instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-43413.
CVE ID: CVE-2021-43413 Date Updated: 2024-08-04T03:55:28.558Z Date Published: 2021-11-07T17:06:59 Description: An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html - https://www.mail-archive.com/bug-hurd%40gnu.org/msg32113.html - https://lists.gnu.org/archive/html/bug-hurd/2002-11/msg00263.html - https://lists.gnu.org/archive/html/bug-hurd/2005-06/msg00191.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6251.
CVE ID: CVE-2015-6251 Date Updated: 2024-08-06T07:15:13.264Z Date Published: 2015-08-24T14:00:00 Description: Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1251902 - http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html - http://www.securitytracker.com/id/1033226 - http://www.gnutls.org/security.html#GNUTLS-SA-2015-3 - http://www.openwall.com/lists/oss-security/2015/08/10/1 - http://www.securityfocus.com/bid/76267 - http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html - https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12 - http://www.openwall.com/lists/oss-security/2015/08/17/6 - http://www.debian.org/security/2015/dsa-3334 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34019.
CVE ID: CVE-2024-34019 Date Updated: 2024-08-29T19:40:47.168Z Date Published: 2024-08-29T19:12:46.700Z Description: Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 4569. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-advisory.acronis.com/advisories/SEC-3079 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2778.
CVE ID: CVE-2015-2778 Date Updated: 2024-08-06T05:24:38.933Z Date Published: 2015-04-10T14:00:00 Description: Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 - http://www.openwall.com/lists/oss-security/2015/03/20/12 - http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html - http://www.openwall.com/lists/oss-security/2015/03/27/11 - http://www.openwall.com/lists/oss-security/2015/03/28/3 - http://www.securityfocus.com/bid/73305 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3762.
CVE ID: CVE-2022-3762 Date Updated: 2024-08-03T01:20:57.608Z Date Published: 2022-11-21T00:00:00 Description: The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22914.
CVE ID: CVE-2024-22914 Date Updated: 2024-09-12T17:43:02.968Z Date Published: 2024-01-19T00:00:00 Description: A heap-use-after-free was found in SWFTools v0.9.2, in the function input at lex.swf5.c:2620. It allows an attacker to cause denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matthiaskramm/swftools/issues/214 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26401.
CVE ID: CVE-2023-26401 Date Updated: 2024-08-02T11:46:24.622Z Date Published: 2023-04-12T00:00:00 Description: Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/dimension/apsb23-27.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0056.
CVE ID: CVE-2023-0056 Date Updated: 2024-08-02T04:54:32.577Z Date Published: 2023-03-23T00:00:00 Description: An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-0056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39850.
CVE ID: CVE-2022-39850 Date Updated: 2024-08-03T12:07:42.825Z Date Published: 2022-10-07T00:00:00 Description: Improper access control in mum_container_policy service prior to SMR Oct-2022 Release 1 allows allows unauthorized read of configuration data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1190
The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2013-4335. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2021-1746.
CVE ID: CVE-2021-1746 Date Updated: 2024-08-03T16:18:11.543Z Date Published: 2021-04-02T17:50:15 Description: This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212147 - https://support.apple.com/en-us/HT212146 - https://support.apple.com/en-us/HT212148 - https://support.apple.com/en-us/HT212149 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-47523.
CVE ID: CVE-2024-47523 Date Updated: 2024-10-02T12:58:32.857Z Date Published: 2024-10-01T20:31:59.230Z Description: LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Transports" feature allows authenticated users to inject arbitrary JavaScript through the "Details" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/librenms/librenms/security/advisories/GHSA-7f84-28qh-9486 - https://github.com/librenms/librenms/commit/ee1afba003d33667981e098c83295f599d88439c - https://github.com/librenms/librenms/blob/4777247327c793ed0a3306d0464b95176008177b/includes/html/print-alert-transports.php#L40 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35011.
CVE ID: CVE-2023-35011 Date Updated: 2024-10-01T18:19:41.613Z Date Published: 2023-08-16T22:46:33.755Z Description: IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 257705. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7026692 - https://exchange.xforce.ibmcloud.com/vulnerabilities/257705 - https://security.netapp.com/advisory/ntap-20230921-0005/ - https://security.netapp.com/advisory/ntap-20240621-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34927.
CVE ID: CVE-2024-34927 Date Updated: 2024-08-02T02:59:22.640Z Date Published: N/A Description: A SQL injection vulnerability in /model/update_classroom.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the name parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2021.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8585.
CVE ID: CVE-2014-8585 Date Updated: 2024-08-06T13:25:59.943Z Date Published: 2014-11-04T15:00:00 Description: Directory traversal vulnerability in the WordPress Download Manager plugin for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the fname parameter to (1) views/file_download.php or (2) file_download.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/98318 - http://www.securityfocus.com/bid/70764 - http://packetstormsecurity.com/files/128852/WordPress-Download-Manager-Arbitrary-File-Download.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25122.
CVE ID: CVE-2024-25122 Date Updated: 2024-08-01T23:36:21.771Z Date Published: 2024-02-13T19:05:27.162Z Description: sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. 1. `/changelogs`, 2. `/locks` or 3. `/expiring_locks`. This issue has been addressed in versions 7.1.33 and 8.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38 - https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24479.
CVE ID: CVE-2022-24479 Date Updated: 2024-08-03T04:13:55.995Z Date Published: 2022-04-15T19:03:04 Description: Connected User Experiences and Telemetry Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24479 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24695.
CVE ID: CVE-2024-24695 Date Updated: 2024-08-01T23:28:11.193Z Date Published: 2024-02-13T23:50:22.837Z Description: Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zoom.com/en/trust/security-bulletin/ZSB-24002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5856.
CVE ID: CVE-2013-5856 Date Updated: 2024-08-06T17:22:31.123Z Date Published: 2013-10-16T18:00:00 Description: Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, and 6.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html - http://osvdb.org/98493 - http://www.securityfocus.com/bid/63099 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0306.
CVE ID: CVE-2022-0306 Date Updated: 2024-08-02T23:25:39.887Z Date Published: 2022-02-12T01:35:57 Description: Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html - https://crbug.com/1283198 - http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0489.
CVE ID: CVE-2016-0489 Date Updated: 2024-08-05T22:22:55.692Z Date Published: 2016-01-21T02:00:00 Description: Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Test Manager for Web Apps. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the ActionServlet servlet, which allows remote authenticated users to upload and execute arbitrary files via directory traversal sequences in the tempfilename parameter in a ReportImage action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/81184 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.zerodayinitiative.com/advisories/ZDI-16-038 - http://www.securitytracker.com/id/1034734 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35086.
CVE ID: CVE-2024-35086 Date Updated: 2024-08-02T03:07:46.679Z Date Published: N/A Description: J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in BpmTaskFromMapper.xml . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.j2eefast.com/ - https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35086.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8281.
CVE ID: CVE-2020-8281 Date Updated: 2024-08-04T09:56:28.324Z Date Published: 2021-01-06T20:58:09 Description: A missing file type check in Nextcloud Contacts 3.3.0 allows a malicious user to upload malicious SVG files to perform cross-site scripting (XSS) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/894876 - https://nextcloud.com/security/advisory/?id=NC-SA-2020-045 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0850.
CVE ID: CVE-2014-0850 Date Updated: 2024-08-06T09:27:20.252Z Date Published: 2014-03-16T10:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM InfoSphere Master Data Management Reference Data Management (RDM) Hub 10.1 and 11.0 before 11.0.0.0-MDM-IF008 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/90751 - http://www-01.ibm.com/support/docview.wss?uid=swg21666119 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5029.
CVE ID: CVE-2008-5029 Date Updated: 2024-08-07T10:40:17.130Z Date Published: 2008-11-10T16:00:00 Description: The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32998 - http://www.openwall.com/lists/oss-security/2008/11/06/1 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:234 - http://www.redhat.com/support/errata/RHSA-2009-0225.html - http://www.securityfocus.com/archive/1/512019/100/0/threaded - http://secunia.com/advisories/33641 - http://securityreason.com/securityalert/4573 - http://secunia.com/advisories/33623 - http://www.redhat.com/support/errata/RHSA-2009-0009.html - http://www.securitytracker.com/id?1021292 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9558 - http://www.securitytracker.com/id?1021511 - http://www.redhat.com/support/errata/RHSA-2009-0014.html - http://secunia.com/advisories/33586 - http://marc.info/?l=linux-netdev&m=122593044330973&w=2 - http://secunia.com/advisories/33556 - http://www.securityfocus.com/bid/32154 - http://www.debian.org/security/2008/dsa-1687 - http://secunia.com/advisories/32918 - http://www.securityfocus.com/archive/1/499744/100/0/threaded - http://www.ubuntu.com/usn/usn-679-1 - http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.9 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46538 - http://secunia.com/advisories/33180 - https://rhn.redhat.com/errata/RHSA-2009-1550.html - http://darkircop.org/unix.c - https://bugzilla.redhat.com/show_bug.cgi?id=470201 - http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html - http://www.securityfocus.com/archive/1/499700/100/0/threaded - http://secunia.com/advisories/33704 - http://www.debian.org/security/2008/dsa-1681 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11694 - http://archives.neohapsis.com/archives/bugtraq/2009-01/0006.html - http://www.securityfocus.com/bid/33079 - http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52479.
CVE ID: CVE-2023-52479 Date Updated: 2024-08-02T23:03:19.917Z Date Published: 2024-02-29T05:43:11.373Z Description: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix uaf in smb20_oplock_break_ack drop reference after use opinfo. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/694e13732e830cbbfedb562e57f28644927c33fd - https://git.kernel.org/stable/c/8226ffc759ea59f10067b9acdf7f94bae1c69930 - https://git.kernel.org/stable/c/d5b0e9d3563e7e314a850e81f42b2ef6f39882f9 - https://git.kernel.org/stable/c/c69813471a1ec081a0b9bf0c6bd7e8afd818afce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39710.
CVE ID: CVE-2023-39710 Date Updated: 2024-10-01T14:27:46.762Z Date Published: 2023-09-01T00:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add Customer section. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sourcecodester.com/ - https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html - https://gist.github.com/Arajawat007/dc6e4dd231accf777dae30d890a4e7df#file-cve-2023-39710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2820.
CVE ID: CVE-2019-2820 Date Updated: 2024-08-04T19:03:42.778Z Date Published: 2019-07-23T22:31:48 Description: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Gnuplot). The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1950.
CVE ID: CVE-2010-1950 Date Updated: 2024-09-17T00:11:13.844Z Date Published: 2010-05-18T19:00:00Z Description: SQL injection vulnerability in the Online News Paper Manager (com_jnewspaper) component 1.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the date_info parameter to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/39536 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18470.
CVE ID: CVE-2017-18470 Date Updated: 2024-08-05T21:20:51.285Z Date Published: 2019-08-05T12:41:28 Description: cPanel before 62.0.4 has a fixed password for the Munin MySQL test account (SEC-196). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.cpanel.net/display/CL/62+Change+Log No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6217.
CVE ID: CVE-2013-6217 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3348.
CVE ID: CVE-2011-3348 Date Updated: 2024-08-06T23:29:56.738Z Date Published: 2011-09-19T15:00:00 Description: The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=bugtraq&m=131731002122529&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69804 - http://support.apple.com/kb/HT5130 - http://www.redhat.com/support/errata/RHSA-2011-1391.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14941 - http://rhn.redhat.com/errata/RHSA-2012-0543.html - http://marc.info/?l=bugtraq&m=132033751509019&w=2 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - http://www.mandriva.com/security/advisories?name=MDVSA-2011:168 - http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html - http://community.jboss.org/message/625307 - http://www.securityfocus.com/bid/49616 - http://rhn.redhat.com/errata/RHSA-2012-0542.html - http://www.apache.org/dist/httpd/Announcement2.2.html - http://marc.info/?l=bugtraq&m=131731002122529&w=2 - http://httpd.apache.org/security/vulnerabilities_22.html#2.2.21 - http://www.securitytracker.com/id?1026054 - http://marc.info/?l=bugtraq&m=132033751509019&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18154 - http://secunia.com/advisories/46013 - https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27144.
CVE ID: CVE-2021-27144 Date Updated: 2024-08-03T20:40:47.320Z Date Published: 2021-02-10T18:40:22 Description: An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded f~i!b@e#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#httpd-hardcoded-credentials No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24073.
CVE ID: CVE-2021-24073 Date Updated: 2024-08-03T19:21:17.267Z Date Published: 2021-02-25T23:01:37 Description: Skype for Business and Lync Spoofing Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24073 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3641.
CVE ID: CVE-2018-3641 Date Updated: 2024-09-17T03:38:43.635Z Date Published: 2018-04-03T21:00:00Z Description: Escalation of privilege in all versions of the Intel Remote Keyboard allows a network attacker to inject keystrokes as a local user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00122&languageid=en-fr No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50469.
CVE ID: CVE-2023-50469 Date Updated: 2024-08-02T22:16:46.868Z Date Published: 2023-12-15T00:00:00 Description: Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/forever-more-cjy/overflow/blob/main/LBT-T310%20Buffer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3386.
CVE ID: CVE-2022-3386 Date Updated: 2024-08-03T01:07:06.514Z Date Published: 2022-10-27T20:34:44.584Z Description: Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-291-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5524.
CVE ID: CVE-2015-5524 Date Updated: 2024-08-06T06:50:02.592Z Date Published: 2020-04-10T18:29:52 Description: An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-05-13. There is a buffer overflow in datablock_write because the amount of received data is not validated. The Samsung ID is SVE-2015-4018 (December 2015). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3366.
CVE ID: CVE-2008-3366 Date Updated: 2024-08-07T09:37:26.660Z Date Published: 2008-07-30T17:00:00 Description: SQL injection vulnerability in story.php in Pligg CMS Beta 9.9.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: this might overlap CVE-2008-1774. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/4063 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44021 - http://www.vupen.com/english/advisories/2008/2214/references - https://www.exploit-db.com/exploits/6146 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3572.
CVE ID: CVE-2014-3572 Date Updated: 2024-08-06T10:50:17.438Z Date Published: 2015-01-09T02:00:00 Description: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=bugtraq&m=142895206924048&w=2 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl - http://marc.info/?l=bugtraq&m=142720981827617&w=2 - http://marc.info/?l=bugtraq&m=144050155601375&w=2 - https://support.apple.com/HT204659 - http://www.securityfocus.com/bid/71942 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - http://marc.info/?l=bugtraq&m=143748090628601&w=2 - https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63 - http://www.securitytracker.com/id/1033378 - http://marc.info/?l=bugtraq&m=142721102728110&w=2 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html - https://www.openssl.org/news/secadv_20150108.txt - http://www.mandriva.com/security/advisories?name=MDVSA-2015:019 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html - http://rhn.redhat.com/errata/RHSA-2015-0066.html - http://marc.info/?l=bugtraq&m=142496289803847&w=2 - http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10108 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10102 - http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html - http://marc.info/?l=bugtraq&m=144050297101809&w=2 - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - http://marc.info/?l=bugtraq&m=144050205101530&w=2 - http://marc.info/?l=bugtraq&m=142496179803395&w=2 - http://marc.info/?l=bugtraq&m=142720981827617&w=2 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - https://support.citrix.com/article/CTX216642 - http://marc.info/?l=bugtraq&m=144050254401665&w=2 - http://marc.info/?l=bugtraq&m=142496289803847&w=2 - https://bto.bluecoat.com/security-advisory/sa88 - http://www.debian.org/security/2015/dsa-3125 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40779.
CVE ID: CVE-2021-40779 Date Updated: 2024-09-16T17:18:16.996Z Date Published: 2022-03-16T14:02:39.021566Z Description: Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11749.
CVE ID: CVE-2020-11749 Date Updated: 2024-08-04T11:41:59.516Z Date Published: 2020-07-13T14:11:58 Description: Pandora FMS 7.0 NG <= 746 suffers from Multiple XSS vulnerabilities in different browser views. A network administrator scanning a SNMP device can trigger a Cross Site Scripting (XSS), which can run arbitrary code to allow Remote Code Execution as root or apache2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pandorafms.com/downloads/whats-new-747-EN.pdf - https://medium.com/%40tehwinsam/multiple-xss-on-pandorafms-7-0-ng-744-64b244b8523c - https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC - https://www.exploit-db.com/exploits/48707 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1099.
CVE ID: CVE-2012-1099 Date Updated: 2024-08-06T18:45:27.487Z Date Published: 2012-03-13T10:00:00 Description: Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html - http://www.openwall.com/lists/oss-security/2012/03/03/1 - http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html - https://bugzilla.redhat.com/show_bug.cgi?id=799276 - http://www.debian.org/security/2012/dsa-2466 - http://www.openwall.com/lists/oss-security/2012/03/02/6 - http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain - http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31086.
CVE ID: CVE-2024-31086 Date Updated: 2024-08-02T01:46:04.314Z Date Published: 2024-04-15T07:46:20.046Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Venugopal Change default login logo,url and title allows Cross-Site Scripting (XSS).This issue affects Change default login logo,url and title: from n/a through 2.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/change-default-login-logo-url-and-title/wordpress-change-default-login-logo-url-and-title-plugin-2-0-csrf-to-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4970.
CVE ID: CVE-2016-4970 Date Updated: 2024-08-06T00:46:39.889Z Date Published: 2017-04-13T14:00:00 Description: handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2017-0179.html - http://rhn.redhat.com/errata/RHSA-2017-1097.html - http://netty.io/news/2016/06/07/4-1-1-Final.html - http://www.securityfocus.com/bid/96540 - https://github.com/netty/netty/pull/5364 - https://wiki.opendaylight.org/view/Security_Advisories - http://netty.io/news/2016/06/07/4-0-37-Final.html - https://bugzilla.redhat.com/show_bug.cgi?id=1343616 - https://lists.apache.org/thread.html/afaa5860e3a6d327eb96c3d82cbd2f5996de815a16854ed1ad310144%40%3Ccommits.cassandra.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0349.
CVE ID: CVE-2024-0349 Date Updated: 2024-08-01T18:04:49.004Z Date Published: 2024-01-09T22:31:03.824Z Description: A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to sensitive cookie without secure attribute. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-250117 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.250117 - https://vuldb.com/?ctiid.250117 - https://mega.nz/file/TU1X3TIQ#7bPvxEP0KrdoDZVg-dqinNC5fEQrG5uu58jWzPGh904 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1214.
CVE ID: CVE-2009-1214 Date Updated: 2024-08-07T05:04:49.236Z Date Published: 2009-04-01T10:00:00 Description: GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=492104 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49886 - http://www.openwall.com/lists/oss-security/2009/03/25/7 - https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123 - http://www.securityfocus.com/bid/34521 - http://savannah.gnu.org/bugs/?25296 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9100.
CVE ID: CVE-2020-9100 Date Updated: 2024-08-04T10:19:19.849Z Date Published: 2020-07-06T17:24:56 Description: Earlier than HiSuite 10.1.0.500 have a DLL hijacking vulnerability. This vulnerability exists due to some DLL file is loaded by HiSuite improperly. And it allows an attacker to load this DLL file of the attacker's choosing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200701-01-dllhijacking-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18368.
CVE ID: CVE-2018-18368 Date Updated: 2024-08-05T11:08:21.448Z Date Published: 2019-11-15T16:58:10 Description: Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.symantec.com/us/en/article.SYMSA1488.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2156.
