instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
---|---|---|
Provide detailed information about CVE-2018-0910. | CVE ID: CVE-2018-0910
Date Updated: 2024-09-17T01:15:39.865Z
Date Published: 2018-03-14T17:00:00Z
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0910
- http://www.securitytracker.com/id/1040513
- http://www.securityfocus.com/bid/103280
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-6107. | CVE ID: CVE-2018-6107
Date Updated: 2024-08-05T05:54:52.958Z
Date Published: 2018-12-04T17:00:00
Description:
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://crbug.com/808316
- https://security.gentoo.org/glsa/201804-22
- https://www.debian.org/security/2018/dsa-4182
- http://www.securityfocus.com/bid/103917
- https://access.redhat.com/errata/RHSA-2018:1195
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-39347. | CVE ID: CVE-2024-39347
Date Updated: 2024-08-02T04:26:14.241Z
Date Published: 2024-06-28T06:30:10.727Z
Description:
Incorrect default permissions vulnerability in firewall functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to access highly sensitive intranet resources via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.synology.com/en-global/security/advisory/Synology_SA_23_16
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-0173. | CVE ID: CVE-2024-0173
Date Updated: 2024-08-01T17:41:16.066Z
Date Published: 2024-03-13T16:52:21.293Z
Description:
Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-14799. | CVE ID: CVE-2020-14799
Date Updated: 2024-09-26T20:21:08.486Z
Date Published: 2020-10-21T14:04:26
Description:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.gentoo.org/glsa/202105-27
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-1682. | CVE ID: CVE-2014-1682
Date Updated: 2024-08-06T09:50:09.977Z
Date Published: 2014-05-08T14:00:00
Description:
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html
- http://www.securityfocus.com/bid/65402
- https://support.zabbix.com/browse/ZBX-7703
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-7967. | CVE ID: CVE-2020-7967
Date Updated: 2024-08-04T09:48:24.910Z
Date Published: 2020-02-05T15:58:10
Description:
GitLab EE 8.0 through 12.7.2 has Insecure Permissions (issue 1 of 2).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://about.gitlab.com/blog/categories/releases/
- https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-8280. | CVE ID: CVE-2016-8280
Date Updated: 2024-08-06T02:20:29.781Z
Date Published: 2016-10-03T21:00:00
Description:
Directory traversal vulnerability in Huawei eSight before V300R003C20SPC005 allows remote authenticated users to read arbitrary files via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160928-01-pathtraversal-en
- http://www.securityfocus.com/bid/93190
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-0158. | CVE ID: CVE-2019-0158
Date Updated: 2024-08-04T17:44:14.621Z
Date Published: 2019-04-17T17:02:11
Description:
Insufficient path checking in the installation package for Intel(R) Graphics Performance Analyzer for Linux version 18.4 and before may allow an authenticated user to potentially enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00236.html
- http://www.securityfocus.com/bid/107888
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-16827. | CVE ID: CVE-2020-16827
Date Updated: 2021-12-20T22:52:00
Date Published: 2021-12-20T22:52:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-1000858. | CVE ID: CVE-2018-1000858
Date Updated: 2024-08-05T12:47:57.303Z
Date Published: 2018-12-20T16:00:00
Description:
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html
- https://usn.ubuntu.com/3853-1/
- https://sektioneins.de/en/advisories/advisory-012018-gnupg-wkd.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-0211. | CVE ID: CVE-2016-0211
Date Updated: 2024-08-05T22:08:13.336Z
Date Published: 2016-04-28T01:00:00
Description:
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT12488
- http://www.securitytracker.com/id/1035660
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT12487
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT13350
- http://www.securityfocus.com/bid/85979
- http://www-01.ibm.com/support/docview.wss?uid=swg21979984
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT12462
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-23553. | CVE ID: CVE-2020-23553
Date Updated: 2024-08-04T14:58:15.011Z
Date Published: 2022-09-16T02:45:31
Description:
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007d33.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.irfanview.com/plugins.htm
- https://github.com/nhiephon/Research
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-18305. | CVE ID: CVE-2017-18305
Date Updated: 2024-08-05T21:20:50.932Z
Date Published: 2018-10-23T13:00:00
Description:
XBL sec mem dump system call allows complete control of EL3 by unlocking all XPUs if enable fuse is not blown in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins
- http://www.securitytracker.com/id/1041432
- https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-1727. | CVE ID: CVE-2024-1727
Date Updated: 2024-08-01T18:48:21.951Z
Date Published: 2024-03-21T19:57:39.129Z
Description:
A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious HTML page that triggers an unauthorized file upload to the victim's server, an attacker can deplete the system's disk space, potentially leading to a denial of service. This issue affects the file upload functionality as implemented in gradio/routes.py.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff
- https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-39619. | CVE ID: CVE-2021-39619
Date Updated: 2024-08-04T02:13:37.351Z
Date Published: 2022-02-11T17:40:44
Description:
