instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
---|---|---|
Provide detailed information about CVE-2009-4243. | CVE ID: CVE-2009-4243
Date Updated: 2024-08-07T06:54:10.171Z
Date Published: 2010-01-25T19:00:00
Description:
RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allow remote attackers to have an unspecified impact via a crafted media file that uses HTTP chunked transfer coding, related to an "overflow."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2010/0178
- http://securitytracker.com/id?1023489
- http://service.real.com/realplayer/security/01192010_player/en/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55796
- http://osvdb.org/61967
- http://secunia.com/advisories/38218
- http://www.securityfocus.com/bid/37880
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-0243. | CVE ID: CVE-2018-0243
Date Updated: 2024-08-05T03:21:14.484Z
Date Published: 2018-04-19T20:00:00
Description:
A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a configured file action policy that is intended to drop the Server Message Block Version 2 (SMB2) and SMB Version 3 (SMB3) protocols if malware is detected. The vulnerability is due to incorrect detection of an SMB2 or SMB3 file based on the total file length. An attacker could exploit this vulnerability by sending a crafted SMB2 or SMB3 transfer request through the targeted device. An exploit could allow the attacker to pass SMB2 or SMB3 files that could be malware even though the device is configured to block them. This vulnerability does not exist for SMB Version 1 (SMB1) files. This vulnerability affects Cisco Firepower System Software when one or more file action policies are configured, on software releases prior to 6.2.3. Cisco Bug IDs: CSCvg68807.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/103943
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fss
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-24150. | CVE ID: CVE-2022-24150
Date Updated: 2024-08-03T04:07:00.997Z
Date Published: 2022-02-04T01:33:17
Description:
Tenda AX3 v16.03.12.10_CN was discovered to contain a command injection vulnerability in the function formSetSafeWanWebMan. This vulnerability allows attackers to execute arbitrary commands via the remoteIp parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_15/15.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-6630. | CVE ID: CVE-2017-6630
Date Updated: 2024-08-05T15:33:20.539Z
Date Published: 2017-05-22T01:00:00
Description:
A vulnerability in the Session Initiation Protocol (SIP) implementation of Cisco IP Phone 8851 11.0(0.1) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an abnormal SIP message. An attacker could exploit this vulnerability by manipulating the CANCEL packet. An exploit could allow the attacker to cause a disruption of service to the phone. Cisco Bug IDs: CSCvc34795.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038511
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-sip
- http://www.securityfocus.com/bid/98533
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-24471. | CVE ID: CVE-2022-24471
Date Updated: 2024-08-03T04:13:55.600Z
Date Published: 2022-03-09T17:07:55
Description:
Azure Site Recovery Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24471
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-2148. | CVE ID: CVE-2012-2148
Date Updated: 2024-08-06T19:26:07.739Z
Date Published: 2019-12-06T17:35:12
Description:
An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security-tracker.debian.org/tracker/CVE-2012-2148
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2148
- https://access.redhat.com/security/cve/cve-2012-2148
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-47507. | CVE ID: CVE-2023-47507
Date Updated: 2024-08-02T21:09:37.204Z
Date Published: 2023-12-20T13:25:07.448Z
Description:
Deserialization of Untrusted Data vulnerability in Master Slider Master Slider Pro.This issue affects Master Slider Pro: from n/a through 3.6.5.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/masterslider/wordpress-master-slider-pro-plugin-3-6-5-php-object-injection-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-6846. | CVE ID: CVE-2019-6846
Date Updated: 2024-08-04T20:31:04.392Z
Date Published: 2019-10-29T14:51:31
Description:
A CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause information disclosure when using the FTP protocol.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-23195. | CVE ID: CVE-2021-23195
Date Updated: 2024-08-03T19:05:54.450Z
Date Published: 2022-01-21T18:17:38
Description:
Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 has the option for automated indexing (directory listing) activated. When accessing a directory, a web server delivers its entire content in HTML form. If an index file does not exist and directory listing is enabled, all content of the directory will be displayed, allowing an attacker to identify and access files on the server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-24520. | CVE ID: CVE-2021-24520
Date Updated: 2024-08-03T19:35:19.820Z
Date Published: 2021-08-09T10:04:14
Description:
The Stock in & out WordPress plugin through 1.0.4 lacks proper sanitization before passing variables to an SQL request, making it vulnerable to SQL Injection attacks. Users with a role of contributor or higher can exploit this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pang0lin/CVEproject/blob/main/wordpress_Stock-in-and-out_sqli.md
- https://wpscan.com/vulnerability/f903aadd-17af-4ddf-8635-abb3338ac815
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-9864. | CVE ID: CVE-2019-9864
Date Updated: 2024-08-04T22:01:55.137Z
Date Published: 2019-03-28T14:18:03
Description:
PHP Scripts Mall Amazon Affiliate Store 2.1.6 allows Parameter Tampering of the payment amount.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackingvila.wordpress.com/2019/03/19/php-scripts-mall-amazon-affiliate-store-2-1-6-allows-parameter-tampering-of-the-payment-amountcve-2019-9864/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-22463. | CVE ID: CVE-2024-22463
Date Updated: 2024-08-01T22:43:34.945Z
Date Published: 2024-03-04T13:18:26.832Z
Description:
Dell PowerScale OneFS 8.2.x through 9.6.0.x contains a use of a broken or risky cryptographic algorithm vulnerability. A remote unprivileged attacker could potentially exploit this vulnerability, leading to compromise of confidentiality and integrity of sensitive information
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-28298. | CVE ID: CVE-2024-28298
Date Updated: 2024-08-23T15:36:43.809Z
Date Published: 2024-08-02T00:00:00
Description:
SQL injection vulnerability in BM SOFT BMPlanning 1.0.0.1 allows authenticated users to execute arbitrary SQL commands via the SEC_IDF, LIE_IDF, PLANF_IDF, CLI_IDF, DOS_IDF, and possibly other parameters to /BMServerR.dll/BMRest.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.e-bmsoft.com/
- https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2024-28298_BMPlanning%28BM-Soft%29_Authenticated%20SQLI.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-1098. | CVE ID: CVE-2012-1098
Date Updated: 2024-08-06T18:45:27.165Z
Date Published: 2012-03-13T10:00:00
Description:
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html
- http://www.openwall.com/lists/oss-security/2012/03/03/1
- https://bugzilla.redhat.com/show_bug.cgi?id=799275
- http://www.openwall.com/lists/oss-security/2012/03/02/6
- http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain
- http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-23130. | CVE ID: CVE-2024-23130
Date Updated: 2024-08-01T22:59:30.563Z
Date Published: 2024-02-22T03:33:55.872Z
Description:
A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-2347. | CVE ID: CVE-2009-2347
Date Updated: 2024-08-07T05:44:55.963Z
Date Published: 2009-07-14T20:16:00
Description:
Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/35817
- http://secunia.com/advisories/35866
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00663.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2347
- http://osvdb.org/55821
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00724.html
- http://www.vupen.com/english/advisories/2009/1870
- http://www.ocert.org/advisories/ocert-2009-012.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10988
- http://www.securitytracker.com/id?1022539
- http://www.vupen.com/english/advisories/2011/0621
- http://www.ubuntu.com/usn/USN-801-1
- http://secunia.com/advisories/35811
- http://secunia.com/advisories/35883
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- http://secunia.com/advisories/36194
- http://bugzilla.maptools.org/show_bug.cgi?id=2079
- http://www.securityfocus.com/archive/1/504892/100/0/threaded
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:150
- http://security.gentoo.org/glsa/glsa-200908-03.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51688
- http://secunia.com/advisories/35911
- http://article.gmane.org/gmane.linux.debian.devel.changes.unstable/178563/
- http://osvdb.org/55822
- http://www.redhat.com/support/errata/RHSA-2009-1159.html
- http://www.securityfocus.com/bid/35652
- http://www.debian.org/security/2009/dsa-1835
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:043
- http://secunia.com/advisories/50726
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-15893. | CVE ID: CVE-2019-15893
Date Updated: 2024-08-05T01:03:31.700Z
Date Published: 2019-10-16T12:40:35
Description:
Sonatype Nexus Repository Manager 2.x before 2.14.15 allows Remote Code Execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.sonatype.com/hc/en-us/articles/360035055794
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-3105. | CVE ID: CVE-2015-3105
Date Updated: 2024-08-06T05:39:31.089Z
Date Published: 2015-06-10T01:00:00
Description:
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
- http://www.securityfocus.com/bid/75086
- http://www.securitytracker.com/id/1032519
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html
- https://security.gentoo.org/glsa/201506-01
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html
- http://rhn.redhat.com/errata/RHSA-2015-1086.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-0427. | CVE ID: CVE-2017-0427
Date Updated: 2024-08-05T13:03:57.181Z
Date Published: 2017-02-08T15:00:00
Description:
An elevation of privilege vulnerability in the kernel file system could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31495866.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/96071
- http://www.securitytracker.com/id/1037798
- https://source.android.com/security/bulletin/2017-02-01.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-37204. | CVE ID: CVE-2022-37204
Date Updated: 2024-08-03T10:29:19.457Z
Date Published: 2022-09-20T16:58:31
Description:
Final CMS 5.1.0 is vulnerable to SQL Injection.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md
- https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-40022. | CVE ID: CVE-2023-40022
Date Updated: 2024-10-02T18:11:59.833Z
Date Published: 2023-08-24T22:50:57.457Z
Description:
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.6.0 and prior are vulnerable to integer overflow in `consume_count` of `src/gnu_v2/cplus-dem.c`. The overflow check is valid logic but, is missing the modulus if the block once compiled. The compiler sees this block as unreachable code since the prior statement is multiplication by 10 and fails to consider overflow assuming the count will always be a multiple of 10. Rizin version 0.6.1 contains a fix for the issue. A temporary workaround would be disabling C++ demangling using the configuration option `bin.demangle=false`.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/rizinorg/rizin/security/advisories/GHSA-92h6-wwc2-53cq
- https://github.com/rizinorg/rizin/pull/3753
- https://github.com/rizinorg/rz-libdemangle/pull/54
- https://github.com/rizinorg/rz-libdemangle/commit/51d016750e704b27ab8ace23c0f72acabca67018
- https://github.com/rizinorg/rz-libdemangle/blob/main/src/gnu_v2/cplus-dem.c#L419
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-5689. | CVE ID: CVE-2016-5689
Date Updated: 2024-08-06T01:07:59.904Z
Date Published: 2016-12-13T15:00:00
Description:
The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/91283
- https://blog.fuzzing-project.org/46-Various-invalid-memory-reads-in-ImageMagick-WPG%2C-DDS%2C-DCM.html
- https://github.com/ImageMagick/ImageMagick/commit/5511ef530576ed18fd636baa3bb4eda3d667665d
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://github.com/ImageMagick/ImageMagick/blob/7.0.1-7/ChangeLog
- https://github.com/ImageMagick/ImageMagick/blob/6.9.4-5/ChangeLog
- http://www.openwall.com/lists/oss-security/2016/06/17/3
- http://www.openwall.com/lists/oss-security/2016/06/14/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-1000885. | CVE ID: CVE-2018-1000885
Date Updated: 2024-09-16T17:18:19.765Z
Date Published: 2018-12-20T20:00:00Z
Description:
PHKP version including commit 88fd9cfdf14ea4b6ac3e3967feea7bcaabb6f03b contains a Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in function pgp_exec() phkp.php:98 that can result in It is possible to manipulate gpg-keys or execute commands remotely. This attack appear to be exploitable via HKP-Api: /pks/lookup?search.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tech.feedyourhead.at/content/full-disclosure-remote-command-execution-in-phkp
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-42954. | CVE ID: CVE-2023-42954
Date Updated: 2024-08-27T19:43:48.253Z
Date Published: 2024-03-21T22:24:36.922Z
Description:
A privilege escalation issue existed in FileMaker Server, potentially exposing sensitive information to front-end websites when signed in to the Admin Console with an administrator role. This issue has been fixed in FileMaker Server 20.3.1 by reducing the information sent in requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.claris.com/s/answerview?anum=000041424&language=en_US
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-30730. | CVE ID: CVE-2023-30730
Date Updated: 2024-09-26T15:52:23.943Z
Date Published: 2023-09-06T03:12:16.839Z
Description:
Implicit intent hijacking vulnerability in Camera prior to versions 11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13 allows local attacker to access specific file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-20692. | CVE ID: CVE-2020-20692
Date Updated: 2024-08-04T14:22:25.457Z
Date Published: 2021-09-27T21:34:17
Description:
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://test.lingdong.store/2019/10/13/SQL-injection-in-Gila-CMS-version-1-11-4/
- https://github.com/GilaCMS/gila/issues/50
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-9020. | CVE ID: CVE-2015-9020
Date Updated: 2024-08-06T08:36:31.496Z
Date Published: 2017-06-13T20:00:00
Description:
In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in the unlocking of memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2017-06-01
- http://www.securityfocus.com/bid/98874
- http://www.securitytracker.com/id/1038623
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-14901. | CVE ID: CVE-2018-14901
Date Updated: 2024-08-05T09:46:24.675Z
Date Published: 2018-08-30T17:00:00
Description:
The EPSON iPrint application 6.6.3 for Android contains hard-coded API and Secret keys for the Dropbox, Box, Evernote and OneDrive services.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vdalabs.com/2018/08/26/epson-printer-vulnerabilities/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-0921. | CVE ID: CVE-2008-0921
Date Updated: 2024-08-07T08:01:40.074Z
Date Published: 2008-02-22T23:00:00
Description:
SQL injection vulnerability in news.php in beContent 0.3.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/29061
- http://www.securityfocus.com/bid/27928
- https://www.exploit-db.com/exploits/5170
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-12281. | CVE ID: CVE-2017-12281
Date Updated: 2024-08-05T18:36:54.527Z
Date Published: 2017-11-02T16:00:00
Description:
A vulnerability in the implementation of Protected Extensible Authentication Protocol (PEAP) functionality for standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points could allow an unauthenticated, adjacent attacker to bypass authentication and connect to an affected device. The vulnerability exists because the affected device uses an incorrect default configuration setting of fail open when running in standalone mode. An attacker could exploit this vulnerability by attempting to connect to an affected device. A successful exploit could allow the attacker to bypass authentication and connect to the affected device. This vulnerability affects Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running a vulnerable software release and use WLAN configuration settings that include FlexConnect local switching and central authentication with MAC filtering. Cisco Bug IDs: CSCvd46314.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/101649
- http://www.securitytracker.com/id/1039725
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-3773. | CVE ID: CVE-2008-3773
Date Updated: 2024-08-07T09:52:59.280Z
Date Published: 2008-08-22T16:00:00
Description:
Cross-site scripting (XSS) vulnerability in vBulletin 3.7.2 PL1 and 3.6.10 PL3, when "Show New Private Message Notification Pop-Up" is enabled, allows remote authenticated users to inject arbitrary web script or HTML via a private message subject (aka newpm[title]).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/30777
- http://secunia.com/advisories/31552
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44576
- http://www.vbulletin.com/forum/showthread.php?t=282133
- http://www.securitytracker.com/id?1020727
- http://securityreason.com/securityalert/4182
- http://www.coresecurity.com/content/vbulletin-cross-site-scripting-vulnerability
- http://marc.info/?l=bugtraq&m=121933258013788&w=2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-1953. | CVE ID: CVE-2010-1953
Date Updated: 2024-08-07T02:17:14.220Z
Date Published: 2010-05-18T19:00:00
Description:
Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/39551
- http://www.exploit-db.com/exploits/12288
- http://secunia.com/advisories/39530
- http://www.vupen.com/english/advisories/2010/0927
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-0814. | CVE ID: CVE-2020-0814
Date Updated: 2024-08-04T06:18:03.088Z
Date Published: 2020-03-12T15:48:27
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0779, CVE-2020-0798, CVE-2020-0842, CVE-2020-0843.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0814
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-14741. | CVE ID: CVE-2018-14741
Date Updated: 2024-08-05T09:38:13.454Z
Date Published: 2018-07-29T18:00:00
Description:
An issue was discovered in libpbc.a in cloudwu PBC through 2017-03-02. A SEGV can occur in pbc_pattern_pack in pattern.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/cloudwu/pbc/issues/122#issuecomment-407367289
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-37825. | CVE ID: CVE-2024-37825
Date Updated: 2024-08-02T03:57:39.985Z
Date Published: 2024-06-24T00:00:00
Description:
An issue in EnvisionWare Computer Access & Reservation Control SelfCheck v1.0 (fixed in OneStop 3.2.0.27184 Hotfix May 2024) allows unauthenticated attackers on the same network to perform a directory traversal.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.envisionware.com/?lang=au
- https://www.envisionware.com/pcres/?lang=au
- https://gist.github.com/J0rdanis99/74ae1ee2f9777cdd1c9756f958064d7c
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-34020. | CVE ID: CVE-2023-34020
Date Updated: 2024-08-02T15:54:14.205Z
Date Published: 2024-03-27T13:24:44.296Z
Description:
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Uncanny Owl Uncanny Toolkit for LearnDash.This issue affects Uncanny Toolkit for LearnDash: from n/a through 3.6.4.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/uncanny-learndash-toolkit/wordpress-uncanny-toolkit-for-learndash-plugin-3-6-4-3-open-redirection-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-3784. | CVE ID: CVE-2013-3784
Date Updated: 2024-08-06T16:22:00.943Z
Date Published: 2013-07-17T10:00:00
Description:
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors Time and Labor.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/61240
- http://osvdb.org/95294
- http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
- http://secunia.com/advisories/54232
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85681
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0420. | CVE ID: CVE-2013-0420
Date Updated: 2024-08-06T14:25:10.297Z
Date Published: 2013-01-17T01:30:00
Description:
Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html
- http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
- https://www.virtualbox.org/changeset/44055/vbox
- https://bugzilla.novell.com/show_bug.cgi?id=798776
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-45088. | CVE ID: CVE-2022-45088
Date Updated: 2024-08-03T14:01:31.505Z
Date Published: 2023-02-08T18:50:07.000Z
Description:
Improper Input Validation vulnerability in Group Arge Energy and Control Systems Smartpower Web allows PHP Local File Inclusion.This issue affects Smartpower Web: before 23.01.01.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.usom.gov.tr/bildirim/tr-23-0066
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-41556. | CVE ID: CVE-2023-41556
Date Updated: 2024-10-01T19:40:15.233Z
Date Published: 2023-08-30T00:00:00
Description:
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetIpMacBind.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/peris-navince/founded-0-days/blob/main/fromSetIpMacBind/1.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-50433. | CVE ID: CVE-2023-50433
Date Updated: 2024-08-02T22:16:46.606Z
Date Published: 2024-04-29T00:00:00
Description:
marshall in dhcp_packet.c in simple-dhcp-server through ec976d2 allows remote attackers to cause a denial of service by sending a malicious DHCP packet. The crash is caused by a type confusion bug that results in a large memory allocation; when this memory allocation fails the DHCP server will crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://papers.mathyvanhoef.com/esorics2024.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-5645. | CVE ID: CVE-2015-5645
Date Updated: 2024-08-06T06:59:04.293Z
Date Published: 2015-10-03T10:00:00
Description:
ICZ MATCHA SNS before 1.3.7 allows remote authenticated users to obtain administrative privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN85118545/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000146
- http://oss.icz.co.jp/news/?p=1075
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-5588. | CVE ID: CVE-2016-5588
Date Updated: 2024-08-06T01:07:58.694Z
Date Published: 2016-10-25T14:00:00
Description:
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.5.1 through 8.5.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-5558, CVE-2016-5574, CVE-2016-5577, CVE-2016-5578, and CVE-2016-5579.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securitytracker.com/id/1037051
- http://www.securityfocus.com/bid/93748
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-10576. | CVE ID: CVE-2016-10576
Date Updated: 2024-09-17T01:21:20.514Z
Date Published: 2018-06-01T18:00:00Z
Description:
Fuseki server wrapper and management API in fuseki before 1.0.1 downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nodesecurity.io/advisories/278
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-2194. | CVE ID: CVE-2012-2194
Date Updated: 2024-08-06T19:26:08.955Z
Date Published: 2012-07-25T10:00:00
Description:
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/49919
- http://www.securityfocus.com/bid/54487
- http://www-01.ibm.com/support/docview.wss?uid=swg21600837
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84711
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84019
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84716
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84714
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84715
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-18657. | CVE ID: CVE-2019-18657
Date Updated: 2024-08-05T01:54:14.471Z
Date Published: 2019-10-31T18:55:55
Description:
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ClickHouse/ClickHouse/pull/6466
- https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md
- https://github.com/ClickHouse/ClickHouse/pull/7526/files
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-7400. | CVE ID: CVE-2024-7400
Date Updated: 2024-09-27T18:54:39.099Z
Date Published: 2024-09-27T07:02:28.931Z
Description:
The vulnerability potentially allowed an attacker to misuse ESET’s file operations during the removal of a detected file on the Windows operating system to delete files without having proper permissions to do so.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.eset.com/en/ca8726-local-privilege-escalation-fixed-for-vulnerability-during-detected-file-removal-in-eset-products-for-windows
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-23922. | CVE ID: CVE-2020-23922
Date Updated: 2024-08-04T15:05:11.276Z
Date Published: 2021-04-21T17:41:06
Description:
An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceforge.net/p/giflib/bugs/151/
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://cwe.mitre.org/data/definitions/126.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-4148. | CVE ID: CVE-2021-4148
Date Updated: 2024-08-03T17:16:04.195Z
Date Published: 2022-03-23T19:46:44
Description:
A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2026487
- https://lkml.org/lkml/2021/9/12/323
- https://lkml.org/lkml/2021/9/17/1037
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-0494. | CVE ID: CVE-2016-0494
Date Updated: 2024-08-05T22:22:55.218Z
Date Published: 2016-01-21T02:00:00
Description:
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
- http://www.securitytracker.com/id/1034715
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
- https://security.gentoo.org/glsa/201610-08
- http://www.ubuntu.com/usn/USN-2884-1
- http://www.debian.org/security/2016/dsa-3465
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.ubuntu.com/usn/USN-2885-1
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://rhn.redhat.com/errata/RHSA-2016-0049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
- http://rhn.redhat.com/errata/RHSA-2016-0053.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
- http://rhn.redhat.com/errata/RHSA-2016-0067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
- https://security.gentoo.org/glsa/201603-14
- http://rhn.redhat.com/errata/RHSA-2016-0057.html
- http://rhn.redhat.com/errata/RHSA-2016-0055.html
- http://rhn.redhat.com/errata/RHSA-2016-0054.html
- http://rhn.redhat.com/errata/RHSA-2016-0056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2016-0050.html
- http://www.debian.org/security/2016/dsa-3458
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-35990. | CVE ID: CVE-2023-35990
Date Updated: 2024-09-24T14:28:15.407Z
Date Published: 2023-09-26T20:14:46.575Z
Description:
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213938
- https://support.apple.com/en-us/HT213927
- https://support.apple.com/en-us/HT213940
- https://support.apple.com/en-us/HT213937
- http://seclists.org/fulldisclosure/2023/Oct/8
- http://seclists.org/fulldisclosure/2023/Oct/9
- http://seclists.org/fulldisclosure/2023/Oct/3
- http://seclists.org/fulldisclosure/2023/Oct/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-34870. | CVE ID: CVE-2022-34870
Date Updated: 2024-08-03T09:22:10.732Z
Date Published: 2022-10-25T00:00:00
Description:
Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/zltlr7f2ymr2m6jj54k4z0c4foos5fwx
- http://www.openwall.com/lists/oss-security/2022/10/24/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-27375. | CVE ID: CVE-2023-27375
Date Updated: 2024-09-25T11:50:23.158Z
Date Published: 2023-10-25T10:18:27.738Z
Description:
Missing authentication in the StudentPopupDetails_ContactDetails method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.themissinglink.com.au/security-advisories/cve-2023-27375
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-4694. | CVE ID: CVE-2019-4694
Date Updated: 2024-09-16T23:15:33.856Z
Date Published: 2020-08-26T19:00:39.305436Z
Description:
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 171832.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6320835
- https://exchange.xforce.ibmcloud.com/vulnerabilities/171832
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-12012. | CVE ID: CVE-2020-12012
Date Updated: 2024-08-04T11:48:57.903Z
Date Published: 2020-06-29T13:54:53
Description:
Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.us-cert.gov/ics/advisories/icsma-20-170-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-3554. | CVE ID: CVE-2021-3554
Date Updated: 2024-09-16T20:03:20.270Z
Date Published: 2021-11-24T14:45:12.904727Z
Description:
Improper Access Control vulnerability in the patchesUpdate API as implemented in Bitdefender Endpoint Security Tools for Linux as a relay role allows an attacker to manipulate the remote address used for pulling patches. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.bitdefender.com/support/security-advisories/improper-access-control-vulnerability-patchesupdate-api-va-9825
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-21486. | CVE ID: CVE-2021-21486
Date Updated: 2024-08-03T18:16:23.023Z
Date Published: 2021-03-09T14:07:48
Description:
SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107
- https://launchpad.support.sap.com/#/notes/3007888
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-3467. | CVE ID: CVE-2010-3467
Date Updated: 2024-08-07T03:11:44.275Z
Date Published: 2010-09-17T19:00:00
Description:
SQL injection vulnerability in modules/sections/index.php in E-Xoopport Samsara 3.1 and earlier, when the Tutorial module is enabled, allows remote attackers to execute arbitrary SQL commands via the secid parameter in a listarticles action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.exploit-db.com/exploits/15004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61808
- http://packetstormsecurity.org/1009-exploits/exoopport-sql.txt
- http://secunia.com/advisories/41397
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-2884. | CVE ID: CVE-2016-2884
Date Updated: 2024-08-05T23:40:13.799Z
Date Published: 2016-11-30T20:00:00
Description:
Cross-site request forgery (CSRF) vulnerability in IBM Forms Experience Builder 8.5.x and 8.6.x before 8.6.3.1, in an unspecified non-default configuration, allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21987252
- http://www-01.ibm.com/support/docview.wss?uid=swg1LO89686
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-4739. | CVE ID: CVE-2017-4739
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-12987. | CVE ID: CVE-2017-12987
Date Updated: 2024-08-05T18:51:07.396Z
Date Published: 2017-09-14T06:00:00
Description:
The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201709-23
- https://support.apple.com/HT208221
- http://www.debian.org/security/2017/dsa-3971
- http://www.securitytracker.com/id/1039307
- https://github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3
- https://github.com/the-tcpdump-group/tcpdump/commit/2ecb9d2c67d9119250c54811a6ce4d0f2ddf44f1
- http://www.tcpdump.org/tcpdump-changes.txt
- https://access.redhat.com/errata/RHEA-2018:0705
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-6441. | CVE ID: CVE-2016-6441
Date Updated: 2024-08-06T01:29:20.144Z
Date Published: 2016-11-03T21:00:00
Description:
A vulnerability in the Transaction Language 1 (TL1) code of Cisco ASR 900 Series routers could allow an unauthenticated, remote attacker to cause a reload of, or remotely execute code on, the affected system. This vulnerability affects Cisco ASR 900 Series Aggregation Services Routers (ASR902, ASR903, and ASR907) that are running the following releases of Cisco IOS XE Software: 3.17.0S 3.17.1S 3.17.2S 3.18.0S 3.18.1S. More Information: CSCuy15175. Known Affected Releases: 15.6(1)S 15.6(2)S. Known Fixed Releases: 15.6(1)S2.12 15.6(1.17)S0.41 15.6(1.17)SP 15.6(2)SP 16.4(0.183) 16.5(0.10).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1
- http://www.securityfocus.com/bid/94072
- http://www.securitytracker.com/id/1037179
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-0719. | CVE ID: CVE-2023-0719
Date Updated: 2024-08-02T05:17:50.340Z
Date Published: 2023-02-07T22:56:45.358Z
Description:
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760
- https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail=
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-26002. | CVE ID: CVE-2022-26002
Date Updated: 2024-09-17T04:18:53.154Z
Date Published: 2022-05-12T17:01:37.845494Z
Description:
A stack-based buffer overflow vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-22479. | CVE ID: CVE-2021-22479
Date Updated: 2024-08-03T18:44:13.493Z
Date Published: 2022-02-25T18:10:59
Description:
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-26228. | CVE ID: CVE-2020-26228
Date Updated: 2024-08-04T15:56:03.135Z
Date Published: 2020-11-23T21:10:16
Description:
TYPO3 is an open source PHP based web content management system. In TYPO3 before versions 9.5.23 and 10.4.10 user session identifiers were stored in cleartext - without processing with additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52
- https://typo3.org/security/advisory/typo3-core-sa-2020-011
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-6682. | CVE ID: CVE-2017-6682
Date Updated: 2024-08-05T15:33:20.465Z
Date Published: 2017-06-13T06:00:00
Description:
A vulnerability in the ConfD CLI of Cisco Elastic Services Controllers could allow an authenticated, remote attacker to run arbitrary commands as the Linux tomcat user on an affected system. More Information: CSCvc76620. Known Affected Releases: 2.2(9.76).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/98951
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-0852. | CVE ID: CVE-2023-0852
Date Updated: 2024-08-02T05:24:34.570Z
Date Published: 2023-05-11T00:00:00
Description:
Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.canon-europe.com/support/product-security-latest-news/
- https://psirt.canon/advisory-information/cp2023-001/
- https://canon.jp/support/support-info/230414vulnerability-response
- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-1646. | CVE ID: CVE-2012-1646
Date Updated: 2024-08-06T19:01:02.914Z
Date Published: 2012-09-25T23:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the FAQ module 6.x-1.x before 6.x-1.13 and 7.x-1.x-rc1 for Drupal allow remote authenticated users to inject arbitrary web script or HTML via the (1) title parameter in faq.admin.inc or (2) detailed_question parameter in faq.module.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://drupal.org/node/1451194
- http://drupalcode.org/project/faq.git/commit/912f1d2
- http://osvdb.org/79466
- http://secunia.com/advisories/48131
- http://www.securityfocus.com/bid/52126
- http://drupalcode.org/project/faq.git/blobdiff/525fb85e5a43cb6cfe3028aa88eaf8a6e40548d5..f381756:/faq.admin.inc
- http://www.openwall.com/lists/oss-security/2012/04/07/1
- http://drupalcode.org/project/faq.git/commit/f381756
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73452
- http://drupalcode.org/project/faq.git/blobdiff/2991dd94e70a2881571a4b777645f4dcc42c1f10..912f1d2:/faq.module
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-1433. | CVE ID: CVE-2011-1433
Date Updated: 2024-08-06T22:28:41.311Z
Date Published: 2011-03-18T16:00:00
Description:
The (1) AgentInterface and (2) CustomerInterface components in Open Ticket Request System (OTRS) before 3.0.6 place cleartext credentials into the session data in the database, which makes it easier for context-dependent attackers to obtain sensitive information by reading the _UserLogin and _UserPW fields.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.otrs.org/show_bug.cgi?id=6878
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66196
- http://source.otrs.org/viewvc.cgi/otrs/CHANGES?revision=1.1807
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-2005. | CVE ID: CVE-2010-2005
Date Updated: 2024-08-07T02:17:13.685Z
Date Published: 2010-05-20T21:00:00
Description:
Multiple PHP remote file inclusion vulnerabilities in DataLife Engine (DLE) 8.3 allow remote attackers to execute arbitrary PHP code via a URL in (1) the selected_language parameter to engine/inc/include/init.php, (2) the config[langs] parameter to engine/inc/help.php, (3) the config[lang] parameter to engine/ajax/pm.php, (4) and the _REQUEST[skin] parameter to engine/ajax/addcomments.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.packetstormsecurity.com/1001-exploits/datalifeengine83-rfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55757
- http://www.securityfocus.com/bid/37851
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-48466. | CVE ID: CVE-2023-48466
Date Updated: 2024-08-02T21:30:35.314Z
Date Published: 2023-12-15T10:15:39.044Z
Description:
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the MITRE ATT&CK technique T1499.004 | The MITRE ATT&CK technique T1499.004: Application or System Exploitation is related to the vulnerability CVE-CVE-2019-11869. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized. |
Provide detailed information about CVE-2021-24502. | CVE ID: CVE-2021-24502
Date Updated: 2024-08-03T19:35:19.913Z
Date Published: 2021-08-09T10:04:10
Description:
The WP Google Map WordPress plugin before 1.7.7 did not sanitise or escape the Map Title before outputting them in the page, leading to a Stored Cross-Site Scripting issue by high privilege users, even when the unfiltered_html capability is disallowed
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/f95c3a48-5228-4047-9b92-de985741d157
- https://drive.google.com/file/d/1CbBlsf0Vt1QLBTnSC-vod2UCMm_NnZ2p/view?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the vulnerability CVE-CVE-2020-15140 | CVE-CVE-2020-15140 is a vulnerability in Red-DiscordBot. It is related to the MITRE ATT&CK technique T1133: External Remote Services. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2023-50297. | CVE ID: CVE-2023-50297
Date Updated: 2024-08-02T22:16:46.096Z
Date Published: 2023-12-26T05:53:48.253Z
Description:
Open redirect vulnerability in PowerCMS (6 Series, 5 Series, and 4 Series) allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.powercms.jp/news/release-powercms-202312.html
- https://jvn.jp/en/jp/JVN32646742/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-11586. | CVE ID: CVE-2019-11586
Date Updated: 2024-09-16T17:18:14.250Z
Date Published: 2019-08-23T13:49:47.573286Z
Description:
The AddResolution.jspa resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to create new resolutions via a Cross-site request forgery (CSRF) vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jira.atlassian.com/browse/JRASERVER-69783
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-2003. | CVE ID: CVE-2009-2003
Date Updated: 2024-08-07T05:36:20.481Z
Date Published: 2009-06-08T19:00:00
Description:
Ascad Networks Password Protector SD 1.3.1 allows remote attackers to bypass authentication and gain administrative access by setting the (1) c7portal and (2) cookname cookies to "admin."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/8668
- http://www.securityfocus.com/bid/34930
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-6368. | CVE ID: CVE-2016-6368
Date Updated: 2024-08-06T01:29:19.447Z
Date Published: 2017-04-20T22:00:00
Description:
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort
- http://www.securityfocus.com/bid/98292
- http://www.securityfocus.com/bid/97932
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0701. | CVE ID: CVE-2013-0701
Date Updated: 2024-09-17T03:43:17.825Z
Date Published: 2013-02-14T11:00:00Z
Description:
SQL injection vulnerability in Cybozu Garoon 2.5.0 through 3.5.3 allows remote authenticated users to execute arbitrary SQL commands by leveraging a logging privilege.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://cs.cybozu.co.jp/information/20130125up02.php
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000007
- http://jvn.jp/en/jp/JVN07629635/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-8918. | CVE ID: CVE-2017-8918
Date Updated: 2024-08-05T16:48:22.850Z
Date Published: 2017-09-12T18:00:00
Description:
XXE in Dive Assistant - Template Builder in Blackwave Dive Assistant - Desktop Edition 8.0 allows attackers to remotely view local files via a crafted template.xml file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://thenopsled.com/Exploit-DB%20Writeup.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-30056. | CVE ID: CVE-2021-30056
Date Updated: 2024-08-03T22:24:59.120Z
Date Published: 2021-04-05T10:45:52
Description:
Knowage Suite before 7.4 is vulnerable to reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in /restful-services/publish via the 'EXEC_FROM' parameter that can lead to data leakage.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-4231. | CVE ID: CVE-2014-4231
Date Updated: 2024-08-06T11:12:34.164Z
Date Published: 2014-07-17T02:36:00
Description:
Unspecified vulnerability in the Siebel Travel & Transportation component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect integrity via unknown vectors related to Diary.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94582
- http://www.securityfocus.com/bid/68619
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.securitytracker.com/id/1030585
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-17534. | CVE ID: CVE-2020-17534
Date Updated: 2024-08-04T14:00:49.085Z
Date Published: 2021-01-11T15:33:28
Description:
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file: https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-3531. | CVE ID: CVE-2009-3531
Date Updated: 2024-08-07T06:31:10.429Z
Date Published: 2009-10-02T19:00:00
Description:
SQL injection vulnerability in vnews.php in Universe CMS 1.0.6 allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.org/0907-exploits/universecms-sql.txt
- http://www.exploit-db.com/exploits/9099
- http://secunia.com/advisories/35737
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51621
- http://www.osvdb.org/55761
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-9472. | CVE ID: CVE-2019-9472
Date Updated: 2024-08-04T21:54:43.523Z
Date Published: 2020-01-06T17:25:37
Description:
In DCRYPTO_equals of compare.c, there is a possible timing attack due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-130237611
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/pixel/2019-12-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-1000866. | CVE ID: CVE-2018-1000866
Date Updated: 2024-08-05T12:47:56.163Z
Date Published: 2018-12-10T14:00:00
Description:
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186
- https://access.redhat.com/errata/RHBA-2019:0326
- https://access.redhat.com/errata/RHBA-2019:0327
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-25115. | CVE ID: CVE-2023-25115
Date Updated: 2024-08-02T11:18:35.391Z
Date Published: 2023-07-06T14:53:26.323Z
Description:
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_ip and the port variables.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-40488. | CVE ID: CVE-2024-40488
Date Updated: 2024-08-09T17:50:21.651Z
Date Published: 2024-08-08T00:00:00
Description:
A Cross-Site Request Forgery (CSRF) vulnerability was found in the Kashipara Live Membership System v1.0. This could lead to an attacker tricking the administrator into deleting valid member data via a crafted HTML page, as demonstrated by a Delete Member action at the /delete_members.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://capec.mitre.org/data/definitions/62.html
- https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-3676. | CVE ID: CVE-2024-3676
Date Updated: 2024-08-01T20:19:59.948Z
Date Published: 2024-05-14T19:07:19.420Z
Description:
The Proofpoint Encryption endpoint of Proofpoint Enterprise Protection contains an Improper Input Validation vulnerability that allows an unauthenticated remote attacker with a specially crafted HTTP request to create additional Encryption user accounts under the attacker's control. These accounts are able to send spoofed email to any users within the domains configured by the Administrator.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2024-0002
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-1121. | CVE ID: CVE-2020-1121
Date Updated: 2024-08-04T06:25:01.125Z
Date Published: 2020-05-21T22:53:15
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service, aka 'Windows Clipboard Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1111, CVE-2020-1165, CVE-2020-1166.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1121
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-38255. | CVE ID: CVE-2023-38255
Date Updated: 2024-08-02T17:39:12.120Z
Date Published: 2023-09-18T20:08:05.295Z
Description:
A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-4005. | CVE ID: CVE-2016-4005
Date Updated: 2024-08-06T00:17:31.016Z
Date Published: 2016-06-13T14:00:00
Description:
The Huawei Hilink App application before 3.19.2 for Android does not validate SSL certificates, which allows local users to have unspecified impact via unknown vectors, aka HWPSIRT-2016-03008.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/86536
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160419-01-wear-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-14747. | CVE ID: CVE-2019-14747
Date Updated: 2024-08-05T00:26:38.598Z
Date Published: 2019-08-07T15:12:32
Description:
DWSurvey through 2019-07-22 has stored XSS via the design/my-survey-design!copySurvey.action surveyName parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/wkeyuan/DWSurvey/issues/47
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-6745. | CVE ID: CVE-2013-6745
Date Updated: 2024-08-06T17:46:22.793Z
Date Published: 2013-12-22T15:00:00
Description:
Cross-site scripting (XSS) vulnerability in the IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote authenticated users to inject arbitrary web script or HTML via crafted input to an unspecified dynamic web form.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/64475
- http://www-01.ibm.com/support/docview.wss?uid=swg21660569
- https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_security_access_manager_for_enterprise_single_sign_on_cross_site_scripting_vulnerability_cve_2013_6745?lang=en_us
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89861
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-39388. | CVE ID: CVE-2022-39388
Date Updated: 2024-08-03T12:07:41.233Z
Date Published: 2022-11-10T00:00:00
Description:
Istio is an open platform to connect, manage, and secure microservices. In versions on the 1.15.x branch prior to 1.15.3, a user can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane. Version 1.15.3 contains a patch for this issue. There are no known workarounds.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/istio/istio/security/advisories/GHSA-6c6p-h79f-g6p4
- https://github.com/istio/istio/commit/346260e5115e9fbc65ba8a559bc686e6ca046a32
- https://github.com/istio/istio/commit/9a643e270421560afb2630e00f76d46a55499df9
- https://istio.io/latest/news/releases/1.15.x/announcing-1.15.3/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-2259. | CVE ID: CVE-2024-2259
Date Updated: 2024-08-13T14:19:41.149Z
Date Published: 2024-08-13T10:18:24.658Z
Description:
This vulnerability exists in InstaRISPACS software due to insufficient validation of user supplied input for the loginTo parameter in user login module of the web interface of the application. A remote attacker could exploit this vulnerability by sending a specially crafted input to the vulnerable parameter to perform reflected Cross Site Scripting (XSS) attacks on the targeted system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0241
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-6608. | CVE ID: CVE-2019-6608
Date Updated: 2024-08-04T20:23:22.054Z
Date Published: 2019-03-28T20:46:53
Description:
On BIG-IP 11.5.1-11.6.3, 12.1.0-12.1.3, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, the snmpd daemon may leak memory on a multi-blade BIG-IP vCMP guest when processing authorized SNMP requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K12139752
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-5573. | CVE ID: CVE-2015-5573
Date Updated: 2024-08-06T06:50:02.879Z
Date Published: 2015-09-22T10:00:00
Description:
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://rhn.redhat.com/errata/RHSA-2015-1814.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- http://www.securityfocus.com/bid/76794
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html
- http://www.securitytracker.com/id/1033629
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html
- https://security.gentoo.org/glsa/201509-07
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-0296. | CVE ID: CVE-2015-0296
Date Updated: 2024-08-06T04:03:10.859Z
Date Published: 2017-10-06T22:00:00
Description:
The pre-install script in texlive 3.1.20140525_r34255.fc21 as packaged in Fedora 21 and rpm, and texlive 6.20131226_r32488.fc20 and rpm allows local users to delete arbitrary files via a crafted file in the user's home directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154198.html
- http://www.securityfocus.com/bid/72826
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154424.html
- http://www.openwall.com/lists/oss-security/2015/02/27/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1197082
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
End of preview. Expand
in Dataset Viewer.
Dataset Card for Dataset Name
The dataset combines information from MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) and CVE (Common Vulnerabilities and Exposures) to provide a comprehensive resource for training language models on cybersecurity concepts and vulnerabilities.
Dataset Details
Dataset Description
Each entry in the dataset typically includes:
- MITRE ATT&CK tactics and techniques
- CVE identifiers and descriptions
- Relationships between ATT&CK techniques and CVEs
- Additional metadata relevant to cybersecurity analysis
Dataset Sources [optional]
Mapping CVE-Attack: [https://center-for-threat-informed-defense.github.io/mappings-explorer/external/cve/]
CVEs:: [https://www.cve.org/downloads]
Uses
This dataset is provided to facilitate llama finetuning with MITRE information.
Who are the source data producers?
All data come from MITRE public resources (see sources). Data may be outdated, please note that this is not a MITRE associated project.
More Information [optional]
[More Information Needed]
- Downloads last month
- 70