020-5269. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact. |
Provide detailed information about CVE-2023-5238. | CVE ID: CVE-2023-5238
Date Updated: 2024-08-02T07:52:08.541Z
Date Published: 2023-10-31T13:54:43.838Z
Description:
The EventPrime WordPress plugin before 3.2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to an HTML Injection on the plugin in the search area of the website.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/47a5fbfd-f47c-4356-8567-b29dadb48423
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-14014. | CVE ID: CVE-2020-14014
Date Updated: 2024-08-04T12:32:14.678Z
Date Published: 2020-06-24T14:22:55
Description:
An issue was discovered in Navigate CMS 2.8 and 2.9 r1433. The query parameter fid on the resource navigate.php does not perform sufficient data validation and/or encoding, making it vulnerable to reflected XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cxsecurity.com/issue/WLB-2018090182
- https://blog.sean-wright.com/navigate-cms/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-24540. | CVE ID: CVE-2020-24540
Date Updated: 2023-03-22T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-34872. | CVE ID: CVE-2023-34872
Date Updated: 2024-08-02T16:17:04.212Z
Date Published: 2023-07-31T00:00:00
Description:
A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe
- https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFBT75QHBWNMSDAHSXZQ2I3PBJWID36K/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3H3GOWFE3C7543GMEN7LY4GWMWJ7D2G/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XXL3L6RJOTLGCN7GLH2OLLNF4FJ4T7I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ3NYJ43U2MA7COKGMJDARZUAAOP45D4/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-3227. | CVE ID: CVE-2014-3227
Date Updated: 2024-08-06T10:35:57.130Z
Date Published: 2014-05-30T18:00:00
Description:
dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this vulnerability exists because of reliance on unrealistic constraints on the behavior of an external program.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://openwall.com/lists/oss-security/2014/05/29/16
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306
- http://openwall.com/lists/oss-security/2014/04/29/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-8532. | CVE ID: CVE-2018-8532
Date Updated: 2024-08-05T07:02:25.830Z
Date Published: 2018-10-10T13:00:00
Description:
An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when parsing a malicious XMLA file containing a reference to an external entity, aka "SQL Server Management Studio Information Disclosure Vulnerability." This affects SQL Server Management Studio 17.9, SQL Server Management Studio 18.0. This CVE ID is unique from CVE-2018-8527, CVE-2018-8533.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8532
- http://www.securitytracker.com/id/1041826
- http://www.securityfocus.com/bid/105475
- https://www.exploit-db.com/exploits/45587/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-36490. | CVE ID: CVE-2022-36490
Date Updated: 2024-08-03T10:07:34.306Z
Date Published: 2022-08-25T13:55:58
Description:
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditMacList.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-6343. | CVE ID: CVE-2023-6343
Date Updated: 2024-08-02T08:28:21.568Z
Date Published: 2023-11-30T17:47:54.613Z
Description:
Tyler Technologies Court Case Management Plus allows a remote, unauthenticated attacker to enumerate and access sensitive files using the tiffserver/tssp.aspx 'FN' and 'PN' parameters. This behavior is related to the use of a deprecated version of Aquaforest TIFF Server, possibly 2.x. The vulnerable Aquaforest TIFF Server feature was removed on or around 2023-11-01. Insecure configuration issues in Aquaforest TIFF Server are identified separately as CVE-2023-6352. CVE-2023-6343 is similar to CVE-2020-9323. CVE-2023-6343 is related to or partially caused by CVE-2023-6352.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tylertech.com/solutions/courts-public-safety/courts-justice
- https://www.aquaforest.com/blog/tiff-server-security-update
- https://www.aquaforest.com/blog/aquaforest-tiff-server-sunsetting
- https://github.com/qwell/disorder-in-the-court/blob/main/README-TylerTechnologies.md
- https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
- https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-7286. | CVE ID: CVE-2015-7286
Date Updated: 2024-08-06T07:43:46.156Z
Date Published: 2015-11-25T02:00:00
Description:
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol traffic.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/428280
- http://cybergibbons.com/?p=2844
- http://www.kb.cert.org/vuls/id/BLUU-A3NQAL
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-3324. | CVE ID: CVE-2012-3324
Date Updated: 2024-08-06T20:05:10.825Z
Date Published: 2012-09-25T20:00:00
Description:
Directory traversal vulnerability in the UTL_FILE module in IBM DB2 and DB2 Connect 10.1 before FP1 on Windows allows remote authenticated users to modify, delete, or read arbitrary files via a pathname in the file field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21611040
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77924
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC85513
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-47542. | CVE ID: CVE-2021-47542
Date Updated: 2024-08-04T05:39:59.608Z
Date Published: 2024-05-24T15:09:48.578Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
In qlcnic_83xx_add_rings(), the indirect function of
ahw->hw_ops->alloc_mbx_args will be called to allocate memory for
cmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),
which could lead to a NULL pointer dereference on failure of the
indirect function like qlcnic_83xx_alloc_mbx_args().