CVE ID: CVE-2023-2156 Date Updated: 2024-08-02T06:12:20.503Z Date Published: 2023-05-09T00:00:00 Description: A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-547/ - https://bugzilla.redhat.com/show_bug.cgi?id=2196292 - http://www.openwall.com/lists/oss-security/2023/05/17/8 - http://www.openwall.com/lists/oss-security/2023/05/17/9 - http://www.openwall.com/lists/oss-security/2023/05/18/1 - http://www.openwall.com/lists/oss-security/2023/05/19/1 - https://security.netapp.com/advisory/ntap-20230622-0001/ - https://www.debian.org/security/2023/dsa-5448 - https://www.debian.org/security/2023/dsa-5453 - https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25211.
CVE ID: CVE-2022-25211 Date Updated: 2024-08-03T04:36:05.791Z Date Published: 2022-02-15T16:11:49 Description: A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server using attacker-specified credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1988 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12017.
CVE ID: CVE-2019-12017 Date Updated: 2024-08-04T23:10:30.177Z Date Published: 2019-10-24T14:28:12 Description: A remote code execution vulnerability exists in MapR CLDB code, specifically in the JSON framework that is used in the CLDB code that handles login and ticket issuance. An attacker can use the 'class' property of the JSON request sent to the CLDB to influence the JSON library's decision on which Java class this JSON request is deserialized to. By doing so, the attacker can force the MapR CLDB to construct a URLClassLoader which loads a malicious Java class from a remote path and instantiate this object in the MapR CLDB, thus executing arbitrary code on the machine running the MapR CLDB and take over the cluster. By switching to the newer Jackson library and ensuring that all incoming JSON requests are only deserialized to the same class that it was serialized from, the vulnerability is fixed. This vulnerability affects the entire MapR core platform. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mapr.com/support/s/article/Remote-code-execution-vulnerability-in-MapR-MFS-CLDB?language=en_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1005
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2019-1013. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2022-0500.
CVE ID: CVE-2022-0500 Date Updated: 2024-08-02T23:32:46.009Z Date Published: 2022-03-25T18:03:03 Description: A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2044578 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57 - https://security.netapp.com/advisory/ntap-20220519-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27099.
CVE ID: CVE-2024-27099 Date Updated: 2024-08-02T00:27:59.513Z Date Published: 2024-02-27T18:58:26.274Z Description: The uAMQP is a C library for AMQP 1.0 communication to Azure Cloud Services. When processing an incorrect `AMQP_VALUE` failed state, may cause a double free problem. This may cause a RCE. Update submodule with commit 2ca42b6e4e098af2d17e487814a91d05f6ae4987. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-6rh4-fj44-v4jj - https://github.com/Azure/azure-uamqp-c/commit/2ca42b6e4e098af2d17e487814a91d05f6ae4987 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15879.
CVE ID: CVE-2017-15879 Date Updated: 2024-08-05T20:04:50.388Z Date Published: 2017-10-24T21:00:00 Description: CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/keystonejs/keystone/pull/4478 - https://www.exploit-db.com/exploits/43053/ - https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20525.
CVE ID: CVE-2019-20525 Date Updated: 2024-08-05T02:46:10.379Z Date Published: 2020-03-19T17:56:30 Description: Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp driver parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16135.
CVE ID: CVE-2017-16135 Date Updated: 2024-09-16T20:52:07.631Z Date Published: 2018-06-07T02:00:00Z Description: serverzyy is a static file server. serverzyy is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy - https://nodesecurity.io/advisories/431 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7318.
CVE ID: CVE-2018-7318 Date Updated: 2024-08-05T06:24:11.809Z Date Published: 2018-02-22T19:00:00 Description: SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exploit-db.com/exploits/44163 - https://www.oracle.com/security-alerts/cpujan2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7571.
CVE ID: CVE-2020-7571 Date Updated: 2024-08-04T09:33:19.782Z Date Published: 2020-11-19T21:02:28 Description: A CWE-79 Multiple Improper Neutralization of Input During Web Page Generation (Cross-site Scripting Reflected) vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause a remote attacker to inject arbitrary web script or HTML due to incorrect sanitization of user supplied data and achieve a Cross-Site Scripting reflected attack against other WebReport users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.se.com/ww/en/download/document/SEVD-2020-315-04/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3765.
CVE ID: CVE-2022-3765 Date Updated: 2024-08-03T01:20:57.580Z Date Published: 2022-10-31T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d - https://github.com/thorsten/phpmyfaq/commit/372428d02a08e90b3a253ba5c506cda84581a5af No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0254.
CVE ID: CVE-2013-0254 Date Updated: 2024-08-06T14:18:09.656Z Date Published: 2013-02-06T11:00:00 Description: The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html - http://rhn.redhat.com/errata/RHSA-2013-0669.html - http://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html - http://lists.qt-project.org/pipermail/announce/2013-February/000023.html - http://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html - https://bugzilla.redhat.com/show_bug.cgi?id=907425 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7716.
CVE ID: CVE-2017-7716 Date Updated: 2024-09-17T03:07:08.178Z Date Published: 2017-04-12T15:00:00Z Description: The read_u32_leb128 function in libr/util/uleb128.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/radare/radare2/issues/7260 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1740.
CVE ID: CVE-2011-1740 Date Updated: 2024-08-06T22:37:25.674Z Date Published: 2011-09-17T10:00:00 Description: EMC Avamar 4.x, 5.0.x, and 6.0.x before 6.0.0-592 allows remote authenticated users to modify client data or obtain sensitive information about product activities by leveraging privileged access to a different domain. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2011-09/0076.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/69760 - http://secunia.com/advisories/46002 - http://securitytracker.com/id?1026035 - http://secunia.com/advisories/45988 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37761.
CVE ID: CVE-2021-37761 Date Updated: 2024-08-04T01:30:07.487Z Date Published: 2021-09-27T16:23:04 Description: Zoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to unrestricted file upload, leading to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.manageengine.com - https://www.manageengine.com/products/ad-manager/release-notes.html#7111 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20048.
CVE ID: CVE-2021-20048 Date Updated: 2024-08-03T17:30:06.959Z Date Published: 2022-01-07T03:00:12 Description: A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0028 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6565.
CVE ID: CVE-2012-6565 Date Updated: 2024-09-17T02:31:59.530Z Date Published: 2013-06-17T10:00:00Z Description: Cross-site scripting (XSS) vulnerability in REDCap before 4.14.3 allows remote authenticated users to inject arbitrary web script or HTML via uppercase characters in JavaScript events within user-defined labels. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ctsi.psu.edu/wp-content/uploads/2013/03/REDCap-Release-Notes-Version5.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5280.
CVE ID: CVE-2016-5280 Date Updated: 2024-08-06T00:53:48.918Z Date Published: 2016-09-22T22:00:00 Description: Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via bidirectional text. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1289970 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - http://www.mozilla.org/security/announce/2016/mfsa2016-85.html - https://www.mozilla.org/security/advisories/mfsa2016-86/ - http://www.debian.org/security/2016/dsa-3674 - https://security.gentoo.org/glsa/201701-15 - http://rhn.redhat.com/errata/RHSA-2016-1912.html - https://www.mozilla.org/security/advisories/mfsa2016-88/ - http://www.securityfocus.com/bid/93049 - http://www.securitytracker.com/id/1036852 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0928.
CVE ID: CVE-2015-0928 Date Updated: 2024-08-06T04:26:11.436Z Date Published: 2017-08-28T15:00:00 Description: libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://redmine.openinfosecfoundation.org/issues/1272 - http://www.securityfocus.com/bid/73117 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0370.
CVE ID: CVE-2016-0370 Date Updated: 2024-08-05T22:15:24.424Z Date Published: 2016-09-01T01:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM Forms Experience Builder 8.5.x and 8.6.x before 8.6.3 allows remote authenticated users to inject arbitrary web script or HTML via crafted input to an application that was built with this product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21988726 - http://www-01.ibm.com/support/docview.wss?uid=swg1LO88449 - http://www.securityfocus.com/bid/92471 - http://www-01.ibm.com/support/docview.wss?uid=swg1LO88451 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6365.
CVE ID: CVE-2016-6365 Date Updated: 2024-08-06T01:29:19.140Z Date Published: 2016-08-23T01:00:00 Description: Cross-site scripting (XSS) vulnerability in Cisco Firepower Management Center 4.10.3, 5.2.0, 5.3.0, 5.3.0.2, 5.3.1, and 5.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCur25508 and CSCur25518. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-firepowermc - http://www.securityfocus.com/bid/92510 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0452.
CVE ID: CVE-2020-0452 Date Updated: 2024-08-04T06:02:51.976Z Date Published: 2020-11-10T12:50:04 Description: In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2020-11-01 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7/ - https://security.gentoo.org/glsa/202011-19 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8830.
CVE ID: CVE-2016-8830 Date Updated: 2017-01-03T19:57:01 Date Published: 2017-01-03T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6962.
CVE ID: CVE-2016-6962 Date Updated: 2024-08-06T01:43:38.839Z Date Published: 2016-10-13T19:00:00 Description: Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - http://www.securityfocus.com/bid/93491 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15605.
CVE ID: CVE-2019-15605 Date Updated: 2024-08-05T00:49:13.764Z Date Published: 2020-02-07T14:55:22 Description: HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/ - https://access.redhat.com/errata/RHSA-2020:0573 - https://access.redhat.com/errata/RHSA-2020:0579 - https://access.redhat.com/errata/RHSA-2020:0597 - https://access.redhat.com/errata/RHSA-2020:0598 - https://access.redhat.com/errata/RHSA-2020:0602 - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html - https://access.redhat.com/errata/RHSA-2020:0703 - https://access.redhat.com/errata/RHSA-2020:0707 - https://access.redhat.com/errata/RHSA-2020:0708 - https://security.gentoo.org/glsa/202003-48 - https://www.debian.org/security/2020/dsa-4669 - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com//security-alerts/cpujul2021.html - https://nodejs.org/en/blog/release/v13.8.0/ - https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/ - https://nodejs.org/en/blog/release/v10.19.0/ - https://nodejs.org/en/blog/release/v12.15.0/ - https://security.netapp.com/advisory/ntap-20200221-0004/ - https://hackerone.com/reports/735748 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14494.
CVE ID: CVE-2017-14494 Date Updated: 2024-08-05T19:27:40.722Z Date Published: 2017-10-02T21:00:00 Description: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039474 - https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq - http://www.debian.org/security/2017/dsa-3989 - https://access.redhat.com/security/vulnerabilities/3199382 - http://www.securityfocus.com/bid/101085 - http://www.ubuntu.com/usn/USN-3430-1 - http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=33e3f1029c9ec6c63e430ff51063a6301d4b2262 - https://www.kb.cert.org/vuls/id/973527 - https://security.gentoo.org/glsa/201710-27 - http://www.ubuntu.com/usn/USN-3430-2 - https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html - https://access.redhat.com/errata/RHSA-2017:2836 - http://nvidia.custhelp.com/app/answers/detail/a_id/4561 - http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt - https://access.redhat.com/errata/RHSA-2017:2837 - https://www.exploit-db.com/exploits/42944/ - http://thekelleys.org.uk/dnsmasq/CHANGELOG - http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html - https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html - https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0159.
CVE ID: CVE-2008-0159 Date Updated: 2024-08-07T07:32:23.949Z Date Published: 2008-01-09T00:00:00 Description: SQL injection vulnerability in index.php in eggBlog 3.1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the eggblogpassword parameter in a cookie. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27168 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39473 - http://secunia.com/advisories/28371 - https://www.exploit-db.com/exploits/4860 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25567.
CVE ID: CVE-2023-25567 Date Updated: 2024-08-02T11:25:19.291Z Date Published: 2023-02-14T17:35:59.571Z Description: GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that implements NTLM authentication, has an out-of-bounds read when decoding target information prior to version 1.2.0. The length of the `av_pair` is not checked properly for two of the elements which can trigger an out-of-bound read. The out-of-bounds read can be triggered via the main `gss_accept_sec_context` entry point and could cause a denial-of-service if the memory is unmapped. The issue is fixed in version 1.2.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-24pf-6prf-24ch - https://github.com/gssapi/gss-ntlmssp/commit/025fbb756d44ffee8f847db4222ed6aa4bd1fbe4 - https://github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3962.
CVE ID: CVE-2013-3962 Date Updated: 2024-09-17T00:40:40.473Z Date Published: 2013-10-01T19:00:00Z Description: Cross-site scripting (XSS) vulnerability in Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models before firmware 1.0.4.44, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2013/Jun/84 - http://www.grandstream.com/firmware/BETATEST/GXV35xx_GXV36xx_H/Release_Note_GXV35xx_GXV36xx_H1.0.4.44.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40163.
CVE ID: CVE-2023-40163 Date Updated: 2024-09-24T19:27:24.014Z Date Published: 2023-09-25T15:22:32.584Z Description: An out-of-bounds write vulnerability exists in the allocate_buffer_for_jpeg_decoding functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14846.
CVE ID: CVE-2020-14846 Date Updated: 2024-09-26T20:12:05.032Z Date Published: 2020-10-21T14:04:28 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuoct2020.html - https://security.netapp.com/advisory/ntap-20201023-0003/ - https://security.gentoo.org/glsa/202105-27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12159.
CVE ID: CVE-2018-12159 Date Updated: 2024-09-16T19:52:21.857Z Date Published: 2019-02-18T17:00:00Z Description: Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33450.
CVE ID: CVE-2024-33450 Date Updated: 2024-08-22T21:08:14.956Z Date Published: N/A Description: SQL Injection in Finereport v.8.0 allows a remote attacker to obtain sensitive information No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/DKGIXL/1c8bddeb6c5f083ccc3a7bcecfe40398 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4319.
CVE ID: CVE-2013-4319 Date Updated: 2024-08-06T16:38:01.983Z Date Published: 2013-10-11T22:00:00Z Description: pbs_mom in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x, 4.x, and earlier does not properly restrict access by unprivileged ports, which allows remote authenticated users to execute arbitrary jobs by submitting a command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2013/09/09/11 - http://www.debian.org/security/2013/dsa-2770 - http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html - http://www.openwall.com/lists/oss-security/2013/09/09/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20443.
CVE ID: CVE-2022-20443 Date Updated: 2024-08-03T02:10:44.939Z Date Published: 2023-06-28T00:00:00 Description: In hasInputInfo of Layer.cpp, there is a possible bypass of user interaction requirements due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194480991 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21406.
CVE ID: CVE-2024-21406 Date Updated: 2024-08-01T22:20:40.566Z Date Published: 2024-02-13T18:02:47.978Z Description: Windows Printing Service Spoofing Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39246.
CVE ID: CVE-2022-39246 Date Updated: 2024-08-03T12:00:43.348Z Date Published: 2022-09-28T20:00:19 Description: matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the key forwarding strategy implemented in the matrix-android-sdk2 that is too permissive. Starting with version 1.5.1, the default policy for accepting key forwards has been made more strict in the matrix-android-sdk2. The matrix-android-sdk2 will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately (for example, by showing a warning for such messages). As a workaroubnd, current users of the SDK can disable key forwarding in their forks using `CryptoService#enableKeyGossiping(enable: Boolean)`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matrix-org/matrix-spec-proposals/pull/3061 - https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-2pvj-p485-cp3m - https://github.com/matrix-org/matrix-android-sdk2/commit/77df720a238d17308deab83ecaa37f7a4740a17e - https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.5.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2594.
CVE ID: CVE-2016-2594 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1869.
CVE ID: CVE-2012-1869 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17059.
CVE ID: CVE-2019-17059 Date Updated: 2024-08-05T01:33:16.816Z Date Published: 2019-10-11T16:45:57 Description: A shell injection vulnerability on the Sophos Cyberoam firewall appliance with CyberoamOS before 10.6.6 MR-6 allows remote attackers to execute arbitrary commands via the Web Admin and SSL VPN consoles. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://community.sophos.com/products/cyberoamos/ - https://community.sophos.com/kb/en-us/134732 - https://thebestvpn.com/cyberoam-preauth-rce/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35712.
CVE ID: CVE-2022-35712 Date Updated: 2024-09-17T03:37:49.019Z Date Published: 2022-10-14T19:42:55.733799Z Description: Adobe ColdFusion versions Update 14 (and earlier) and Update 4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, the vulnerability is triggered when a crafted network packet is sent to the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/coldfusion/apsb22-44.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30671.
CVE ID: CVE-2022-30671 Date Updated: 2024-09-16T19:51:26.097Z Date Published: 2022-09-16T17:20:14.098808Z Description: Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/indesign/apsb22-50.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14679.
CVE ID: CVE-2019-14679 Date Updated: 2024-08-05T00:19:41.403Z Date Published: 2019-08-08T20:00:39 Description: core/views/arprice_import_export.php in the ARPrice Lite plugin 2.2 for WordPress allows wp-admin/admin.php?page=arplite_import_export CSRF. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.pluginvulnerabilities.com/2019/07/11/cross-site-request-forgery-csrf-vulnerability-in-arprice-lite/ - https://wordpress.org/plugins/arprice-responsive-pricing-table/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2557.
CVE ID: CVE-2023-2557 Date Updated: 2024-08-02T06:26:09.368Z Date Published: 2023-06-09T05:33:35.241Z Description: The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save function in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to edit an arbitrary custom drop-down currency switcher. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c79242-5c89-40c0-abcc-c112f7a64a74?source=cve - https://plugins.trac.wordpress.org/changeset/2911049/currency-switcher No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3685.
CVE ID: CVE-2010-3685 Date Updated: 2024-09-16T23:40:40.981Z Date Published: 2010-09-29T16:00:00Z Description: The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupal.org/node/880480 - http://www.debian.org/security/2010/dsa-2113 - http://marc.info/?l=oss-security&m=128440896914512&w=2 - http://www.securityfocus.com/bid/42388 - http://drupal.org/node/880476 - http://marc.info/?l=oss-security&m=128418560705305&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1283.
CVE ID: CVE-2020-1283 Date Updated: 2024-08-04T06:31:59.948Z Date Published: 2020-06-09T19:43:53 Description: A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1283 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3166.
CVE ID: CVE-2014-3166 Date Updated: 2024-08-06T10:35:56.615Z Date Published: 2014-08-13T01:00:00 Description: The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://src.chromium.org/viewvc/chrome?revision=286598&view=revision - http://secunia.com/advisories/59693 - http://www.ietf.org/mail-archive/web/tls/current/msg13345.html - http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html - http://secunia.com/advisories/59904 - http://secunia.com/advisories/60685 - https://src.chromium.org/viewvc/chrome?revision=288435&view=revision - http://security.gentoo.org/glsa/glsa-201408-16.xml - http://secunia.com/advisories/60798 - https://code.google.com/p/chromium/issues/detail?id=398925 - http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html - http://www.securityfocus.com/bid/69202 - http://www.debian.org/security/2014/dsa-3039 - http://googlechromereleases.blogspot.com/2014/08/chrome-for-ios-update.html - http://www.securitytracker.com/id/1030732 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7029.
CVE ID: CVE-2017-7029 Date Updated: 2024-08-05T15:49:02.715Z Date Published: 2017-07-20T16:00:00 Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207924 - https://support.apple.com/HT207925 - https://support.apple.com/HT207923 - http://www.securityfocus.com/bid/99883 - http://www.securitytracker.com/id/1038950 - https://support.apple.com/HT207922 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27937.
CVE ID: CVE-2020-27937 Date Updated: 2024-08-04T16:25:43.970Z Date Published: 2021-04-02T17:35:04 Description: A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to access private information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT211931 - https://support.apple.com/en-us/HT212147 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0025.
CVE ID: CVE-2023-0025 Date Updated: 2024-08-02T04:54:32.567Z Date Published: 2023-02-14T03:10:47.861Z Description: SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/3267442 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.