In updatePackageMappingsData of UsageStatsService.java, there is a possible way to bypass security and privacy settings of app usage due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-197399948
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2022-02-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-5234. | CVE ID: CVE-2024-5234
Date Updated: 2024-08-01T21:03:11.010Z
Date Published: 2024-05-23T04:31:05.190Z
Description:
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /view/teacher_salary_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265985 was assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.265985
- https://vuldb.com/?ctiid.265985
- https://vuldb.com/?submit.339810
- https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2024.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-6616. | CVE ID: CVE-2016-6616
Date Updated: 2024-08-06T01:36:28.995Z
Date Published: 2016-12-11T02:00:00
Description:
An issue was discovered in phpMyAdmin. In the "User group" and "Designer" features, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/95042
- https://www.phpmyadmin.net/security/PMASA-2016-39
- https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
- https://security.gentoo.org/glsa/201701-32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-34367. | CVE ID: CVE-2024-34367
Date Updated: 2024-08-02T02:51:11.170Z
Date Published: 2024-05-06T18:16:15.716Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Popup Box Team Popup box allows Cross-Site Scripting (XSS).This issue affects Popup box: from n/a through 4.1.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/ays-popup-box/wordpress-popup-box-plugin-4-1-2-csrf-to-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-4478. | CVE ID: CVE-2008-4478
Date Updated: 2024-08-07T10:17:09.824Z
Date Published: 2008-10-14T22:00:00
Description:
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.73 before 8.7.3.10 ftf1, allow remote attackers to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.zerodayinitiative.com/advisories/ZDI-08-065
- http://securityreason.com/securityalert/4406
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45628
- http://www.securitytracker.com/id?1020989
- http://www.vupen.com/english/advisories/2008/2738
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html
- http://secunia.com/advisories/32111
- http://www.zerodayinitiative.com/advisories/ZDI-08-063
- http://www.securityfocus.com/archive/1/497163/100/0/threaded
- http://www.securityfocus.com/archive/1/497165/100/0/threaded
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html
- http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000087&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953
- http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7001184&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953
- http://www.securitytracker.com/id?1020990
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-3536. | CVE ID: CVE-2013-3536
Date Updated: 2024-09-17T04:10:33.301Z
Date Published: 2013-05-13T23:00:00Z
Description:
SQL injection vulnerability in the gp_LoadUserFromHash function in functions_hash.php in the Group Pay module 1.5 and earlier for WHMCS allows remote attackers to execute arbitrary SQL commands via the hash parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.exploit-db.com/exploits/24934
- http://www.osvdb.org/91980
- http://packetstormsecurity.com/files/121046/WHMCS-Grouppay-1.5-SQL-Injection.html
- http://secunia.com/advisories/52804
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-10852. | CVE ID: CVE-2020-10852
Date Updated: 2024-08-04T11:14:15.673Z
Date Published: 2020-03-24T17:35:12
Description:
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. There is a stack overflow in display driver. The Samsung ID is SVE-2019-15877 (January 2020).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-5812. | CVE ID: CVE-2019-5812
Date Updated: 2024-08-04T20:09:23.116Z
Date Published: 2019-06-27T16:13:43
Description:
Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html
- https://crbug.com/925598
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
- https://security.gentoo.org/glsa/201908-18
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-22238. | CVE ID: CVE-2022-22238
Date Updated: 2024-09-16T22:45:49.144Z
Date Published: 2022-10-18T02:46:40.306937Z
Description:
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When an incoming RESV message corresponding to a protected LSP is malformed it causes an incorrect internal state resulting in an rpd core. This issue affects: Juniper Networks Junos OS All versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.2R3-S3-EVO; 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO version 21.2R1-EVO and later versions; 21.3-EVO versions prior to 21.3R2-EVO.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA69894
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-45126. | CVE ID: CVE-2022-45126
Date Updated: 2024-08-03T14:01:31.531Z
Date Published: 2023-01-09T02:22:23.465Z
Description:
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-5334. | CVE ID: CVE-2024-5334
Date Updated: 2024-08-01T21:11:12.417Z
Date Published: 2024-06-27T17:33:24.801Z
Description:
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.com/bounties/7eec128b-1bf5-4922-a95c-551ad3695cf6
- https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-52290. | CVE ID: CVE-2023-52290
Date Updated: 2024-09-13T17:04:01.780Z
Date Published: 2024-07-16T07:37:38.660Z
Description:
In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. The attacker must successfully log into the system to launch an attack, which may cause data leakage. Since no data will be written, so this is a low-impact vulnerability.
Mitigation:
all users should upgrade to 2.1.4, Such parameters will be blocked.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-14831. | CVE ID: CVE-2018-14831
Date Updated: 2024-08-05T09:38:14.038Z
Date Published: 2019-07-10T14:29:53
Description:
An arbitrary file read vulnerability in DamiCMS v6.0.0 allows remote authenticated administrators to read any files in the server via a crafted /admin.php?s=Tpl/Add/id/ URI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gist.github.com/feric/98180bad0a73716e143ff8dc03fda12f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-40784. | CVE ID: CVE-2024-40784
Date Updated: 2024-08-02T04:39:54.729Z
Date Published: 2024-07-29T22:17:04.342Z
Description:
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214116
- https://support.apple.com/en-us/HT214120
- https://support.apple.com/en-us/HT214124
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214123
- https://support.apple.com/en-us/HT214122
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/23
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-47462. | CVE ID: CVE-2022-47462
Date Updated: 2024-08-03T14:55:08.112Z
Date Published: 2023-03-07T01:31:26.415Z
Description:
In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1632612109718192129
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-6236. | CVE ID: CVE-2016-6236
Date Updated: 2024-08-06T01:22:20.845Z
Date Published: 2017-02-02T16:00:00
Description:
The setup_imginfo_jpg function in lepton/jpgcoder.cc in Dropbox lepton 1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/dropbox/lepton/issues/26
- http://www.openwall.com/lists/oss-security/2016/07/17/6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-32854. | CVE ID: CVE-2024-32854
Date Updated: 2024-08-02T02:20:35.664Z
Date Published: 2024-07-02T07:08:29.778Z
Description:
Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.0 contain an improper privilege management vulnerability. A local high privilege attacker could potentially exploit this vulnerability, leading to privilege escalation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000226569/dsa-2024-255-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-3755. | CVE ID: CVE-2010-3755
Date Updated: 2024-08-07T03:18:53.091Z
Date Published: 2010-10-05T21:00:00
Description:
The _DAS_ReadBlockReply function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via data in a TCP packet. NOTE: this might overlap CVE-2010-3060.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://zerodayinitiative.com/advisories/ZDI-10-187/
- http://www.securityfocus.com/archive/1/514063/100/0/threaded
- http://www.ibm.com/support/docview.wss?uid=swg21443820
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-2927. | CVE ID: CVE-2024-2927
Date Updated: 2024-08-08T20:32:08.189Z
Date Published: 2024-03-26T23:00:08.667Z
Description:
A vulnerability was found in code-projects Mobile Shop 1.0. It has been classified as critical. Affected is an unknown function of the file Details.php of the component Login Page. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258000.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.258000
- https://vuldb.com/?ctiid.258000
- https://vuldb.com/?submit.304053
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-1198. | CVE ID: CVE-2022-1198
Date Updated: 2024-08-02T23:55:24.542Z
Date Published: 2022-08-29T14:03:07
Description:
A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2070689
- https://www.openwall.com/lists/oss-security/2022/04/02/3
- https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739
- https://access.redhat.com/security/cve/CVE-2022-1198
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-1908. | CVE ID: CVE-2015-1908
Date Updated: 2024-08-06T04:54:16.525Z
Date Published: 2015-04-24T23:00:00
Description:
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF16, and 8.5.0 through CF05, as used in Web Content Manager and other products, allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1032189
- http://www-01.ibm.com/support/docview.wss?uid=swg21701566
- http://www-01.ibm.com/support/docview.wss?uid=swg1PI37661
- http://www.securityfocus.com/bid/74218
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-6609. | CVE ID: CVE-2019-6609
Date Updated: 2024-08-04T20:23:22.059Z
Date Published: 2019-04-15T14:43:15
Description:
Platform dependent weakness. This issue only impacts iSeries platforms. On these platforms, in BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) versions 14.0.0-14.1.0.1, 13.0.0-13.1.1.3, and 12.1.1 HF2-12.1.4, the secureKeyCapable attribute was not set which causes secure vault to not use the F5 hardware support to store the unit key. Instead the unit key is stored in plaintext on disk as would be the case for Z100 systems. Additionally this causes the unit key to be stored in UCS files taken on these platforms.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K18535734
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-3457. | CVE ID: CVE-2017-3457
Date Updated: 2024-08-05T14:30:56.914Z
Date Published: 2017-04-24T19:00:00
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038287
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97845
- https://access.redhat.com/errata/RHSA-2017:2886
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0176. | CVE ID: CVE-2013-0176
Date Updated: 2024-08-06T14:18:09.365Z
Date Published: 2013-02-05T23:11:00
Description:
The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098094.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81595
- http://secunia.com/advisories/51982
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098065.html
- http://www.ubuntu.com/usn/USN-1707-1
- http://www.libssh.org/2013/01/22/libssh-0-5-4-security-release/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-43935. | CVE ID: CVE-2021-43935
Date Updated: 2024-09-16T23:11:47.219Z
Date Published: 2021-12-15T18:05:16.799122Z
Description:
The impacted products, when configured to use SSO, are affected by an improper authentication vulnerability. This vulnerability allows the application to accept manual entry of any active directory (AD) account provisioned in the application without supplying a password, resulting in access to the application as the supplied AD account, with all associated privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/uscert/ics/advisories/icsma-21-343-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-38699. | CVE ID: CVE-2022-38699
Date Updated: 2024-09-16T16:42:51.719Z
Date Published: 2022-09-28T03:25:34.591891Z
Description:
Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-6522-4eacb-1.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-33999. | CVE ID: CVE-2024-33999
Date Updated: 2024-08-29T19:59:08.016Z
Date Published: 2024-05-31T19:53:00.995Z
Description:
The referrer URL used by MFA required additional sanitizing, rather than being used directly.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://moodle.org/mod/forum/discuss.php?d=458387
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-33682. | CVE ID: CVE-2021-33682
Date Updated: 2024-08-03T23:58:22.821Z
Date Published: 2021-07-14T11:08:58
Description:
SAP Lumira Server version 2.4 does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This would allow an attacker with basic level privileges to store a malicious script on SAP Lumira Server. The execution of the script content, by a victim registered on SAP Lumira Server, could compromise the confidentiality and integrity of SAP Lumira content.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506
- https://launchpad.support.sap.com/#/notes/3053403
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-0547. | CVE ID: CVE-2014-0547
Date Updated: 2024-08-06T09:20:19.365Z
Date Published: 2014-09-10T01:00:00
Description:
Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95817
- http://security.gentoo.org/glsa/glsa-201409-05.xml
- http://secunia.com/advisories/61089
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html
- http://helpx.adobe.com/security/products/flash-player/apsb14-21.html
- http://www.securitytracker.com/id/1030822
- http://www.securityfocus.com/bid/69695
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-6775. | CVE ID: CVE-2014-6775
Date Updated: 2024-08-06T12:24:35.799Z
Date Published: 2014-09-29T01:00:00
Description:
The Light for Pets (aka com.helenwoodward.light4pets) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/384585
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-7257. | CVE ID: CVE-2016-7257
Date Updated: 2024-08-06T01:57:47.181Z
Date Published: 2016-12-20T05:54:00
Description:
The GDI component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office for Mac 2011, and Office 2016 for Mac allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI Information Disclosure Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-148
- http://www.securitytracker.com/id/1037438
- http://www.securityfocus.com/bid/94755
- http://www.securitytracker.com/id/1037441
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-146
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-2480. | CVE ID: CVE-2022-2480
Date Updated: 2024-08-03T00:39:07.766Z
Date Published: 2022-07-28T00:00:00
Description:
Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html
- https://crbug.com/1339844
- http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html
- https://security.gentoo.org/glsa/202208-35
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-6782. | CVE ID: CVE-2015-6782
Date Updated: 2024-08-06T07:29:24.533Z
Date Published: 2015-12-06T01:00:00
Description:
The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html
- http://www.ubuntu.com/usn/USN-2825-1
- https://code.google.com/p/chromium/issues/detail?id=536652
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- https://security.gentoo.org/glsa/201603-09
- http://www.securityfocus.com/bid/78416
- http://www.debian.org/security/2015/dsa-3415
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- https://codereview.chromium.org/1415773002/
- http://www.securitytracker.com/id/1034298
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-1863. | CVE ID: CVE-2021-1863
Date Updated: 2024-08-03T16:25:05.656Z
Date Published: 2021-09-08T14:46:16
Description:
An issue existed with authenticating the action triggered by an NFC tag. The issue was addressed with improved action authentication. This issue is fixed in iOS 14.5 and iPadOS 14.5. A person with physical access to an iOS device may be able to place phone calls to any phone number.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212317
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-21613. | CVE ID: CVE-2023-21613
Date Updated: 2024-08-02T09:44:01.530Z
Date Published: 2023-01-18T00:00:00
Description:
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb23-01.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-33616. | CVE ID: CVE-2021-33616
Date Updated: 2024-08-03T23:58:21.400Z
Date Published: 2022-04-04T11:51:06
Description:
RSA Archer 6.x through 6.9 SP1 P4 (6.9.1.4) allows stored XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/fireeye/Vulnerability-Disclosures
- https://community.rsa.com/t5/archer-product-advisories/tkb-p/archer-product-advisories
- https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0020/MNDT-2022-0020.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-4909. | CVE ID: CVE-2009-4909
Date Updated: 2024-08-07T07:24:52.606Z
Date Published: 2010-06-25T19:00:00
Description:
admin/index.php in oBlog allows remote attackers to conduct brute-force password guessing attacks via HTTP requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59824
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-4087. | CVE ID: CVE-2024-4087
Date Updated: 2024-08-01T20:33:51.651Z
Date Published: 2024-06-01T05:38:11.223Z
Description:
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Back to Top widget in all versions up to, and including, 1.3.975 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cca7bb88-4a2c-4406-8610-15ce6e77c31f?source=cve
- https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.3.972/modules/back-to-top/widgets/wpr-back-to-top.php#L684
- https://plugins.trac.wordpress.org/changeset/3094946/royal-elementor-addons/tags/1.3.976/modules/back-to-top/widgets/wpr-back-to-top.php?old=3086875&old_path=royal-elementor-addons%2Ftags%2F1.3.975%2Fmodules%2Fback-to-top%2Fwidgets%2Fwpr-back-to-top.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-36663. | CVE ID: CVE-2020-36663
Date Updated: 2024-08-04T17:30:08.469Z
Date Published: 2023-03-04T06:31:03.924Z
Description:
A vulnerability, which was classified as problematic, was found in Artesãos SEOTools up to 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The patch is named ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222231.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.222231
- https://vuldb.com/?ctiid.222231
- https://github.com/artesaos/seotools/pull/201
- https://github.com/artesaos/seotools/commit/ca27cd0edf917e0bc805227013859b8b5a1f01fb
- https://github.com/artesaos/seotools/releases/tag/v0.17.2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-14114. | CVE ID: CVE-2020-14114
Date Updated: 2024-08-04T12:39:36.202Z
Date Published: 2022-07-22T15:32:00
Description:
information leakage vulnerability exists in the Xiaomi SmartHome APP. This vulnerability is caused by illegal calls of some sensitive JS interfaces, which can be exploited by attackers to leak sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=277
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-24939. | CVE ID: CVE-2022-24939
Date Updated: 2024-08-03T04:29:01.633Z
Date Published: 2022-11-17T23:35:55.522Z
Description:
A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/SiliconLabs/gecko_sdk
- https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000IWDCwQAP?operationContext=S1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-5619. | CVE ID: CVE-2016-5619
Date Updated: 2024-08-06T01:07:59.696Z
Date Published: 2016-10-25T14:00:00
Description:
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, 12.0.1 through 12.0.3, 12.1.0, and 12.2.0 allows remote authenticated users to affect confidentiality and integrity via vectors related to INFRA, a different vulnerability than CVE-2016-5620.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1037049
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93639
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-5390. | CVE ID: CVE-2020-5390
Date Updated: 2024-08-04T08:30:23.936Z
Date Published: 2020-01-13T18:11:37
Description:
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25
- https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e
- https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0
- https://github.com/IdentityPython/pysaml2/releases
- https://pypi.org/project/pysaml2/5.0.0/
- https://usn.ubuntu.com/4245-1/
- https://www.debian.org/security/2020/dsa-4630
- https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-39118. | CVE ID: CVE-2022-39118
Date Updated: 2024-08-03T11:10:32.637Z
Date Published: 2023-01-04T00:00:00
Description:
In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-47455. | CVE ID: CVE-2021-47455
Date Updated: 2024-08-04T05:39:59.400Z
Date Published: 2024-05-22T06:19:44.700Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
ptp: Fix possible memory leak in ptp_clock_register()
I got memory leak as follows when doing fault injection test:
unreferenced object 0xffff88800906c618 (size 8):
comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)
hex dump (first 8 bytes):
70 74 70 30 00 00 00 00 ptp0....
backtrace:
[<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0
[<0000000079f6e2ff>] kvasprintf+0xb5/0x150
[<0000000026aae54f>] kvasprintf_const+0x60/0x190
[<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150
[<000000004e35abdd>] dev_set_name+0xc0/0x100
[<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp]
[<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]
When posix_clock_register() returns an error, the name allocated
in dev_set_name() will be leaked, the put_device() should be used
to give up the device reference, then the name will be freed in
kobject_cleanup() and other memory will be freed in ptp_clock_release().
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
- https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0710. | CVE ID: CVE-2013-0710
Date Updated: 2024-09-16T20:12:13.016Z
Date Published: 2013-03-02T18:00:00Z
Description:
Buffer overflow in Kingsoft Writer 2007 and 2010 before 2724 allows remote attackers to execute arbitrary code via a crafted RTF document.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN55924624/index.html
- http://www.kingsoft.jp/support/office/support_news/writer2010_2723
- http://jvn.jp/en/jp/JVN55924624/22479/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2013-000016
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-1099. | CVE ID: CVE-2008-1099
Date Updated: 2024-08-07T08:08:57.422Z
Date Published: 2008-03-05T20:00:00
Description:
_macro_Getval in wikimacro.py in MoinMoin 1.5.8 and earlier does not properly enforce ACLs, which allows remote attackers to read protected pages.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/30031
- http://secunia.com/advisories/33755
- http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml
- http://www.securityfocus.com/bid/28177
- http://secunia.com/advisories/29262
- http://moinmo.in/SecurityFixes
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41038
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html
- http://secunia.com/advisories/29444
- https://usn.ubuntu.com/716-1/
- http://hg.moinmo.in/moin/1.5/rev/4a7de0173734
- http://www.debian.org/security/2008/dsa-1514
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-21209. | CVE ID: CVE-2018-21209
Date Updated: 2024-08-05T12:26:38.756Z
Date Published: 2020-04-28T15:32:23
Description:
Certain NETGEAR devices are affected by reflected XSS. This affects JNR1010v2 before 1.1.0.46, JR6150 before 1.0.1.10, JWNR2010v5 before 1.1.0.46, PR2000 before 1.0.0.20, R6050 before 1.0.1.10, R6220 before 1.1.0.60, WNDR3700v5 before 1.1.0.50, WNR1000v4 before 1.1.0.46, WNR2020 before 1.1.0.46, and WNR2050 before 1.1.0.46.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000055140/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-2514
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-17554. | CVE ID: CVE-2019-17554
Date Updated: 2024-08-05T01:40:15.799Z
Date Published: 2019-12-04T16:54:22
Description:
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E
- https://seclists.org/bugtraq/2019/Dec/11
- http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html
- https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-8433. | CVE ID: CVE-2015-8433
Date Updated: 2024-08-06T08:20:41.678Z
Date Published: 2015-12-10T02:00:00
Description:
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
- http://www.securityfocus.com/bid/78715
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html
- http://www.securitytracker.com/id/1034318
- https://security.gentoo.org/glsa/201601-03
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-40918. | CVE ID: CVE-2024-40918
Date Updated: 2024-09-11T17:33:03.854Z
Date Published: 2024-07-12T12:25:00.846Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
parisc: Try to fix random segmentation faults in package builds
PA-RISC systems with PA8800 and PA8900 processors have had problems
with random segmentation faults for many years. Systems with earlier
processors are much more stable.
Systems with PA8800 and PA8900 processors have a large L2 cache which
needs per page flushing for decent performance when a large range is
flushed. The combined cache in these systems is also more sensitive to
non-equivalent aliases than the caches in earlier systems.
The majority of random segmentation faults that I have looked at
appear to be memory corruption in memory allocated using mmap and
malloc.
My first attempt at fixing the random faults didn't work. On
reviewing the cache code, I realized that there were two issues
which the existing code didn't handle correctly. Both relate
to cache move-in. Another issue is that the present bit in PTEs
is racy.
1) PA-RISC caches have a mind of their own and they can speculatively
load data and instructions for a page as long as there is a entry in
the TLB for the page which allows move-in. TLBs are local to each
CPU. Thus, the TLB entry for a page must be purged before flushing
the page. This is particularly important on SMP systems.
In some of the flush routines, the flush routine would be called
and then the TLB entry would be purged. This was because the flush
routine needed the TLB entry to do the flush.
2) My initial approach to trying the fix the random faults was to
try and use flush_cache_page_if_present for all flush operations.
This actually made things worse and led to a couple of hardware
lockups. It finally dawned on me that some lines weren't being
flushed because the pte check code was racy. This resulted in
random inequivalent mappings to physical pages.
The __flush_cache_page tmpalias flush sets up its own TLB entry
and it doesn't need the existing TLB entry. As long as we can find
the pte pointer for the vm page, we can get the pfn and physical
address of the page. We can also purge the TLB entry for the page
before doing the flush. Further, __flush_cache_page uses a special
TLB entry that inhibits cache move-in.
When switching page mappings, we need to ensure that lines are
removed from the cache. It is not sufficient to just flush the
lines to memory as they may come back.
This made it clear that we needed to implement all the required
flush operations using tmpalias routines. This includes flushes
for user and kernel pages.
After modifying the code to use tmpalias flushes, it became clear
that the random segmentation faults were not fully resolved. The
frequency of faults was worse on systems with a 64 MB L2 (PA8900)
and systems with more CPUs (rp4440).
The warning that I added to flush_cache_page_if_present to detect
pages that couldn't be flushed triggered frequently on some systems.
Helge and I looked at the pages that couldn't be flushed and found
that the PTE was either cleared or for a swap page. Ignoring pages
that were swapped out seemed okay but pages with cleared PTEs seemed
problematic.
I looked at routines related to pte_clear and noticed ptep_clear_flush.
The default implementation just flushes the TLB entry. However, it was
obvious that on parisc we need to flush the cache page as well. If
we don't flush the cache page, stale lines will be left in the cache
and cause random corruption. Once a PTE is cleared, there is no way
to find the physical address associated with the PTE and flush the
associated page at a later time.
I implemented an updated change with a parisc specific version of
ptep_clear_flush. It fixed the random data corruption on Helge's rp4440
and rp3440, as well as on my c8000.
At this point, I realized that I could restore the code where we only
flush in flush_cache_page_if_present if the page has been accessed.
However, for this, we also need to flush the cache when the accessed
bit is cleared in
---truncated---
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/5bf196f1936bf93df31112fbdfb78c03537c07b0
- https://git.kernel.org/stable/c/d66f2607d89f760cdffed88b22f309c895a2af20
- https://git.kernel.org/stable/c/72d95924ee35c8cd16ef52f912483ee938a34d49
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-6716. | CVE ID: CVE-2016-6716
Date Updated: 2024-08-06T01:36:29.532Z
Date Published: 2016-11-25T16:00:00
Description:
An elevation of privilege vulnerability in the AOSP Launcher in Android 7.0 before 2016-11-01 could allow a local malicious application to create shortcuts that have elevated privileges without the user's consent. This issue is rated as Moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission). Android ID: A-30778130.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94171
- https://source.android.com/security/bulletin/2016-11-01.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-6819. | CVE ID: CVE-2020-6819
Date Updated: 2024-08-04T09:11:05.160Z
Date Published: 2020-04-24T15:56:56
Description:
Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2020-14/
- https://www.mozilla.org/security/advisories/mfsa2020-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1620818
- https://usn.ubuntu.com/4335-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-6591. | CVE ID: CVE-2023-6591
Date Updated: 2024-08-02T08:35:14.411Z
Date Published: 2024-02-12T16:06:00.145Z
Description:
The Popup Box WordPress plugin before 20.9.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/f296de1c-b70b-4829-aba7-4afa24f64c51/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-3997. | CVE ID: CVE-2016-3997
Date Updated: 2024-08-06T00:17:29.951Z
Date Published: 2017-07-03T16:00:00
Description:
NetApp Clustered Data ONTAP allows man-in-the-middle attackers to obtain sensitive information, gain privileges, or cause a denial of service by leveraging failure to enable SMB signing enforcement in its default state.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1006063
- https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-37265. | CVE ID: CVE-2022-37265
Date Updated: 2024-08-03T10:29:20.965Z
Date Published: 2022-09-20T17:36:24
Description:
Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4216
- https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4569
- https://github.com/stealjs/steal/issues/1534
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-47431. | CVE ID: CVE-2022-47431
Date Updated: 2024-08-03T14:55:07.968Z