Fix this bug by adding a check of alloc_mbx_args(), this patch
imitates the logic of mbx_cmd()'s failure handling.
This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.
Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.
Builds with CONFIG_QLCNIC=m show no new warnings, and our
static analyzer no longer warns about this code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/3a061d54e260b701b538873b43e399d9b8b83e03
- https://git.kernel.org/stable/c/b4f217d6fcc00c3fdc0921a7691f30be7490b073
- https://git.kernel.org/stable/c/550658a2d61e4eaf522c8ebc7fad76dc376bfb45
- https://git.kernel.org/stable/c/57af54a56024435d83e44c78449513b414eb6edf
- https://git.kernel.org/stable/c/bbeb0325a7460ebf1e03f5e0bfc5c652fba9519f
- https://git.kernel.org/stable/c/15fa12c119f869173f9b710cbe6a4a14071d2105
- https://git.kernel.org/stable/c/c5ef33c1489b2cd74368057fa00b5d2183bb5853
- https://git.kernel.org/stable/c/e2dabc4f7e7b60299c20a36d6a7b24ed9bf8e572
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-4834. | CVE ID: CVE-2016-4834
Date Updated: 2024-08-06T00:39:26.311Z
Date Published: 2016-08-01T01:00:00
Description:
modules/Users/actions/Save.php in Vtiger CRM 6.4.0 and earlier does not properly restrict user-save actions, which allows remote authenticated users to create or modify user accounts via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/92076
- http://jvn.jp/en/jp/JVN01956993/index.html
- http://code.vtiger.com/vtiger/vtigercrm/commit/7cdf9941197b4aa58114eafce3ce88fb418eb68c
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000126
- http://www.securitytracker.com/id/1036485
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-24533. | CVE ID: CVE-2020-24533
Date Updated: 2023-03-22T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-18499. | CVE ID: CVE-2017-18499
Date Updated: 2024-08-05T21:28:54.912Z
Date Published: 2019-08-12T15:41:28
Description:
The simple-membership plugin before 3.5.7 for WordPress has XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/simple-membership/#developers
- https://wpvulndb.com/vulnerabilities/9718
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-27931. | CVE ID: CVE-2024-27931
Date Updated: 2024-08-02T00:41:55.851Z
Date Published: 2024-03-05T16:43:11.934Z
Description:
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-3676. | CVE ID: CVE-2012-3676
Date Updated: 2024-08-06T20:13:51.707Z
Date Published: 2012-09-13T10:00:00
Description:
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html
- http://support.apple.com/kb/HT5485
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://support.apple.com/kb/HT5503
- http://osvdb.org/85374
- http://support.apple.com/kb/HT5502
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78525
- http://www.securityfocus.com/bid/55534
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17352
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-40098. | CVE ID: CVE-2022-40098
Date Updated: 2024-08-03T12:14:39.775Z
Date Published: 2022-09-26T20:25:11
Description:
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_expense.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/WYB-signal/Bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/SQLi-2.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |