System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12905 - **State**: PUBLISHED - **Published Date**: June 27, 2018 at 13:00 UTC - **Last Updated**: September 16, 2024 at 19:55 UTC - **Reserved Date**: June 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description joyplus-cms 1.6.0 has XSS in admin_player.php, related to manager/index.php "system manage" and "add" actions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/joyplus/joyplus-cms/issues/427)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31455 - **State**: PUBLISHED - **Published Date**: July 26, 2023 at 00:00 UTC - **Last Updated**: October 23, 2024 at 18:54 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description * A cross-site scripting (XSS) vulnerability in Truedesk v1.2.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a user chat box. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.acunetix.com/vulnerabilities/web/cross-site-scripting/) 2. [](https://medium.com/%40rohitgautam26/cve-2022-31455-bc929f477446)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000035 - **State**: PUBLISHED - **Published Date**: February 09, 2018 at 23:00 UTC - **Last Updated**: August 05, 2024 at 12:33 UTC - **Reserved Date**: February 02, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html) 2. [[debian-lts-announce] 20200128 [SECURITY] [DLA 2082-1] unzip security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html) 3. [GLSA-202003-58](https://security.gentoo.org/glsa/202003-58)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10993, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10993 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10993 - **State**: PUBLISHED - **Published Date**: June 28, 2019 at 20:52 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 08, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. ### Affected Products **WebAccess - WebAccess/SCADA** Affected versions: - Versions 8.3.5 and prior (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-19-178-05) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-617/) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-19-612/) 4. [](https://www.zerodayinitiative.com/advisories/ZDI-19-602/) 5. [](https://www.zerodayinitiative.com/advisories/ZDI-19-606/) 6. [](https://www.zerodayinitiative.com/advisories/ZDI-19-603/) 7. [](https://www.zerodayinitiative.com/advisories/ZDI-19-605/) 8. [](https://www.zerodayinitiative.com/advisories/ZDI-19-623/) 9. [](https://www.zerodayinitiative.com/advisories/ZDI-19-597/) 10. [](https://www.zerodayinitiative.com/advisories/ZDI-19-618/) 11. [](https://www.zerodayinitiative.com/advisories/ZDI-19-611/) 12. [](https://www.zerodayinitiative.com/advisories/ZDI-19-601/) 13. [](https://www.zerodayinitiative.com/advisories/ZDI-19-616/) 14. [](https://www.zerodayinitiative.com/advisories/ZDI-19-607/) 15. [](https://www.zerodayinitiative.com/advisories/ZDI-19-614/) 16. [](https://www.zerodayinitiative.com/advisories/ZDI-19-615/) 17. [](https://www.zerodayinitiative.com/advisories/ZDI-19-613/) 18. [](https://www.zerodayinitiative.com/advisories/ZDI-19-598/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2849 - **State**: PUBLISHED - **Published Date**: May 22, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 15:52 UTC - **Reserved Date**: April 11, 2013 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome before 27.0.1453.93 allow user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code.google.com/p/chromium/issues/detail?id=171392) 2. [DSA-2695](http://www.debian.org/security/2013/dsa-2695) 3. [](http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html) 4. [oval:org.mitre.oval:def:16753](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16753)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1558 - **State**: PUBLISHED - **Published Date**: December 13, 2017 at 18:00 UTC - **Last Updated**: September 16, 2024 at 16:43 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Maximo Asset Management 7.5 and 7.6 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 131548. ### Affected Products **IBM - Maximo Asset Management** Affected versions: - 7.5 (Status: affected) - 7.6 (Status: affected) ### References 1. [102211](http://www.securityfocus.com/bid/102211) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22010595) 3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/131548)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48647 - **State**: PUBLISHED - **Published Date**: October 30, 2024 at 00:00 UTC - **Last Updated**: October 31, 2024 at 17:19 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A file disclosure vulnerability exists in Sage 1000 v7.0.0. This vulnerability allows remote attackers to retrieve arbitrary files from the server's file system by manipulating the URL parameter in HTTP requests. The attacker can exploit this flaw to access sensitive information, including configuration files that may contain credentials and system settings, which could lead to further compromise of the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/hx381/Sage-1000-v7.0.0-Exploit/blob/main/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1155, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1155 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1155 - **State**: PUBLISHED - **Published Date**: June 05, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: September 26, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030616 Next kon2root - Redhat 9](http://marc.info/?l=bugtraq&m=105577912106710&w=2) 2. [RHSA-2003:050](http://www.redhat.com/support/errata/RHSA-2003-050.html) 3. [MDKSA-2003:064](http://www.mandriva.com/security/advisories?name=MDKSA-2003:064) 4. [RHSA-2003:047](http://www.redhat.com/support/errata/RHSA-2003-047.html) 5. [20030603 kon2_exploit!!](http://marc.info/?l=bugtraq&m=105474080512376&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0466, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0466 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0466 - **State**: PUBLISHED - **Published Date**: January 28, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 07:46 UTC - **Reserved Date**: January 28, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files. NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server](http://www.securityfocus.com/archive/1/486868/100/0/threaded) 2. [4970](https://www.exploit-db.com/exploits/4970) 3. [4971](https://www.exploit-db.com/exploits/4971) 4. [27419](http://www.securityfocus.com/bid/27419) 5. [](http://www.bugreport.ir/?/29) 6. [3584](http://securityreason.com/securityalert/3584) 7. [](http://www.bugreport.ir/?/31) 8. [1019267](http://securitytracker.com/id?1019267) 9. [](http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp) 10. [20080123 Web Wiz Forums Directory traversal](http://www.securityfocus.com/archive/1/486866/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10800, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10800 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10800 - **State**: PUBLISHED - **Published Date**: March 21, 2020 at 14:06 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 21, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lix through 15.8.7 allows man-in-the-middle attackers to execute arbitrary code by modifying the HTTP client-server data stream so that the Location header is associated with attacker-controlled executable content in the postDownload field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.npmjs.com/advisories/1306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4438 - **State**: PUBLISHED - **Published Date**: July 04, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 00:32 UTC - **Reserved Date**: May 02, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1348238) 2. [91275](http://www.securityfocus.com/bid/91275) 3. [](https://struts.apache.org/docs/s2-037.html) 4. [JVNDB-2016-000110](http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110) 5. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) 6. [JVN#07710476](http://jvn.jp/en/jp/JVN07710476/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13617 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for CAPTOZ, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CAPTOZ) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0382 - **State**: PUBLISHED - **Published Date**: September 17, 2020 at 15:40 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In RunInternal of dumpstate.cpp, there is a possible user consent bypass due to an uncaught exception. This could lead to local information disclosure of bug report data with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-152944488 ### Affected Products **n/a - Android** Affected versions: - Android-11 Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-09-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55976, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55976 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55976 - **State**: PUBLISHED - **Published Date**: December 16, 2024 at 14:31 UTC - **Last Updated**: December 16, 2024 at 16:37 UTC - **Reserved Date**: December 14, 2024 at 19:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mike Leembruggen Critical Site Intel allows SQL Injection.This issue affects Critical Site Intel: from n/a through 1.0. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Mike Leembruggen - Critical Site Intel** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/critical-site-intel-stats/vulnerability/wordpress-critical-site-intel-plugin-1-0-sql-injection-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34306 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 01:57 UTC - **Last Updated**: September 18, 2024 at 18:28 UTC - **Reserved Date**: May 31, 2023 at 19:51 UTC - **Assigned By**: zdi ### Vulnerability Description Ashlar-Vellum Graphite VC6 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-18908. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Ashlar-Vellum - Graphite** Affected versions: - Ashlar-Vellum Graphite v13 Special Edition. Build 13.0.46 (Status: affected) ### References 1. [ZDI-23-866](https://www.zerodayinitiative.com/advisories/ZDI-23-866/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1002008, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1002008 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1002008 - **State**: PUBLISHED - **Published Date**: December 03, 2018 at 16:00 UTC - **Last Updated**: August 05, 2024 at 12:47 UTC - **Reserved Date**: December 03, 2018 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description There is a reflected XSS vulnerability in WordPress Arigato Autoresponder and News letter v2.5.1.8 This vulnerability requires administrative privileges to exploit. There is an XSS vulnerability in list-user.html.php:4: via GET request offset variable. ### Affected Products **Kiboko Labs https://calendarscripts.info/ - Arigato Autoresponder and Newsletter** Affected versions: - unspecified (Status: affected) ### References 1. [45434](https://www.exploit-db.com/exploits/45434/) 2. [](https://wordpress.org/plugins/bft-autoresponder/) 3. [](http://www.vapidlabs.com/advisory.php?v=203)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1836, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1836 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1836 - **State**: PUBLISHED - **Published Date**: March 02, 2025 at 23:00 UTC - **Last Updated**: March 03, 2025 at 20:08 UTC - **Reserved Date**: March 02, 2025 at 08:04 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Incorta 2023.4.3. It has been classified as problematic. Affected is an unknown function of the component Edit Insight Handler. The manipulation of the argument Service Name leads to csv injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-1236: Security Weakness - CWE-74: Security Weakness ### Affected Products **n/a - Incorta** Affected versions: - 2023.4.3 (Status: affected) ### References 1. [VDB-298104 | Incorta Edit Insight csv injection](https://vuldb.com/?id.298104) 2. [VDB-298104 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.298104) 3. [Submit #503070 | Incorta 2023.4.3 CSV Injection](https://vuldb.com/?submit.503070) ### Credits - Zaid Shaikh (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5914 - **State**: PUBLISHED - **Published Date**: November 17, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 21:21 UTC - **Reserved Date**: November 17, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the sed_import function in system/functions.php in Neocrome Seditio build 160 and 161 allow remote attackers to inject arbitrary web script or HTML via the (1) newmsg or (2) rtext parameter. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/files/111320/Seditio-Build-161-Cross-Site-Scripting-Information-Disclosure.html) 2. [48637](http://secunia.com/advisories/48637) 3. [seditio-forums-xss(74463)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74463) 4. [52802](http://www.securityfocus.com/bid/52802) 5. [](http://www.neocrome.net/page.php?id=2470) 6. [80688](http://osvdb.org/80688)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4956, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4956 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4956 - **State**: PUBLISHED - **Published Date**: May 16, 2024 at 15:31 UTC - **Last Updated**: August 01, 2024 at 20:55 UTC - **Reserved Date**: May 15, 2024 at 17:17 UTC - **Assigned By**: Sonatype ### Vulnerability Description Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Sonatype - Nexus Repository** Affected versions: - 3.0.0 (Status: affected) ### References 1. [](https://support.sonatype.com/hc/en-us/articles/29416509323923) ### Credits - Erick Fernando Xavier de Oliveira (erickfernandox)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0874, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0874 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0874 - **State**: PUBLISHED - **Published Date**: November 23, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 14:41 UTC - **Reserved Date**: January 07, 2013 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description The (1) doubles2str and (2) shorts2str functions in libavcodec/tiff.c in FFmpeg before 1.1.3 allow remote attackers to have an unspecified impact via a crafted TIFF image, related to an out-of-bounds array access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.ffmpeg.org/security.html) 2. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06) 3. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=e1219cdaf9fb4bc8cea410e1caf802373c1bfe51)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3565 - **State**: PUBLISHED - **Published Date**: April 24, 2017 at 19:00 UTC - **Last Updated**: October 04, 2024 at 19:21 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RBAC). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as unauthorized access to critical data or complete access to all Solaris accessible data. CVSS 3.0 Base Score 7.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). ### Affected Products **Oracle Corporation - Solaris Operating System** Affected versions: - 11.3 (Status: affected) ### References 1. [97782](http://www.securityfocus.com/bid/97782) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) 3. [1038292](http://www.securitytracker.com/id/1038292)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6405 - **State**: PUBLISHED - **Published Date**: September 18, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Fog Director 1.0(0) for IOx allows remote authenticated users to bypass intended access restrictions and write to arbitrary files via the Cartridge interface, aka Bug ID CSCuz89368. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20160914 Cisco Fog Director for IOx Arbitrary File Write Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ioxfd) 2. [92958](http://www.securityfocus.com/bid/92958)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23822 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:07 UTC - **Last Updated**: January 17, 2025 at 19:08 UTC - **Reserved Date**: January 16, 2025 at 11:30 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Cornea Alexandru Category Custom Fields allows Cross Site Request Forgery.This issue affects Category Custom Fields: from n/a through 1.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Cornea Alexandru - Category Custom Fields** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/categorycustomfields/vulnerability/wordpress-category-custom-fields-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42252 - **State**: PUBLISHED - **Published Date**: November 01, 2022 at 00:00 UTC - **Last Updated**: May 06, 2025 at 15:09 UTC - **Reserved Date**: October 03, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. ### Weakness Classification (CWE) - CWE-444: Security Weakness ### Affected Products **Apache Software Foundation - Apache Tomcat** Affected versions: - 10.1.0-M1 (Status: affected) - 10.0.0-M1 (Status: affected) - 9.0.0-M1 (Status: affected) - 8.5.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq) 2. [](https://security.gentoo.org/glsa/202305-37) ### Credits - Thanks to Sam Shahsavar who discovered this issue and reported it to the Apache Tomcat security team.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2154 - **State**: PUBLISHED - **Published Date**: May 20, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:53 UTC - **Reserved Date**: May 20, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description login.aspx in the SmarterTools SmarterStats 6.0 web server does not include the HTTPOnly flag in a Set-Cookie header for the loginsettings cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html) 2. [](http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html) 3. [](http://www.kb.cert.org/vuls/id/MORO-8GYQR4) 4. [VU#240150](http://www.kb.cert.org/vuls/id/240150) 5. [smarterstats-login-info-disc(67828)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67828)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2559 - **State**: PUBLISHED - **Published Date**: November 22, 2005 at 02:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: November 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description DokuWiki before 2004-10-19 allows remote attackers to access administrative functionality including (1) Mediaselectiondialog, (2) Recent changes, (3) feed, and (4) search, possibly due to the lack of ACL checks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1011802](http://securitytracker.com/id?1011802) 2. [dokuwiki-acl-gain-access(17799)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17799) 3. [11005](http://www.osvdb.org/11005) 4. [](http://wiki.splitbrain.org/wiki:old_changes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26012 - **State**: PUBLISHED - **Published Date**: May 04, 2023 at 13:14 UTC - **Last Updated**: January 09, 2025 at 15:28 UTC - **Reserved Date**: February 17, 2023 at 14:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denzel Chia | Phire Design Custom Login Page plugin <= 2.0 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Denzel Chia | Phire Design - Custom Login Page** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-custom-login-page/wordpress-custom-login-page-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mahesh Nagabhairava (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8862 - **State**: PUBLISHED - **Published Date**: February 22, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 10:12 UTC - **Reserved Date**: February 11, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082. ### Weakness Classification (CWE) - CWE-697: Security Weakness ### Affected Products **D-Link - DAP-2610** Affected versions: - Firmware v2.01RC067 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-266/) 2. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10154) ### Credits - chung96vn - Security Researcher of VinCSS (Member of Vingroup)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10794 - **State**: PUBLISHED - **Published Date**: August 06, 2019 at 13:05 UTC - **Last Updated**: August 06, 2024 at 03:38 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 59.9999.145 allows arbitrary file-read operations because of a multipart form processing error (SEC-154). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/60+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9820 - **State**: PUBLISHED - **Published Date**: March 01, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 02:59 UTC - **Reserved Date**: December 04, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [94732](http://www.securityfocus.com/bid/94732) 2. [](https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45597 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: August 03, 2024 at 14:17 UTC - **Reserved Date**: November 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ComponentSpace.Saml2 4.4.0 Missing SSL Certificate Validation. NOTE: the vendor does not consider this a vulnerability because the report is only about use of certificates at the application layer (not the transport layer) and "Certificates are exchanged in a controlled fashion between entities within a trust relationship. This is why self-signed certificates may be used and why validating certificates isn’t as important as doing so for the transport layer certificates." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://componentspace.com) 2. [](http://componentspacesaml2.com) 3. [](https://www.componentspace.com/documentation/saml-for-asp-net-core/ComponentSpace%20SAML%20for%20ASP.NET%20Core%20Release%20Notes.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36748 - **State**: PUBLISHED - **Published Date**: July 01, 2023 at 05:33 UTC - **Last Updated**: October 28, 2024 at 15:24 UTC - **Reserved Date**: June 30, 2023 at 16:57 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.8. This is due to missing or incorrect nonce validation on the handle_order_export() function. This makes it possible for unauthenticated attackers to trigger an order export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Affected Products **wedevs - Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/894c875a-078f-4c1f-83d2-4a6e4a309c3e?source=cve) 2. [](https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/) 3. [](https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/) 4. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/) 5. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/) 6. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/) 7. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/) 8. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/) 9. [](https://plugins.trac.wordpress.org/changeset/2368433/dokan-lite/trunk/includes/Dashboard/Templates/Orders.php) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22853 - **State**: PUBLISHED - **Published Date**: February 16, 2022 at 17:12 UTC - **Last Updated**: August 03, 2024 at 03:28 UTC - **Reserved Date**: January 10, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in Hospital Patient Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html) 2. [](https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip) 3. [](https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13810, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13810 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13810 - **State**: PUBLISHED - **Published Date**: November 13, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 19:13 UTC - **Reserved Date**: August 30, 2017 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows local users to obtain sensitive information by leveraging an error in packet counters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/HT208221) 2. [1039710](http://www.securitytracker.com/id/1039710)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18273 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 18:44 UTC - **Last Updated**: August 05, 2024 at 01:47 UTC - **Reserved Date**: October 22, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description OSIsoft PI Vision, PI Vision 2017 R2 and PI Vision 2017 R2 SP1. The affected product is vulnerable to cross-site scripting, which may allow invalid input to be introduced. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - OSIsoft PI Vision** Affected versions: - PI Vision 2017 R2 and PI Vision 2017 R2 SP1 (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-20-014-06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0169, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0169 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0169 - **State**: PUBLISHED - **Published Date**: March 11, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 23, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit in Apple Safari before 5.0.4, when the Web Inspector is used, does not properly handle the window.console._inspectorCommandLineAPI property, which allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [safari-commandlineapi-xss(66006)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66006) 2. [](http://support.apple.com/kb/HT4566) 3. [46809](http://www.securityfocus.com/bid/46809) 4. [1025183](http://www.securitytracker.com/id?1025183) 5. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27063 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 13:00 UTC - **Last Updated**: May 04, 2025 at 09:03 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: leds: trigger: netdev: Fix kernel panic on interface rename trig notify Commit d5e01266e7f5 ("leds: trigger: netdev: add additional specific link speed mode") in the various changes, reworked the way to set the LINKUP mode in commit cee4bd16c319 ("leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename") and moved it to a generic function. This changed the logic where, in the previous implementation the dev from the trigger event was used to check if the carrier was ok, but in the new implementation with the generic function, the dev in trigger_data is used instead. This is problematic and cause a possible kernel panic due to the fact that the dev in the trigger_data still reference the old one as the new one (passed from the trigger event) still has to be hold and saved in the trigger_data struct (done in the NETDEV_REGISTER case). On calling of get_device_state(), an invalid net_dev is used and this cause a kernel panic. To handle this correctly, move the call to get_device_state() after the new net_dev is correctly set in trigger_data (in the NETDEV_REGISTER case) and correctly parse the new dev. ### Affected Products **Linux - Linux** Affected versions: - d5e01266e7f5fa12400d4c8aa4e86fe89dcc61e9 (Status: affected) - d5e01266e7f5fa12400d4c8aa4e86fe89dcc61e9 (Status: affected) - d5e01266e7f5fa12400d4c8aa4e86fe89dcc61e9 (Status: affected) - d5e01266e7f5fa12400d4c8aa4e86fe89dcc61e9 (Status: affected) **Linux - Linux** Affected versions: - 6.5 (Status: affected) - 0 (Status: unaffected) - 6.6.24 (Status: unaffected) - 6.7.12 (Status: unaffected) - 6.8.3 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/10f2af1af8ab8a7064f193446abd5579d3def7e3) 2. [](https://git.kernel.org/stable/c/acd025c7a7d151261533016a6ca2d38f2de04e87) 3. [](https://git.kernel.org/stable/c/3f360227cb46edb2cd2494128e1e06ed5768a62e) 4. [](https://git.kernel.org/stable/c/415798bc07dd1c1ae3a656aa026580816e0b9fe8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0564, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0564 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0564 - **State**: PUBLISHED - **Published Date**: November 19, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:24 UTC - **Reserved Date**: June 14, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041208 Re: MDKSA-2004:145 - Updated rp-pppoe packages fix vulnerability](http://marc.info/?l=bugtraq&m=110253341209450&w=2) 2. [11315](http://www.securityfocus.com/bid/11315) 3. [pppoe-file-overwrite(17576)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17576) 4. [DSA-557](http://www.debian.org/security/2004/dsa-557) 5. [FLSA:152794](http://www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html) 6. [MDKSA-2004:145](http://marc.info/?l=bugtraq&m=110247119200510&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5009 - **State**: PUBLISHED - **Published Date**: November 02, 2011 at 21:00 UTC - **Last Updated**: August 07, 2024 at 04:09 UTC - **Reserved Date**: November 02, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in UTStats Beta 4 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter in a matchp action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8506](http://securityreason.com/securityalert/8506) 2. [utstats-index-sql-injection(59402)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59402) 3. [ADV-2010-1465](http://www.vupen.com/english/advisories/2010/1465) 4. [13854](http://www.exploit-db.com/exploits/13854) 5. [40836](http://www.securityfocus.com/bid/40836) 6. [](http://packetstormsecurity.org/1006-exploits/utstats-sqlxss.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23741 - **State**: PUBLISHED - **Published Date**: December 14, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 16:09 UTC - **Reserved Date**: January 19, 2022 at 00:00 UTC - **Assigned By**: GitHub_P ### Vulnerability Description An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious GitHub App. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, and 3.6.5. This vulnerability was reported via the GitHub Bug Bounty program. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **GitHub - GitHub Enterprise Server** Affected versions: - 3.3 (Status: affected) - 3.4 (Status: affected) - 3.5 (Status: affected) - 3.6 (Status: affected) ### References 1. [](https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.17) 2. [](https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.12) 3. [](https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.9) 4. [](https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.5) ### Credits - Vaibhav Singh (@vaib25vicky)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7492 - **State**: PUBLISHED - **Published Date**: February 15, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:51 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Reference Data Management (RDM) in IBM InfoSphere Master Data Management 10.1, 11.0 before FP5, 11.3, 11.4, and 11.5 before FP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21974981)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8732 - **State**: PUBLISHED - **Published Date**: April 24, 2018 at 19:00 UTC - **Last Updated**: September 16, 2024 at 22:29 UTC - **Reserved Date**: October 17, 2016 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description Multiple security flaws exists in InvProtectDrv.sys which is a part of Invincea Dell Protected Workspace 5.1.1-22303. Weak restrictions on the driver communication channel and additional insufficient checks allow any application to turn off some of the protection mechanisms provided by the Invincea product. ### Affected Products **Invincea - Dell Protected Workspace** Affected versions: - build 5.1.1-22303 (Status: affected) ### References 1. [99360](http://www.securityfocus.com/bid/99360) 2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0246)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23889 - **State**: PUBLISHED - **Published Date**: January 26, 2024 at 09:19 UTC - **Last Updated**: May 29, 2025 at 15:13 UTC - **Reserved Date**: January 23, 2024 at 10:55 UTC - **Assigned By**: INCIBE ### Vulnerability Description A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itemgroupcreate.php, in the itemgroupid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cups Easy - Cups Easy (Purchase & Inventory)** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy) ### Credits - Rafael Pedrero
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4983, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4983 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4983 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 23, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31026 - **State**: REJECTED - **Published Date**: August 24, 2021 at 18:52 UTC - **Last Updated**: August 24, 2021 at 18:52 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9770 - **State**: PUBLISHED - **Published Date**: April 01, 2020 at 17:55 UTC - **Last Updated**: August 04, 2024 at 10:43 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved state management. This issue is fixed in iOS 13.4 and iPadOS 13.4. An attacker in a privileged network position may be able to intercept Bluetooth traffic. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT211102)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12702, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12702 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12702 - **State**: PUBLISHED - **Published Date**: August 30, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 18:43 UTC - **Reserved Date**: August 09, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code. ### Weakness Classification (CWE) - CWE-134: Security Weakness ### Affected Products **n/a - Advantech WebAccess** Affected versions: - Advantech WebAccess (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02) 2. [100526](http://www.securityfocus.com/bid/100526)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3328, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3328 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3328 - **State**: PUBLISHED - **Published Date**: August 14, 2023 at 19:10 UTC - **Last Updated**: October 09, 2024 at 16:06 UTC - **Reserved Date**: June 19, 2023 at 17:33 UTC - **Assigned By**: WPScan ### Vulnerability Description The Custom Field For WP Job Manager WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Custom Field For WP Job Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131) ### Credits - Bob Matyas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43288 - **State**: PUBLISHED - **Published Date**: August 18, 2024 at 21:33 UTC - **Last Updated**: August 19, 2024 at 14:28 UTC - **Reserved Date**: August 09, 2024 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team wpForo Forum.This issue affects wpForo Forum: from n/a through 2.3.4. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **gVectors Team - wpForo Forum** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wpforo/wordpress-wpforo-forum-plugin-2-3-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve) ### Credits - Ananda Dhakal (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0357 - **State**: PUBLISHED - **Published Date**: April 14, 2015 at 22:00 UTC - **Last Updated**: August 06, 2024 at 04:03 UTC - **Reserved Date**: December 01, 2014 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2015:0718](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html) 2. [SUSE-SU-2015:0722](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html) 3. [GLSA-201504-07](https://security.gentoo.org/glsa/201504-07) 4. [1032105](http://www.securitytracker.com/id/1032105) 5. [RHSA-2015:0813](http://rhn.redhat.com/errata/RHSA-2015-0813.html) 6. [](https://helpx.adobe.com/security/products/flash-player/apsb15-06.html) 7. [openSUSE-SU-2015:0725](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html) 8. [SUSE-SU-2015:0723](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4275, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4275 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4275 - **State**: PUBLISHED - **Published Date**: December 03, 2022 at 00:00 UTC - **Last Updated**: April 15, 2025 at 13:09 UTC - **Reserved Date**: December 03, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-707: Security Weakness ### Affected Products **unspecified - House Rental System** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/nikeshtiwari1/House-Rental-System/issues/7) 2. [](https://vuldb.com/?id.214771)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5237, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5237 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5237 - **State**: PUBLISHED - **Published Date**: December 01, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 11:41 UTC - **Reserved Date**: August 13, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Server-side request forgery (SSRF) vulnerability in the documentconverter component in Open-Xchange (OX) AppSuite before 7.4.2-rev10 and 7.6.x before 7.6.0-rev10 allows remote attackers to trigger requests to arbitrary servers and embed arbitrary images via a URL in an embedded image in a Text document, which is not properly handled by the image preview. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20140915 Open-Xchange Security Advisory 2014-09-15](http://www.securityfocus.com/archive/1/533443/100/0/threaded) 2. [](http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html) 3. [](http://software.open-xchange.com/OX6/doc/Release_Notes_for_Patch_Release_2112_7.6.0_2014-08-25.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1315, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1315 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1315 - **State**: PUBLISHED - **Published Date**: March 10, 2023 at 00:00 UTC - **Last Updated**: March 03, 2025 at 20:57 UTC - **Reserved Date**: March 10, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to v1.16.6. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **osticket - osticket/osticket** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e) 2. [](https://github.com/osticket/osticket/commit/ec6043935b4e30b5c0dfa544e256717182808a2e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22730 - **State**: PUBLISHED - **Published Date**: February 04, 2025 at 14:21 UTC - **Last Updated**: February 18, 2025 at 18:23 UTC - **Reserved Date**: January 07, 2025 at 21:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Ksher Ksher allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ksher: from n/a through 1.1.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Ksher - Ksher** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ksher-payment/vulnerability/wordpress-ksher-plugin-1-1-2-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35867 - **State**: PUBLISHED - **Published Date**: December 31, 2020 at 08:29 UTC - **Last Updated**: August 04, 2024 at 17:16 UTC - **Reserved Date**: December 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2020-0014.html) 2. [](https://github.com/rusqlite/rusqlite/releases/tag/0.23.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10310 - **State**: PUBLISHED - **Published Date**: November 02, 2024 at 02:03 UTC - **Last Updated**: November 02, 2024 at 16:43 UTC - **Reserved Date**: October 23, 2024 at 17:14 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Gallery Widget 'image_title' parameter in all versions up to, and including, 5.10.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **bdthemes - Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/144d755a-e61a-4ecd-9d9a-9c6e3a1e6ea2?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3176764/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php) ### Credits - D.Sim
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3499 - **State**: PUBLISHED - **Published Date**: August 06, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:45 UTC - **Reserved Date**: August 06, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in "a page in the workarea folder" in Ektron CMS400.NET 7.00 through 7.04 and 7.50 through 7.52 has unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.ektron.com/kb_article.aspx?id=18294) 2. [cms400net-workareafolder-unspecified(44488)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44488) 3. [30858](http://secunia.com/advisories/30858)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6485 - **State**: PUBLISHED - **Published Date**: May 21, 2020 at 03:46 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html) 2. [](https://crbug.com/1047285) 3. [GLSA-202006-02](https://security.gentoo.org/glsa/202006-02) 4. [openSUSE-SU-2020:0823](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html) 5. [openSUSE-SU-2020:0832](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html) 6. [FEDORA-2020-08561721ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/) 7. [DSA-4714](https://www.debian.org/security/2020/dsa-4714) 8. [FEDORA-2020-77f89ab772](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5994 - **State**: PUBLISHED - **Published Date**: June 14, 2024 at 06:53 UTC - **Last Updated**: August 01, 2024 at 21:25 UTC - **Reserved Date**: June 14, 2024 at 06:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers that have been explicitly granted permissions by an administrator, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **wpgmaps - WP Go Maps (formerly WP Google Maps)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/dd0597d2-07ba-4fb4-bf73-95770f8c3d6b?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-google-maps/trunk/html/settings-page.html.php#L538) 3. [](https://plugins.trac.wordpress.org/browser/wp-google-maps/trunk/html/atlas-novus/settings-page.html.php#L442) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8767 - **State**: PUBLISHED - **Published Date**: February 08, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 08:29 UTC - **Reserved Date**: January 11, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-2930-1](http://www.ubuntu.com/usn/USN-2930-1) 2. [USN-2967-1](http://www.ubuntu.com/usn/USN-2967-1) 3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html) 4. [RHSA-2016:1341](https://access.redhat.com/errata/RHSA-2016:1341) 5. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html) 6. [RHSA-2016:0715](http://rhn.redhat.com/errata/RHSA-2016-0715.html) 7. [USN-2930-2](http://www.ubuntu.com/usn/USN-2930-2) 8. [RHSA-2016:1301](https://access.redhat.com/errata/RHSA-2016:1301) 9. [[oss-security] 20160111 CVE Request: Linux kernel - SCTP denial of service during heartbeat timeout functions.](http://www.openwall.com/lists/oss-security/2016/01/11/4) 10. [DSA-3503](http://www.debian.org/security/2016/dsa-3503) 11. [USN-2967-2](http://www.ubuntu.com/usn/USN-2967-2) 12. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e) 13. [USN-2930-3](http://www.ubuntu.com/usn/USN-2930-3) 14. [SUSE-SU-2016:1102](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html) 15. [USN-2932-1](http://www.ubuntu.com/usn/USN-2932-1) 16. [](https://bugzilla.redhat.com/show_bug.cgi?id=1297389) 17. [FEDORA-2016-5d43766e33](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html) 18. [SUSE-SU-2016:2074](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html) 19. [80268](http://www.securityfocus.com/bid/80268) 20. [](https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e) 21. [USN-2931-1](http://www.ubuntu.com/usn/USN-2931-1) 22. [DSA-3448](http://www.debian.org/security/2016/dsa-3448) 23. [openSUSE-SU-2016:1008](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html) 24. [RHSA-2016:1277](https://access.redhat.com/errata/RHSA-2016:1277) 25. [SUSE-SU-2016:0911](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36388 - **State**: PUBLISHED - **Published Date**: June 02, 2024 at 13:14 UTC - **Last Updated**: August 02, 2024 at 03:37 UTC - **Reserved Date**: May 27, 2024 at 13:04 UTC - **Assigned By**: INCD ### Vulnerability Description MileSight DeviceHub - CWE-305 Missing Authentication for Critical Function ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-305: Security Weakness ### Affected Products **MileSight - DeviceHub** Affected versions: - v3.0.1-r1 for Ubuntu 20.04 (Status: affected) ### References 1. [](https://www.gov.il/en/Departments/faq/cve_advisories) ### Credits - Claroty Research – Team 82
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33470, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33470 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33470 - **State**: PUBLISHED - **Published Date**: May 24, 2024 at 15:03 UTC - **Last Updated**: February 13, 2025 at 15:52 UTC - **Reserved Date**: April 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in the SMTP Email Settings of AVTECH Room Alert 4E v4.4.0 allows attackers to gain access to credentials in plaintext via a passback attack. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://avtech.com/articles/27443/security-advisory-smtp-password-disclosure-in-dom/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6361 - **State**: PUBLISHED - **Published Date**: March 02, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 11:27 UTC - **Reserved Date**: March 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in index.php in InSun Feed CMS 1.7.3 19Beta allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the lang parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.securityfocus.com/bid/32783/exploit) 2. [32783](http://www.securityfocus.com/bid/32783) 3. [feedcms-index-file-include(47276)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47276) 4. [7422](https://www.exploit-db.com/exploits/7422)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3201 - **State**: PUBLISHED - **Published Date**: September 15, 2009 at 23:00 UTC - **Last Updated**: August 07, 2024 at 06:14 UTC - **Reserved Date**: September 15, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in Media Player Classic 6.4.9 allows user-assisted remote attackers to cause a denial of service (application crash) via a MIDI file (.mid) with a malformed header, which triggers a buffer overflow, a different vulnerability than CVE-2007-4940. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9620](http://www.exploit-db.com/exploits/9620) 2. [36333](http://www.securityfocus.com/bid/36333)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39416 - **State**: PUBLISHED - **Published Date**: November 05, 2021 at 16:00 UTC - **Last Updated**: August 04, 2024 at 02:06 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sisl.lab.uic.edu/projects/chess/remote-clinic/) 2. [](https://github.com/remoteclinic/RemoteClinic/issues/17) 3. [](https://remoteclinic.io)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5262, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5262 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5262 - **State**: PUBLISHED - **Published Date**: December 20, 2017 at 22:00 UTC - **Last Updated**: August 05, 2024 at 14:55 UTC - **Reserved Date**: January 09, 2017 at 00:00 UTC - **Assigned By**: rapid7 ### Vulnerability Description In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the SNMP read-only (RO) community string has access to sensitive information by OID reference. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Cambium Networks - cnPilot** Affected versions: - 4.3.2-R4 and prior (Status: affected) ### References 1. [](https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1340, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1340 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1340 - **State**: PUBLISHED - **Published Date**: June 09, 2020 at 19:44 UTC - **Last Updated**: August 04, 2024 at 06:32 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A spoofing vulnerability exists when the NuGetGallery does not properly sanitize input on package metadata values, aka 'NuGetGallery Spoofing Vulnerability'. ### Affected Products **Microsoft - NuGetGallery** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1340)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4220 - **State**: REJECTED - **Published Date**: February 16, 2022 at 16:38 UTC - **Last Updated**: February 16, 2022 at 16:38 UTC - **Reserved Date**: February 15, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49685 - **State**: PUBLISHED - **Published Date**: October 31, 2024 at 09:59 UTC - **Last Updated**: October 31, 2024 at 13:00 UTC - **Reserved Date**: October 17, 2024 at 09:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Custom Twitter Feeds (Tweets Widget) allows Cross Site Request Forgery.This issue affects Custom Twitter Feeds (Tweets Widget): from n/a through 2.2.3. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Smash Balloon - Custom Twitter Feeds (Tweets Widget)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/custom-twitter-feeds/wordpress-custom-twitter-feeds-plugin-2-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0197 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description psyBNC 2.3 beta and earlier allows remote attackers to spoof encrypted, trusted messages by sending lines that begin with the "[B]" sequence, which makes the message appear legitimate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020122 psyBNC2.3 Beta - encrypted text spoofable in others irc terminal](http://online.securityfocus.com/archive/1/251832) 2. [20020122 psyBNC 2.3 Beta - encrypted text "spoofable" in others' irc terminals](http://marc.info/?l=bugtraq&m=101173478806580&w=2) 3. [3931](http://www.securityfocus.com/bid/3931) 4. [psybnc-view-encrypted-messages(7985)](http://www.iss.net/security_center/static/7985.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32401 - **State**: PUBLISHED - **Published Date**: January 10, 2024 at 22:03 UTC - **Last Updated**: November 14, 2024 at 17:10 UTC - **Reserved Date**: May 08, 2023 at 22:31 UTC - **Assigned By**: apple ### Vulnerability Description A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.6.6, macOS Big Sur 11.7.7, macOS Ventura 13.4. Parsing an office document may lead to an unexpected app termination or arbitrary code execution. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213758) 2. [](https://support.apple.com/en-us/HT213759) 3. [](https://support.apple.com/en-us/HT213760)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11951 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 15:06 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 13, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15028 - **State**: PUBLISHED - **Published Date**: July 07, 2020 at 15:37 UTC - **Last Updated**: August 04, 2024 at 13:00 UTC - **Reserved Date**: June 24, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NeDi 1.9C is vulnerable to a cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Map.php xo parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.nedi.ch/download/) 2. [](https://gist.github.com/p4nk4jv/68ae8b773dbea6d8769295ba96d9f1e3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7061 - **State**: PUBLISHED - **Published Date**: May 02, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 17:53 UTC - **Reserved Date**: December 11, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators to bypass restrictions and obtain sensitive information via an unspecified search API. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://plone.org/security/20131210/catalogue-exposure) 2. [[oss-security] 20131211 Re: CVE request for Plone](http://www.openwall.com/lists/oss-security/2013/12/12/3) 3. [[oss-security] 20131210 CVE request for Plone](http://www.openwall.com/lists/oss-security/2013/12/10/15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6552 - **State**: PUBLISHED - **Published Date**: April 05, 2019 at 18:02 UTC - **Last Updated**: August 04, 2024 at 20:23 UTC - **Reserved Date**: January 22, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Advantech - WebAccess/SCADA** Affected versions: - Versions 8.3.5 and prior. (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-092-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3143 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 20:05 UTC - **Reserved Date**: April 01, 2024 at 17:55 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/member_rank.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - DedeCMS** Affected versions: - 5.7 (Status: affected) ### References 1. [VDB-258918 | DedeCMS member_rank.php cross-site request forgery](https://vuldb.com/?id.258918) 2. [VDB-258918 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.258918) 3. [Submit #303432 | Github DedeCMS V5.7 CSRF](https://vuldb.com/?submit.303432) 4. [](https://github.com/E1CHO/demo/blob/main/39.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2101 - **State**: PUBLISHED - **Published Date**: June 07, 2012 at 19:00 UTC - **Last Updated**: August 06, 2024 at 19:26 UTC - **Reserved Date**: April 04, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security group rules, which allows remote authenticated users with certain permissions to cause a denial of service (CPU and hard drive consumption) via a network request that triggers a large number of iptables rules. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openstack/nova/commit/1f644d210557b1254f7c7b39424b09a45329ade7) 2. [81641](http://www.osvdb.org/81641) 3. [](https://github.com/openstack/nova/commit/8c8735a73afb16d5856f0aa6088e9ae406c52beb) 4. [USN-1438-1](http://ubuntu.com/usn/usn-1438-1) 5. [[openstack] 20120419 [OSSA 2012-005] No quota enforced on security group rules](https://lists.launchpad.net/openstack/msg10268.html) 6. [nova-quotas-dos(75243)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75243) 7. [FEDORA-2012-6365](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079434.html) 8. [](https://github.com/openstack/nova/commit/a67db4586f70ed881d65e80035b2a25be195ce64) 9. [FEDORA-2012-6273](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079551.html) 10. [49048](http://secunia.com/advisories/49048) 11. [](https://bugs.launchpad.net/nova/+bug/969545) 12. [49034](http://secunia.com/advisories/49034)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10643 - **State**: PUBLISHED - **Published Date**: April 17, 2019 at 18:50 UTC - **Last Updated**: August 04, 2024 at 22:32 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Contao 4.7 allows Use of a Key Past its Expiration Date. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://contao.org/en/news.html) 2. [](https://contao.org/en/news/security-vulnerability-cve-2019-10643.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27408, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27408 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27408 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 16:31 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The affected product is vulnerable to an out-of-bounds read, which can cause information leakage leading to arbitrary code execution if chained to the out-of-bounds write vulnerability on the Welch Allyn medical device management tools (Welch Allyn Service Tool: versions prior to v1.10, Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE): versions prior to v5.3, Welch Allyn Software Development Kit (SDK): versions prior to v3.2, Welch Allyn Connex Central Station (CS): versions prior to v1.8.6, Welch Allyn Service Monitor: versions prior to v1.7.0.0, Welch Allyn Connex Vital Signs Monitor (CVSM): versions prior to v2.43.02, Welch Allyn Connex Integrated Wall System (CIWS): versions prior to v2.43.02, Welch Allyn Connex Spot Monitor (CSM): versions prior to v1.52, Welch Allyn Spot Vital Signs 4400 Device (Spot 4400) / Welch Allyn Spot 4400 Vital Signs Extended Care Device: versions prior to v1.11.00). ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **n/a - Welch Allyn medical device management tools** Affected versions: - Welch Allyn Service Tool: versions prior to v1.10, Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE): versions prior to v5.3, Welch Allyn Software Development Kit (SDK): versions prior to v3.2, Welch Allyn Connex Central Station (CS): versions prior to v1.8.6, Welch Allyn Service Monitor: versions prior to v1.7.0.0, Welch Allyn Connex Vital Signs Monitor (CVSM): versions prior to v2.43.02, Welch Allyn Connex Integrated Wall System (CIWS): versions prior to v2.43.02, Welch Allyn Connex Spot Monitor (CSM): versions prior to v1.52, Welch Allyn Spot Vital Signs 4400 Device (Spot 4400) / Welch Allyn Spot 4400 Vital Signs Extended Care Device: versions prior to v1.11.00 (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsma-21-152-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2799, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2799 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2799 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: April 11, 2013 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2394, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2394 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2394 - **State**: PUBLISHED - **Published Date**: May 16, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 17:51 UTC - **Reserved Date**: May 15, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in chat.php in PHP Live Helper allows remote attackers to inject arbitrary web script or HTML via the PHPSESSID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [895](http://securityreason.com/securityalert/895) 2. [phplivehelper-chat-xss(26497)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26497) 3. [20060512 PHP Live Helper ASP(chat.php) XSS](http://www.securityfocus.com/archive/1/433888/100/0/threaded) 4. [17960](http://www.securityfocus.com/bid/17960)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48997 - **State**: PUBLISHED - **Published Date**: November 12, 2024 at 17:54 UTC - **Last Updated**: January 30, 2025 at 00:10 UTC - **Reserved Date**: October 11, 2024 at 20:57 UTC - **Assigned By**: microsoft ### Vulnerability Description SQL Server Native Client Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Microsoft SQL Server 2017 (GDR)** Affected versions: - 14.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2019 (GDR)** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2016 Service Pack 3 (GDR)** Affected versions: - 13.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack** Affected versions: - 13.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2017 (CU 31)** Affected versions: - 14.0.0 (Status: affected) **Microsoft - Microsoft SQL Server 2019 (CU 29)** Affected versions: - 15.0.0 (Status: affected) ### References 1. [SQL Server Native Client Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48997)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1297, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1297 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1297 - **State**: PUBLISHED - **Published Date**: September 11, 2019 at 21:25 UTC - **Last Updated**: February 07, 2025 at 16:18 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. ### Affected Products **Microsoft - Microsoft Excel** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) **Microsoft - Microsoft Office** Affected versions: - 2016 for Mac (Status: affected) - 2019 for 32-bit editions (Status: affected) - 2019 for 64-bit editions (Status: affected) - 2019 for Mac (Status: affected) **Microsoft - Office 365 ProPlus** Affected versions: - 32-bit Systems (Status: affected) - 64-bit Systems (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1297)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25435, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25435 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25435 - **State**: PUBLISHED - **Published Date**: July 08, 2021 at 13:46 UTC - **Last Updated**: August 03, 2024 at 20:03 UTC - **Reserved Date**: January 19, 2021 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Tizen wearable devices** Affected versions: - Tizen 5.5 (Status: affected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4686 - **State**: PUBLISHED - **Published Date**: May 09, 2024 at 20:31 UTC - **Last Updated**: August 01, 2024 at 20:47 UTC - **Reserved Date**: May 09, 2024 at 08:50 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /view/emarks_range_grade_update_form.php. The manipulation of the argument grade leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263627. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263627 | Campcodes Complete Web-Based School Management System emarks_range_grade_update_form.php cross site scripting](https://vuldb.com/?id.263627) 2. [VDB-263627 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263627) 3. [Submit #331776 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331776) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2033.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37352 - **State**: PUBLISHED - **Published Date**: March 29, 2023 at 00:00 UTC - **Last Updated**: February 18, 2025 at 16:44 UTC - **Reserved Date**: August 02, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of WMF files. Crafted data in a WMF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17638. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.3.361.0 (Status: affected) ### References 1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1080/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28396 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 00:00 UTC - **Last Updated**: August 28, 2024 at 20:21 UTC - **Reserved Date**: March 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html) 2. [](https://security.friendsofpresta.org/modules/2024/03/14/ordersexport.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17015 - **State**: PUBLISHED - **Published Date**: November 11, 2020 at 06:48 UTC - **Last Updated**: September 10, 2024 at 15:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft SharePoint Server Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft SharePoint Enterprise Server 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Server 2019** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Foundation 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17015)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-53112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-53112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-53112 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 15:55 UTC - **Last Updated**: May 04, 2025 at 07:50 UTC - **Reserved Date**: May 02, 2025 at 15:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU mask internally in UAPI format") exposed a potential out-of-bounds access, reported by UBSAN as following on a laptop with a gen 11 i915 card: UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intel_sseu.c:65:27 index 6 is out of range for type 'u16 [6]' CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022 Call Trace: <TASK> show_stack+0x4e/0x61 dump_stack_lvl+0x4a/0x6f dump_stack+0x10/0x18 ubsan_epilogue+0x9/0x3a __ubsan_handle_out_of_bounds.cold+0x42/0x47 gen11_compute_sseu_info+0x121/0x130 [i915] intel_sseu_info_init+0x15d/0x2b0 [i915] intel_gt_init_mmio+0x23/0x40 [i915] i915_driver_mmio_probe+0x129/0x400 [i915] ? intel_gt_probe_all+0x91/0x2e0 [i915] i915_driver_probe+0xe1/0x3f0 [i915] ? drm_privacy_screen_get+0x16d/0x190 [drm] ? acpi_dev_found+0x64/0x80 i915_pci_probe+0xac/0x1b0 [i915] ... According to the definition of sseu_dev_info, eu_mask->hsw is limited to a maximum of GEN_MAX_SS_PER_HSW_SLICE (6) sub-slices, but gen11_sseu_info_init() can potentially set 8 sub-slices, in the !IS_JSL_EHL(gt->i915) case. Fix this by reserving up to 8 slots for max_subslices in the eu_mask struct. (cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822) ### Affected Products **Linux - Linux** Affected versions: - bc3c5e0809ae9faa039baf75547e8ee46ec124ef (Status: affected) - bc3c5e0809ae9faa039baf75547e8ee46ec124ef (Status: affected) - bc3c5e0809ae9faa039baf75547e8ee46ec124ef (Status: affected) **Linux - Linux** Affected versions: - 6.0 (Status: affected) - 0 (Status: unaffected) - 6.1.21 (Status: unaffected) - 6.2.8 (Status: unaffected) - 6.3 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/1a1682abf7399318ac074b1f2ac6a8c992b5b3da) 2. [](https://git.kernel.org/stable/c/36b076ab6247cf0d2135b2ad6bb337617c3b5a1b) 3. [](https://git.kernel.org/stable/c/193c41926d152761764894f46e23b53c00186a82)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5451 - **State**: PUBLISHED - **Published Date**: October 23, 2006 at 17:00 UTC - **Last Updated**: August 07, 2024 at 19:48 UTC - **Reserved Date**: October 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) action, (2) file, and (3) users array variables in (a) admin.php, which are not properly handled when the administrator views the Activity Log; and the (4) torrent parameter, as used by the displayName variable, in (b) startpop.php, different vectors than CVE-2006-5227. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061017 TorrentFlux ?file? Script Insertion](http://www.securityfocus.com/archive/1/448948/100/0/threaded) 2. [ADV-2006-4043](http://www.vupen.com/english/advisories/2006/4043) 3. [20061017 TorrentFlux ?action? Script Insertion](http://www.securityfocus.com/archive/1/448947/100/0/threaded) 4. [20061013 TorrentFlux ?startpop.php? ?torrent? Script Insertion](http://www.securityfocus.com/archive/1/448619/100/100/threaded) 5. [](http://www.stevenroddis.com.au/2006/10/13/torrentflux-startpopphp-torrent-script-insertion/) 6. [20061017 TorrentFlux ?user_id? Script Insertion](http://www.securityfocus.com/archive/1/448952/100/0/threaded) 7. [22384](http://secunia.com/advisories/22384) 8. [](http://www.stevenroddis.com.au/2006/10/17/torrentflux-user_id-script-insertion/) 9. [torrentflux-startpop-xss(29592)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29592) 10. [20534](http://www.securityfocus.com/bid/20534) 11. [](http://www.stevenroddis.com.au/2006/10/17/torrentflux-file-script-insertion/) 12. [](http://www.stevenroddis.com.au/2006/10/17/torrentflux-action-script-insertion/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17186 - **State**: PUBLISHED - **Published Date**: October 08, 2019 at 18:12 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description /var/WEB-GUI/cgi-bin/telnet.cgi on FiberHome HG2201T 1.00.M5007_JS_201804 devices allows pre-authentication remote code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/ztz472947849/d62e7b6f4831b55c338ef22432eca06d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0531 - **State**: PUBLISHED - **Published Date**: January 26, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/login.php in FreeWebShop 2.2.3 and 2.2.4 before 20070123 allows remote attackers to execute arbitrary PHP code via a URL in the lang_file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [freewebshop-login-file-include(31732)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31732) 2. [1017549](http://securitytracker.com/id?1017549) 3. [](http://www.freewebshop.org/?id=36) 4. [23898](http://secunia.com/advisories/23898) 5. [32951](http://osvdb.org/32951) 6. [](http://14house.blogspot.com/2007/01/freewebshoporg-remote-file-inclusion.html) 7. [ADV-2007-0319](http://www.vupen.com/english/advisories/2007/0319)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6630, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6630 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6630 - **State**: PUBLISHED - **Published Date**: February 05, 2018 at 18:00 UTC - **Last Updated**: September 17, 2024 at 04:00 UTC - **Reserved Date**: February 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8000014c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Micropoint_POC/tree/master/mp110005/8000014c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2263, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2263 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2263 - **State**: PUBLISHED - **Published Date**: March 19, 2013 at 14:00 UTC - **Last Updated**: August 06, 2024 at 15:27 UTC - **Reserved Date**: February 20, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Citrix Access Gateway Standard Edition 5.0.x before 5.0.4.223524 allows remote attackers to access network resources via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.citrix.com/article/CTX136623) 2. [citrix-gateway-unspec-security-bypass(82591)](https://exchange.xforce.ibmcloud.com/vulnerabilities/82591) 3. [52479](http://secunia.com/advisories/52479) 4. [1028255](http://www.securitytracker.com/id/1028255) 5. [90905](http://osvdb.org/90905)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3750 - **State**: PUBLISHED - **Published Date**: December 03, 2019 at 20:20 UTC - **Last Updated**: September 16, 2024 at 23:11 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability. A local authenticated malicious user with low privileges potentially could exploit this vulnerability to delete arbitrary files by creating a symlink from the "Temp\IC\ICDebugLog.txt" to any targeted file. This issue occurs because of insecure handling of Temp directory permissions that were set incorrectly. ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **Dell - Dell Command Update (DCU)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/article/SLN319697)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52499 - **State**: PUBLISHED - **Published Date**: November 28, 2024 at 10:38 UTC - **Last Updated**: November 29, 2024 at 18:54 UTC - **Reserved Date**: November 11, 2024 at 06:43 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kardi Pricing table addon for elementor allows PHP Local File Inclusion.This issue affects Pricing table addon for elementor: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **Kardi - Pricing table addon for elementor** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/pricing-table-addon-for-elementor/vulnerability/wordpress-pricing-table-addon-for-elementor-plugin-1-0-0-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6341 - **State**: REJECTED - **Last Updated**: July 02, 2024 at 17:26 UTC - **Reserved Date**: June 26, 2024 at 01:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35695 - **State**: PUBLISHED - **Published Date**: December 21, 2022 at 01:21 UTC - **Last Updated**: April 23, 2025 at 16:26 UTC - **Reserved Date**: July 12, 2022 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Experience Manager** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7196, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7196 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7196 - **State**: PUBLISHED - **Published Date**: May 09, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 20:57 UTC - **Reserved Date**: April 22, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tomcat.apache.org/security-4.html) 2. [34888](http://osvdb.org/34888) 3. [29242](http://secunia.com/advisories/29242) 4. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded) 5. [SUSE-SR:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html) 6. [33668](http://secunia.com/advisories/33668) 7. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded) 8. [25531](http://www.securityfocus.com/bid/25531) 9. [ADV-2007-1729](http://www.vupen.com/english/advisories/2007/1729) 10. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233) 11. [](http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm) 12. [20070904 Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability](http://www.securityfocus.com/archive/1/478491/100/0/threaded) 13. [](http://tomcat.apache.org/security-5.html) 14. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html) 15. [20070905 Re: Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability](http://www.securityfocus.com/archive/1/478609/100/0/threaded) 16. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx) 17. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540) 18. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E) 19. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E) 20. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15441 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 16:27 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Samsung on7xeltelgt Android device with a build fingerprint of samsung/on7xeltelgt/on7xeltelgt:8.1.0/M1AJQ/G610LKLU2CSB1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.kryptowire.com/android-firmware-2019/)