Date Published: 2023-03-23T11:50:15.363Z
Description:
Reflected Cross-Site Scripting (XSS) vulnerability in Tussendoor internet & marketing Open RDW kenteken voertuiginformatie plugin <= 2.0.14 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/open-rdw-kenteken-voertuiginformatie/wordpress-open-rdw-kenteken-voertuiginformatie-plugin-2-0-14-cross-site-scripting-xss?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-30864. | CVE ID: CVE-2023-30864
Date Updated: 2024-08-02T14:37:15.468Z
Date Published: 2023-06-06T05:13:10.873Z
Description:
In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-42119. | CVE ID: CVE-2021-42119
Date Updated: 2024-08-04T03:30:37.901Z
Date Published: 2021-11-30T11:28:11
Description:
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Search Functionality allows authenticated users with Object Modification privileges to inject arbitrary HTML and JavaScript in object attributes, which is then rendered in the Search Functionality, to alter the intended functionality and steal cookies, the latter allowing for account takeover.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://confluence.topease.ch/confluence/display/DOC/Release+Notes
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-6591. | CVE ID: CVE-2014-6591
Date Updated: 2024-08-06T12:17:24.399Z
Date Published: 2015-01-21T15:00:00
Description:
Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.debian.org/security/2015/dsa-3144
- http://rhn.redhat.com/errata/RHSA-2015-0136.html
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://www.ubuntu.com/usn/USN-2487-1
- http://www.securityfocus.com/bid/72175
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- https://security.gentoo.org/glsa/201603-14
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://www.ubuntu.com/usn/USN-2486-1
- https://security.gentoo.org/glsa/201507-14
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.securitytracker.com/id/1031580
- http://www.debian.org/security/2015/dsa-3147
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-45189. | CVE ID: CVE-2023-45189
Date Updated: 2024-09-05T14:37:23.153Z
Date Published: 2023-11-03T22:51:45.475Z
Description:
A vulnerability in IBM Robotic Process Automation and IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.10, 23.0.0 through 23.0.10 may result in access to client vault credentials. This difficult to exploit vulnerability could allow a low privileged attacker to programmatically access client vault credentials. IBM X-Force ID: 268752.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7065204
- https://exchange.xforce.ibmcloud.com/vulnerabilities/268752
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-44917. | CVE ID: CVE-2021-44917
Date Updated: 2024-08-04T04:32:13.250Z
Date Published: 2021-12-21T19:57:14
Description:
A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceforge.net/p/gnuplot/bugs/2358/
- https://sourceforge.net/p/gnuplot/bugs/2474/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-5251. | CVE ID: CVE-2011-5251
Date Updated: 2024-09-17T01:16:04.633Z
Date Published: 2012-12-31T20:00:00Z
Description:
Open redirect vulnerability in forum/login.php in vBulletin 4.1.3 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter in a lostpw action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vbulletin.com/forum/showthread.php/381014-Potential-Phishing-Vector?p=2166441
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-10777. | CVE ID: CVE-2017-10777
Date Updated: 2024-08-05T17:50:11.752Z
Date Published: 2017-07-05T19:00:00
Description:
XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at xnview+0x0000000000372b24."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10777
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-15273. | CVE ID: CVE-2020-15273
Date Updated: 2024-08-04T13:15:19.029Z
Date Published: 2020-10-30T19:10:16
Description:
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8
- https://packagist.org/packages/baserproject/basercms
- https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-47508. | CVE ID: CVE-2022-47508
Date Updated: 2024-08-03T14:55:08.308Z
Date Published: 2023-02-15T00:00:00
Description:
Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-47508
- https://documentation.solarwinds.com/en/success_center/sam/content/release_notes/sam_2023-1_release_notes.htm
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-30676. | CVE ID: CVE-2021-30676
Date Updated: 2024-08-03T22:40:31.756Z
Date Published: 2021-09-08T14:26:02
Description:
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A local user may be able to cause unexpected system termination or read kernel memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212529
- https://support.apple.com/en-us/HT212530
- https://support.apple.com/en-us/HT212531
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-2945. | CVE ID: CVE-2018-2945
Date Updated: 2024-10-02T20:15:54.993Z
Date Published: 2018-07-18T13:00:00
Description:
Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/104789
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securitytracker.com/id/1041305
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-2663. | CVE ID: CVE-2017-2663
Date Updated: 2024-08-05T14:02:07.221Z
Date Published: 2018-07-27T20:00:00
Description:
It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/97015
- https://github.com/candlepin/subscription-manager/commit/2aa48ef65
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2663
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-2493. | CVE ID: CVE-2014-2493
Date Updated: 2024-08-06T10:14:26.548Z
Date Published: 2014-07-17T02:36:00
Description:
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.2.4.0, and 12.1.2.0.0 allows remote attackers to affect confidentiality and availability via vectors related to ADF Faces.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://seclists.org/fulldisclosure/2014/Dec/23
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-5987. | CVE ID: CVE-2023-5987
Date Updated: 2024-08-02T08:14:25.122Z
Date Published: 2023-11-15T03:48:50.993Z
Description:
A CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
vulnerability that could cause a vulnerability leading to a cross site scripting condition where
attackers can have a victim’s browser run arbitrary JavaScript when they visit a page containing
the injected payload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-318-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-318-02.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-15365. | CVE ID: CVE-2018-15365
Date Updated: 2024-08-05T09:54:03.557Z
Date Published: 2018-09-28T17:00:00
Description:
A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://success.trendmicro.com/solution/1121079
- https://github.com/nixwizard/CVE-2018-15365/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-41866. | CVE ID: CVE-2021-41866
Date Updated: 2024-08-04T03:22:25.530Z
Date Published: 2021-10-26T21:25:47
Description:
MyBB before 1.8.28 allows stored XSS because the displayed Template Name value in the Admin CP's theme management is not escaped properly.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/mybb/mybb/security/advisories/
- https://github.com/mybb/mybb/security/advisories/GHSA-gxhv-r3m5-6qv7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-23538. | CVE ID: CVE-2023-23538
Date Updated: 2024-08-02T10:35:33.150Z
Date Published: 2023-05-08T00:00:00
Description:
A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4. An app may be able to modify protected parts of the file system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213670
- https://support.apple.com/en-us/HT213677
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-15551. | CVE ID: CVE-2019-15551
Date Updated: 2024-08-05T00:49:13.774Z
Date Published: 2019-08-26T14:39:09
Description:
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is a double free for certain grow attempts with the current capacity.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rustsec.org/advisories/RUSTSEC-2019-0009.html
- https://github.com/servo/rust-smallvec/issues/148
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-0029. | CVE ID: CVE-2010-0029
Date Updated: 2024-08-07T00:37:53.359Z
Date Published: 2010-02-10T18:00:00
Description:
Buffer overflow in Microsoft Office PowerPoint 2002 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint File Path Handling Buffer Overflow Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8410
- http://www.us-cert.gov/cas/techalerts/TA10-040A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-004
- http://www.securitytracker.com/id?1023563
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-21904. | CVE ID: CVE-2021-21904
Date Updated: 2024-08-03T18:30:23.143Z
Date Published: 2021-12-22T18:06:46
Description:
A directory traversal vulnerability exists in the CMA CLI setenv command of Garrett Metal Detectors’ iC Module CMA Version 5.0. An attacker can provide malicious input to trigger this vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-8140. | CVE ID: CVE-2018-8140
Date Updated: 2024-08-05T06:46:13.496Z
Date Published: 2018-06-14T12:00:00
Description:
An Elevation of Privilege vulnerability exists when Cortana retrieves data from user input services without consideration for status, aka "Cortana Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/104354
- http://www.securitytracker.com/id/1041108
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8140
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-44451. | CVE ID: CVE-2023-44451
Date Updated: 2024-08-02T20:07:33.425Z
Date Published: 2024-05-03T02:14:12.509Z
Description:
Linux Mint Xreader EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EPUB files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21897.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1835/
- https://github.com/linuxmint/xreader/commit/141f1313745b9cc73670df51ac145165efcbb14a
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-2175. | CVE ID: CVE-2017-2175
Date Updated: 2024-08-05T13:48:05.158Z
Date Published: 2017-05-22T16:00:00
Description:
Untrusted search path vulnerability in Empirical Project Monitor - eXtended all versions allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ipa.go.jp/sec/info/20170519.html
- https://jvn.jp/en/jp/JVN12493656/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2017-000098
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-7238. | CVE ID: CVE-2023-7238
Date Updated: 2024-08-02T08:57:35.227Z
Date Published: 2024-01-23T19:20:02.324Z
Description:
A XSS payload can be uploaded as a DICOM study and when a user tries to view the infected study inside the Osimis WebViewer the XSS vulnerability gets triggered. If exploited, the attacker will be able to execute arbitrary JavaScript code inside the victim's browser.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-023-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-17563. | CVE ID: CVE-2019-17563
Date Updated: 2024-08-05T01:40:15.805Z
Date Published: 2019-12-23T16:39:01
Description:
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.debian.org/security/2019/dsa-4596
- https://seclists.org/bugtraq/2019/Dec/43
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
- https://usn.ubuntu.com/4251-1/
- https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
- https://security.gentoo.org/glsa/202003-43
- https://www.debian.org/security/2020/dsa-4680
- https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
- https://security.netapp.com/advisory/ntap-20200107-0001/
- https://www.oracle.com/security-alerts/cpujan2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-0937. | CVE ID: CVE-2022-0937
Date Updated: 2024-08-02T23:47:42.765Z
Date Published: 2022-03-14T02:35:09
Description:
Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5
- https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-18696. | CVE ID: CVE-2019-18696
Date Updated: 2019-11-04T20:17:38
Date Published: 2019-11-04T20:17:38
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-30429. | CVE ID: CVE-2022-30429
Date Updated: 2024-08-03T06:48:36.400Z
Date Published: 2022-06-02T17:18:03
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.neos.io/blog/xss-in-various-backend-modules.html
- https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits