System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-6339, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-6339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6339
- **State**: PUBLISHED
- **Published Date**: January 22, 2019 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 20:06 UTC
- **Reserved Date**: January 15, 2019 at 00:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
### Affected Products
**Drupal - Drupal core**
Affected versions:
- 7.x (Status: affected)
- 8.6.x (Status: affected)
- 8.5.x (Status: affected)
### References
1. [DSA-4370](https://www.debian.org/security/2019/dsa-4370)
2. [](https://www.drupal.org/sa-core-2019-002)
3. [[debian-lts-announce] 20190202 [SECURITY] [DLA 1659-1] drupal7 security update](https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-51744, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-51744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51744
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 10:00 UTC
- **Last Updated**: June 09, 2025 at 20:32 UTC
- **Reserved Date**: December 22, 2023 at 11:30 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V14.3.0.6 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions < V13.3.0.13 (Status: affected)
**Siemens - Teamcenter Visualization V14.1**
Affected versions:
- All versions < V14.1.0.12 (Status: affected)
**Siemens - Teamcenter Visualization V14.2**
Affected versions:
- All versions < V14.2.0.9 (Status: affected)
**Siemens - Teamcenter Visualization V14.3**
Affected versions:
- All versions < V14.3.0.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-7207, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-7207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-7207
- **State**: PUBLISHED
- **Published Date**: June 22, 2007 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 18:24 UTC
- **Reserved Date**: June 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in ageet AGEphone before 1.4.0 might allow remote attackers to have an unknown impact via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ageet.com/us/agephone/help/index.htm#vers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3728, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3728
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:51 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 12, 2024 at 18:14 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Filterable Gallery & Interactive Circle widgets in all versions up to, and including, 5.9.15 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**wpdevteam - Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php)
3. [](https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php)
### Credits
- Matthew Rollings
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-15643, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-15643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15643
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the saveAsText method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10549.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Marvell - QConvergeConsole**
Affected versions:
- 5.5.0.64 (Status: affected)
### References
1. [](https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-971/)
3. [](https://www.tenable.com/security/research/tra-2020-56)
### Credits
- rgod
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16854, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16854
- **State**: PUBLISHED
- **Published Date**: November 26, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in moodle versions 3.5 to 3.5.2, 3.4 to 3.4.5, 3.3 to 3.3.8, 3.1 to 3.1.14 and earlier. The login form is not protected by a token to prevent login cross-site request forgery. Fixed versions include 3.6, 3.5.3, 3.4.6, 3.3.9 and 3.1.15.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**[UNKNOWN] - moodle**
Affected versions:
- 3.6 (Status: affected)
- 3.5.3 (Status: affected)
- 3.4.6 (Status: affected)
- 3.3.9 (Status: affected)
- 3.1.15 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16854)
2. [1042154](http://www.securitytracker.com/id/1042154)
3. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-63183)
4. [106017](http://www.securityfocus.com/bid/106017)
5. [](https://moodle.org/mod/forum/discuss.php?d=378731)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-27263, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-27263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27263
- **State**: PUBLISHED
- **Published Date**: March 30, 2021 at 14:35 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 16, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 10.1.0.37527 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-345/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10028, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10028
- **State**: PUBLISHED
- **Published Date**: June 21, 2019 at 20:10 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 25, 2019 at 00:00 UTC
- **Assigned By**: netflix
### Vulnerability Description
Denial of Service (DOS) in Dial Reference Source Code Used before June 18th, 2019.
### Affected Products
**Netflix - Dial Reference Source Code Repo (https://github.com/Netflix/dial-reference)**
Affected versions:
- Before June 18 (Status: affected)
- 2019. (Status: affected)
### References
1. [](https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2019-002.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-14869, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-14869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14869
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: August 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Template Store Script 3.0.6 allows XSS via the Address line 1, Address Line 2, Bank name, or A/C Holder name field in a profile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45143](https://www.exploit-db.com/exploits/45143/)
2. [](https://googlequeens.com/2018/08/03/cve-2018-14869-php-template-store-script-3-0-6-stored-xss-vulnerability/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12015, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12015
- **State**: REJECTED
- **Published Date**: June 01, 2020 at 14:55 UTC
- **Last Updated**: June 01, 2020 at 14:55 UTC
- **Reserved Date**: May 13, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0757, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0757
- **State**: PUBLISHED
- **Published Date**: February 15, 2012 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 20:12 UTC
- **Reserved Date**: January 18, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb12-02.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1264, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1264
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 19:10 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Cloud Foundry Log Cache, versions prior to 1.1.1, logs its UAA client secret on startup as part of its envstruct report. A remote attacker who has gained access to the Log Cache VM can read this secret, gaining all privileges held by the Log Cache UAA client. In the worst case, if this client is an admin, the attacker would gain complete control over the Foundation.
### Affected Products
**Cloud Foundry - log-cache-release**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://www.cloudfoundry.org/blog/cve-2018-1264/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-5637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-5637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5637
- **State**: PUBLISHED
- **Published Date**: January 07, 2020 at 16:27 UTC
- **Last Updated**: August 06, 2024 at 17:15 UTC
- **Reserved Date**: August 27, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PQI AirCard has persistent XSS
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://firmware.re/vulns/acsa-2013-007.php)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-4304, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-4304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4304
- **State**: PUBLISHED
- **Published Date**: September 30, 2019 at 15:20 UTC
- **Last Updated**: September 16, 2024 at 18:38 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server - Liberty could allow a remote attacker to bypass security restrictions caused by improper session validation. IBM X-Force ID: 160950.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- Liberty (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/960171)
2. [ibm-websphere-cve20194304-session-fixation (160950)](https://exchange.xforce.ibmcloud.com/vulnerabilities/160950)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-1715, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-1715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1715
- **State**: REJECTED
- **Published Date**: August 01, 2024 at 03:49 UTC
- **Last Updated**: August 02, 2024 at 15:04 UTC
- **Reserved Date**: February 21, 2024 at 17:13 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9886, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9886
- **State**: PUBLISHED
- **Published Date**: August 06, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:02 UTC
- **Reserved Date**: June 24, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
arch/arm/mach-msm/qdsp6v2/ultrasound/usf.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not properly validate input parameters, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28815575 and Qualcomm internal bug CR555030.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-08-01.html)
2. [](https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=80be0e249c906704085d13d4ae446f73913fc225)
3. [92219](http://www.securityfocus.com/bid/92219)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-30257, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-30257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30257
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 20:51 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in the component /proc/ftxxxx-debug of FiiO M6 Build Number v1.0.4 allows attackers to escalate privileges to root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/stigward/PoCs-and-Exploits/tree/main/fiio_LPE_0day)
2. [](https://stigward.github.io/posts/fiio-m6-exploit/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18564, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18564
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 17:19 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The sender plugin before 1.2.1 for WordPress has multiple XSS issues.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/sender/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-51827, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-51827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51827
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:31 UTC
- **Last Updated**: November 20, 2024 at 14:26 UTC
- **Reserved Date**: November 04, 2024 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boombox Boombox Shortcode allows DOM-Based XSS.This issue affects Boombox Shortcode: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Boombox - Boombox Shortcode**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/boombox-shortcode/wordpress-boombox-shortcode-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2554, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2554
- **State**: PUBLISHED
- **Published Date**: May 16, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2952-1](http://www.ubuntu.com/usn/USN-2952-1)
2. [openSUSE-SU-2016:1173](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html)
3. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
4. [SUSE-SU-2016:1166](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html)
5. [USN-2952-2](http://www.ubuntu.com/usn/USN-2952-2)
6. [](http://php.net/ChangeLog-5.php)
7. [](https://bugs.php.net/bug.php?id=71488)
8. [](http://php.net/ChangeLog-7.php)
9. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731)
10. [SUSE-SU-2016:1145](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7434, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7434
- **State**: PUBLISHED
- **Published Date**: March 02, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:47 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
In the JDBC driver of NetIQ Identity Manager before 4.6 sending out incorrect XML configurations could result in passwords being logged into exception logfiles.
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**NetIQ - Identity Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1005907)
2. [](https://www.netiq.com/documentation/identity-manager-46/releasenotes_idm46/data/releasenotes_idm46.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3516, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3516
- **State**: PUBLISHED
- **Published Date**: September 24, 2020 at 17:51 UTC
- **Last Updated**: November 13, 2024 at 18:01 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web server authentication of Cisco IOS XE Software could allow an authenticated, remote attacker to crash the web server on the device. The vulnerability is due to insufficient input validation during authentication. An attacker could exploit this vulnerability by entering unexpected characters during a valid authentication. A successful exploit could allow the attacker to crash the web server on the device, which must be manually recovered by disabling and re-enabling the web server.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200924 Cisco IOS XE Software Web UI Improper Input Validation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-WEB-UI-exNFmcPO)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10083, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10083
- **State**: PUBLISHED
- **Published Date**: April 13, 2018 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 02:56 UTC
- **Reserved Date**: April 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary file deletion vulnerability in the admin dashboard via directory traversal sequences in the val parameter within a cmd=del request, because code under modules\FilePicker does not restrict the val parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/cve/blob/master/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0807, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0807
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 23:52 UTC
- **Last Updated**: February 13, 2025 at 17:27 UTC
- **Reserved Date**: January 23, 2024 at 00:47 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 121.0.6167.85 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html)
2. [](https://crbug.com/1505080)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4925
- **State**: PUBLISHED
- **Published Date**: July 29, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 26, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828)
2. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478&r2=50477&pathrev=50478)
3. [oval:org.mitre.oval:def:17585](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17585)
4. [54425](http://secunia.com/advisories/54425)
5. [](http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html)
6. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
7. [](https://www.wireshark.org/security/wnpa-sec-2013-44.html)
8. [54296](http://secunia.com/advisories/54296)
9. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=50478)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29527, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29527
- **State**: PUBLISHED
- **Published Date**: April 20, 2022 at 09:09 UTC
- **Last Updated**: August 03, 2024 at 06:26 UTC
- **Reserved Date**: April 20, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/aws/amazon-ssm-agent/releases/tag/3.1.1208.0)
2. [](https://github.com/aws/amazon-ssm-agent/commit/0fe8ae99b2ff25649c7b86d3bc05fc037400aca7)
3. [](https://bugzilla.suse.com/show_bug.cgi?id=1196556)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1845, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1845
- **State**: PUBLISHED
- **Published Date**: March 22, 2012 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 22, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the DEP and ASLR protection mechanisms, and execute arbitrary code, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pwn2own.zerodayinitiative.com/status.html)
2. [](http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/)
3. [google-chrome-dep-code-execution(74323)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74323)
4. [](http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588)
5. [oval:org.mitre.oval:def:14843](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14843)
6. [](http://twitter.com/vupen/statuses/177576000761237505)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-0569, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-0569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0569
- **State**: PUBLISHED
- **Published Date**: January 21, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:22 UTC
- **Reserved Date**: December 09, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle E-Business Intelligence component in Oracle E-Business Suite 11.5.10.2, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
2. [1034726](http://www.securitytracker.com/id/1034726)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1457, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1457
- **State**: PUBLISHED
- **Published Date**: April 28, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:13 UTC
- **Reserved Date**: April 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in player.php in Nuke Evolution Xtreme 2.x allows remote attackers to inject arbitrary web script or HTML via the defaultVisualExt parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [nex-player-xss(49944)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49944)
2. [34594](http://www.securityfocus.com/bid/34594)
3. [34783](http://secunia.com/advisories/34783)
4. [53779](http://osvdb.org/53779)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-5409, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-5409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5409
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 13, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 45.8 and Firefox < 52.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [96696](http://www.securityfocus.com/bid/96696)
2. [](https://www.mozilla.org/security/advisories/mfsa2017-05/)
3. [1037966](http://www.securitytracker.com/id/1037966)
4. [](https://www.mozilla.org/security/advisories/mfsa2017-06/)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1321814)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4537, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4537
- **State**: PUBLISHED
- **Published Date**: October 10, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in EC-CUBE Ver1 1.4.6 and earlier, Ver1 Beta 1.5.0-beta and earlier, Ver2 2.1.2a and earlier, Ver2 Beta(RC) 2.1.1-beta and earlier, Community Edition 1.3.4 and earlier, and Community Edition Nightly-Build r17336 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4535 and CVE-2008-4536.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31509](http://www.securityfocus.com/bid/31509)
2. [eccube-unspecified3-xss(45851)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45851)
3. [JVN#26621646](http://jvn.jp/en/jp/JVN26621646/index.html)
4. [](http://www.ec-cube.net/release/detail.php?release_id=193)
5. [JVNDB-2008-000062](http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000062.html)
6. [32065](http://secunia.com/advisories/32065)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50856, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50856
- **State**: PUBLISHED
- **Published Date**: December 28, 2023 at 11:01 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 14, 2023 at 17:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits.This issue affects Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits: from n/a through 2.14.3.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**FunnelKit - Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/funnel-builder/wordpress-funnel-builder-for-wordpress-by-funnelkit-plugin-2-14-3-sql-injection-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-6918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-6918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6918
- **State**: PUBLISHED
- **Published Date**: November 30, 2013 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 04:18 UTC
- **Reserved Date**: November 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20131122 Unauthorized console access on Satechi travel router v1.5](http://archives.neohapsis.com/archives/bugtraq/2013-11/0123.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-31226, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-31226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31226
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 18:12 UTC
- **Last Updated**: August 15, 2024 at 14:28 UTC
- **Reserved Date**: March 29, 2024 at 14:16 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Sunshine is a self-hosted game stream host for Moonlight. Users who ran Sunshine versions 0.17.0 through 0.22.2 as a service on Windows may be impacted when terminating the service if an attacked placed a file named `C:\Program.exe`, `C:\Program.bat`, or `C:\Program.cmd` on the user's computer. This attack vector isn't exploitable unless the user has manually loosened ACLs on the system drive. If the user's system locale is not English, then the name of the executable will likely vary. Version 0.23.0 contains a patch for the issue. Some workarounds are available. One may identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate. Alternatively, ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory `C:`. Require that all executables be placed in write-protected directories.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**LizardByte - Sunshine**
Affected versions:
- >= 0.17.0, < 0.23.0 (Status: affected)
### References
1. [https://github.com/LizardByte/Sunshine/security/advisories/GHSA-r3rw-mx4q-7vfp](https://github.com/LizardByte/Sunshine/security/advisories/GHSA-r3rw-mx4q-7vfp)
2. [https://github.com/LizardByte/Sunshine/pull/2379](https://github.com/LizardByte/Sunshine/pull/2379)
3. [https://github.com/LizardByte/Sunshine/commit/93e622342c4f3e9b34f5f265039b6775b8e33a7a](https://github.com/LizardByte/Sunshine/commit/93e622342c4f3e9b34f5f265039b6775b8e33a7a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-3878, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-3878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3878
- **State**: REJECTED
- **Published Date**: January 30, 2018 at 21:00 UTC
- **Last Updated**: January 30, 2018 at 20:57 UTC
- **Reserved Date**: July 07, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5291, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5291
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: June 03, 2016 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [DSA-3730](https://www.debian.org/security/2016/dsa-3730)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1292159)
3. [1037298](http://www.securitytracker.com/id/1037298)
4. [GLSA-201701-15](https://security.gentoo.org/glsa/201701-15)
5. [94336](http://www.securityfocus.com/bid/94336)
6. [](https://www.mozilla.org/security/advisories/mfsa2016-93/)
7. [RHSA-2016:2780](http://rhn.redhat.com/errata/RHSA-2016-2780.html)
8. [](https://www.mozilla.org/security/advisories/mfsa2016-89/)
9. [](https://www.mozilla.org/security/advisories/mfsa2016-90/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-42492, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-42492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42492
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 14:42 UTC
- **Last Updated**: September 10, 2024 at 19:53 UTC
- **Reserved Date**: September 11, 2023 at 07:58 UTC
- **Assigned By**: INCD
### Vulnerability Description
EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
** EisBaer Scada - v3.0.6433.1964**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Claroty Research
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12546, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12546
- **State**: REJECTED
- **Published Date**: March 11, 2025 at 14:02 UTC
- **Last Updated**: March 13, 2025 at 02:48 UTC
- **Reserved Date**: December 11, 2024 at 21:27 UTC
- **Assigned By**: TianoCore
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-8159, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-8159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8159
- **State**: REJECTED
- **Published Date**: March 01, 2021 at 23:08 UTC
- **Last Updated**: March 01, 2021 at 23:08 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25956, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25956
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 11:48 UTC
- **Last Updated**: October 23, 2024 at 16:44 UTC
- **Reserved Date**: February 17, 2023 at 10:12 UTC
- **Assigned By**: apache
### Vulnerability Description
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider.
This issue affects Apache Airflow AWS Provider versions before 7.2.1.
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Airflow AWS Provider**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/29587)
2. [](https://lists.apache.org/thread/07pl9y4gdpw2c6rzqm77dvkm2z2kb5gv)
### Credits
- Son Tran from VNPT - VCI
- kuteminh11
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2399, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2399
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 13, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 2.2.2 allows remote attackers to affect integrity via unknown vectors related to Oracle Endeca Information Discovery (Formerly Latitude), a different vulnerability than CVE-2014-2400.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140625 [RT-SA-2013-002] Endeca Latitude Cross-Site Request Forgery](http://seclists.org/fulldisclosure/2014/Jun/123)
2. [33897](http://www.exploit-db.com/exploits/33897)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html)
4. [](http://packetstormsecurity.com/files/127222/Endeca-Latitude-2.2.2-Cross-Site-Request-Forgery.html)
5. [20140625 [RT-SA-2013-002] Endeca Latitude Cross-Site Request Forgery](http://www.securityfocus.com/archive/1/532556/100/0/threaded)
6. [66864](http://www.securityfocus.com/bid/66864)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17691, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17691
- **State**: PUBLISHED
- **Published Date**: September 07, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Homeputer CL Studio fur HomeMatic 4.0 Rel 160808 and earlier uses cleartext to exchange the username and password between server and client instances, which allows remote attackers to obtain sensitive information via a man in the middle attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-031_homematic.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7461, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7461
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The A King Sperm by Dr. Seema Rao (aka com.wKingSperm) application 0.63.13384.23020 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [VU#896657](http://www.kb.cert.org/vuls/id/896657)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12169, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12169
- **State**: PUBLISHED
- **Published Date**: January 10, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 18:28 UTC
- **Reserved Date**: August 01, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**FreeIPA - ipa**
Affected versions:
- 4.2.0 and later (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1487697)
2. [102136](http://www.securityfocus.com/bid/102136)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3543, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3543
- **State**: PUBLISHED
- **Published Date**: July 07, 2023 at 16:31 UTC
- **Last Updated**: August 02, 2024 at 07:01 UTC
- **Reserved Date**: July 07, 2023 at 12:13 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in GZ Scripts Availability Booking Calendar PHP 1.8. It has been classified as problematic. This affects an unknown part of the file load.php of the component HTTP POST Request Handler. The manipulation of the argument cid/first_name/second_name/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233295. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GZ Scripts - Availability Booking Calendar PHP**
Affected versions:
- 1.8 (Status: affected)
### References
1. [](https://vuldb.com/?id.233295)
2. [](https://vuldb.com/?ctiid.233295)
### Credits
- skalvin (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-20166, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-20166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20166
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 16:19 UTC
- **Last Updated**: January 08, 2025 at 20:30 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Common Services Platform Collector Software**
Affected versions:
- 30.1.1-0 (Status: affected)
- 2.11 (Status: affected)
- 2.11.0.1 (Status: affected)
- 2.11.0.2 (Status: affected)
- 2.11.0.3 (Status: affected)
### References
1. [cisco-sa-cspc-xss-CDOJZyH](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH)
2. [https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2501, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2501
- **State**: PUBLISHED
- **Published Date**: September 09, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-427)
2. [MS15-094](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094)
3. [76582](http://www.securityfocus.com/bid/76582)
4. [1033487](http://www.securitytracker.com/id/1033487)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1810, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1810
- **State**: PUBLISHED
- **Published Date**: June 09, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The Cascading Style Sheets (CSS) implementation in Google Chrome before 12.0.742.91 does not properly restrict access to the visit history, which allows remote attackers to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44829](http://secunia.com/advisories/44829)
2. [](http://code.google.com/p/chromium/issues/detail?id=75643)
3. [72780](http://osvdb.org/72780)
4. [oval:org.mitre.oval:def:14433](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14433)
5. [chrome-css-info-disclosure(67893)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67893)
6. [](http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html)
7. [48129](http://www.securityfocus.com/bid/48129)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4970, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4970
- **State**: PUBLISHED
- **Published Date**: November 01, 2011 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 04:02 UTC
- **Reserved Date**: November 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in handlers/getpage.php in Wiki Web Help 0.28 allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-1704](http://www.vupen.com/english/advisories/2010/1704)
2. [41344](http://www.securityfocus.com/bid/41344)
3. [8491](http://securityreason.com/securityalert/8491)
4. [14217](http://www.exploit-db.com/exploits/14217)
5. [](http://packetstormsecurity.org/1007-exploits/wikiwebhelp-sql.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10154, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10154
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:59 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware (subcomponent: Web Server Plugin). The supported version that is affected is 11.1.2.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Access Manager**
Affected versions:
- 11.1.2.3.0 (Status: affected)
### References
1. [101386](http://www.securityfocus.com/bid/101386)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
3. [1039607](http://www.securitytracker.com/id/1039607)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-38667, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-38667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38667
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 13:30 UTC
- **Reserved Date**: July 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer over-read in function disasm in nasm 2.16 allows attackers to cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392812)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0131, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0131
- **State**: PUBLISHED
- **Published Date**: April 18, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: February 08, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in War FTPd 1.6x allows users to cause a denial of service via long MKD and CWD commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [966](http://www.securityfocus.com/bid/966)
2. [4677](http://www.osvdb.org/4677)
3. [20000201 war-ftpd 1.6x DoS](http://marc.info/?l=bugtraq&m=94960703721503&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-24927, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-24927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24927
- **State**: PUBLISHED
- **Published Date**: February 12, 2024 at 06:07 UTC
- **Last Updated**: August 01, 2024 at 23:36 UTC
- **Reserved Date**: February 01, 2024 at 15:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UnitedThemes Brooklyn | Creative Multi-Purpose Responsive WordPress Theme allows Reflected XSS.This issue affects Brooklyn | Creative Multi-Purpose Responsive WordPress Theme: from n/a through 4.9.7.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**UnitedThemes - Brooklyn | Creative Multi-Purpose Responsive WordPress Theme**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/brooklyn/wordpress-brooklyn-theme-4-9-7-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45357, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45357
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 15:05 UTC
- **Reserved Date**: October 09, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:L/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36188, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36188
- **State**: PUBLISHED
- **Published Date**: December 08, 2021 at 13:24 UTC
- **Last Updated**: October 24, 2024 at 18:26 UTC
- **Reserved Date**: July 06, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted GET parameters in requests to login and error handlers
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:X/RC:C`
### Affected Products
**Fortinet - Fortinet FortiWeb**
Affected versions:
- FortiWeb 6.4.1, 6.4.0, 6.3.15, 6.3.14, 6.3.13, 6.3.12, 6.3.11, 6.3.10, 6.3.9, 6.3.8, 6.3.7, 6.3.6, 6.3.5, 6.3.4, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-21-118)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-33670, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-33670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33670
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 11:04 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP NetWeaver AS for Java (Http Service Monitoring Filter), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to send multiple HTTP requests with different method types thereby crashing the filter and making the HTTP server unavailable to other legitimate users leading to denial of service vulnerability.
### Affected Products
**SAP SE - SAP NetWeaver AS for Java (Http Service)**
Affected versions:
- < 7.10 (Status: affected)
- < 7.11 (Status: affected)
- < 7.20 (Status: affected)
- < 7.30 (Status: affected)
- < 7.31 (Status: affected)
- < 7.40 (Status: affected)
- < 7.50 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506)
2. [](https://launchpad.support.sap.com/#/notes/3056652)
3. [20220504 Onapsis Security Advisory 2022-0002: Denial of Service in SAP NetWeaver JAVA](http://seclists.org/fulldisclosure/2022/May/4)
4. [](http://packetstormsecurity.com/files/166965/SAP-NetWeaver-Java-Denial-Of-Service.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1083, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1083
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000502 Security Bug in Jana HTTP Server](http://marc.info/?l=bugtraq&m=95730430727064&w=2)
2. [699](http://www.securityfocus.com/bid/699)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-25635, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-25635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25635
- **State**: PUBLISHED
- **Published Date**: February 19, 2024 at 19:48 UTC
- **Last Updated**: August 28, 2024 at 18:02 UTC
- **Reserved Date**: February 08, 2024 at 22:26 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/<user_id>` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-612: Security Weakness
### Affected Products
**alfio-event - alf.io**
Affected versions:
- < 2.0-M4-2402 (Status: affected)
### References
1. [https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f](https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2332, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2332
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in CPAN WWW::Form before 1.13 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securiteam.com/unixfocus/5IP0L2KBPM.html)
2. [10751](http://secunia.com/advisories/10751)
3. [9526](http://www.securityfocus.com/bid/9526)
4. [wwwform-xss(14985)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14985)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39975, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39975
- **State**: PUBLISHED
- **Published Date**: August 16, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 18:18 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://web.mit.edu/kerberos/www/advisories/)
2. [](https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final)
3. [](https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840)
4. [](https://security.netapp.com/advisory/ntap-20230915-0014/)
5. [](https://security.netapp.com/advisory/ntap-20240201-0008/)
6. [](https://security.netapp.com/advisory/ntap-20240201-0005/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-42439, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-42439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42439
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 20:25 UTC
- **Last Updated**: March 25, 2025 at 17:35 UTC
- **Reserved Date**: October 06, 2022 at 15:51 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM App Connect Enterprise 11.0.0.17 through 11.0.0.19 and 12.0.4.0 and 12.0.5.0 contains an unspecified vulnerability in the Discovery Connector nodes which may cause a 3rd party system’s credentials to be exposed to a privileged attacker. IBM X-Force ID: 238211.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**IBM - App Connect Enterprise**
Affected versions:
- 11.0.0.17 (Status: affected)
- 12.0.4.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6952435)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/238211)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28196, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28196
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 05:02 UTC
- **Last Updated**: September 16, 2024 at 19:05 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The specific function in ASUS BMC’s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**ASUS - BMC firmware for ASMB9-iKVM**
Affected versions:
- 1.11.12 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS24-E**
Affected versions:
- 1.10.3 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS4**
Affected versions:
- 1.10.0 (Status: affected)
**ASUS - BMC firmware for RS700-E9-RS4**
Affected versions:
- 1.09 (Status: affected)
**ASUS - BMC firmware for ESC4000 G4X**
Affected versions:
- 1.11.6 (Status: affected)
**ASUS - BMC firmware for RS700-E9-RS12**
Affected versions:
- 1.11.5 (Status: affected)
**ASUS - BMC firmware for RS100-E10-PI2**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS300-E10-PS4**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS300-E10-RS4**
Affected versions:
- 1.13.6 (Status: affected)
**ASUS - BMC firmware for RS500A-E9-PS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E9-RS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E9 RS4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for E700 G4**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for WS C422 PRO/SE**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for WS X299 PRO/SE**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-U12**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-U12/10G-2S**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for KNPA-U16**
Affected versions:
- 1.13.4 (Status: affected)
**ASUS - BMC firmware for ESC4000 DHD G4**
Affected versions:
- 1.13.7 (Status: affected)
**ASUS - BMC firmware for ESC4000 G4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS24-S**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS8**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for RS720Q-E9-RS8-S**
Affected versions:
- 1.15.0 (Status: affected)
**ASUS - BMC firmware for Z11PA-D8**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for Z11PA-D8C**
Affected versions:
- 1.14.1 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS24-U**
Affected versions:
- 1.14.3 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS8-G**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS500-E9-PS4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for Pro E800 G4**
Affected versions:
- 1.14.2 (Status: affected)
**ASUS - BMC firmware for RS500-E9-RS4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS500-E9-RS4-U**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS520-E9-RS12-E**
Affected versions:
- 1.15.3 (Status: affected)
**ASUS - BMC firmware for RS520-E9-RS8**
Affected versions:
- 1.15.3 (Status: affected)
**ASUS - BMC firmware for ESC8000 G4**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for ESC8000 G4/10G**
Affected versions:
- 1.15.4 (Status: affected)
**ASUS - BMC firmware for RS720-E9-RS12-E**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for WS C621E SAGE**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS500A-E10-PS4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS500A-E10-RS4**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS12V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS700A-E9-RS4V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS12V2**
Affected versions:
- 1.15.2 (Status: affected)
**ASUS - BMC firmware for RS720A-E9-RS24V2**
Affected versions:
- 1.15.1 (Status: affected)
**ASUS - BMC firmware for Z11PR-D16**
Affected versions:
- 1.15.3 (Status: affected)
### References
1. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/)
2. [](https://www.asus.com/tw/support/callus/)
3. [](https://www.twcert.org.tw/tw/cp-132-4566-9154b-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9325, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9325
- **State**: PUBLISHED
- **Published Date**: September 29, 2024 at 07:31 UTC
- **Last Updated**: November 04, 2024 at 19:13 UTC
- **Reserved Date**: September 28, 2024 at 13:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
- CWE-426: Security Weakness
### Affected Products
**Intelbras - InControl**
Affected versions:
- 2.21.0 (Status: affected)
- 2.21.1 (Status: affected)
- 2.21.2 (Status: affected)
- 2.21.3 (Status: affected)
- 2.21.4 (Status: affected)
- 2.21.5 (Status: affected)
- 2.21.6 (Status: affected)
- 2.21.7 (Status: affected)
- 2.21.8 (Status: affected)
- 2.21.9 (Status: affected)
- 2.21.10 (Status: affected)
- 2.21.11 (Status: affected)
- 2.21.12 (Status: affected)
- 2.21.13 (Status: affected)
- 2.21.14 (Status: affected)
- 2.21.15 (Status: affected)
- 2.21.16 (Status: affected)
- 2.21.17 (Status: affected)
- 2.21.18 (Status: affected)
- 2.21.19 (Status: affected)
- 2.21.20 (Status: affected)
- 2.21.21 (Status: affected)
- 2.21.22 (Status: affected)
- 2.21.23 (Status: affected)
- 2.21.24 (Status: affected)
- 2.21.25 (Status: affected)
- 2.21.26 (Status: affected)
- 2.21.27 (Status: affected)
- 2.21.28 (Status: affected)
- 2.21.29 (Status: affected)
- 2.21.30 (Status: affected)
- 2.21.31 (Status: affected)
- 2.21.32 (Status: affected)
- 2.21.33 (Status: affected)
- 2.21.34 (Status: affected)
- 2.21.35 (Status: affected)
- 2.21.36 (Status: affected)
- 2.21.37 (Status: affected)
- 2.21.38 (Status: affected)
- 2.21.39 (Status: affected)
- 2.21.40 (Status: affected)
- 2.21.41 (Status: affected)
- 2.21.42 (Status: affected)
- 2.21.43 (Status: affected)
- 2.21.44 (Status: affected)
- 2.21.45 (Status: affected)
- 2.21.46 (Status: affected)
- 2.21.47 (Status: affected)
- 2.21.48 (Status: affected)
- 2.21.49 (Status: affected)
- 2.21.50 (Status: affected)
- 2.21.51 (Status: affected)
- 2.21.52 (Status: affected)
- 2.21.53 (Status: affected)
- 2.21.54 (Status: affected)
- 2.21.55 (Status: affected)
- 2.21.56 (Status: affected)
### References
1. [VDB-278829 | Intelbras InControl incontrol-service-watchdog.exe unquoted search path](https://vuldb.com/?id.278829)
2. [VDB-278829 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.278829)
3. [Submit #385397 | Intelbras InControl 2.21.56 Unquoted Search Path](https://vuldb.com/?submit.385397)
4. [](https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf)
5. [](https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe)
### Credits
- j369 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32962, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32962
- **State**: PUBLISHED
- **Published Date**: May 24, 2022 at 17:48 UTC
- **Last Updated**: April 16, 2025 at 16:18 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The AGG Software Web Server version 4.0.40.1014 and prior is vulnerable to cross-site scripting, which may allow an attacker to remotely execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**AGG Software - Web Server (webserver.dll)**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-02)
### Credits
- Michael Heinzl reported this vulnerability to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16983, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16983
- **State**: REJECTED
- **Published Date**: October 30, 2019 at 15:36 UTC
- **Last Updated**: October 30, 2019 at 15:36 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36123, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36123
- **State**: REJECTED
- **Last Updated**: May 02, 2024 at 21:49 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0597, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0597
- **State**: PUBLISHED
- **Published Date**: March 01, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: March 01, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco devices running Application and Content Networking System (ACNS) 5.0 before 5.0.17.6 and 5.1 before 5.1.11.6 allow remote attackers to cause a denial of service (process restart) via a "crafted TCP connection."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12648](http://www.securityfocus.com/bid/12648)
2. [20050224 ACNS Denial of Service and Default Admin Password Vulnerabilities](http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml)
3. [14395](http://secunia.com/advisories/14395)
4. [cisco-tcp-acns-dos(19466)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19466)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-0702, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-0702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0702
- **State**: PUBLISHED
- **Published Date**: February 14, 2011 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 18:24 UTC
- **Reserved Date**: January 31, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The feh_unique_filename function in utils.c in feh before 1.11.2 might allow local users to overwrite arbitrary files via a symlink attack on a /tmp/feh_ temporary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035)
2. [[oss-security] 20110209 CVE request for feh](http://openwall.com/lists/oss-security/2011/02/09/1)
3. [](https://github.com/derf/feh/issues/#issue/32)
4. [](https://derf.homelinux.org/git/feh/commit/?id=29ab0855f044ef2fe9c295b72abefcb37f0861a5)
5. [43221](http://secunia.com/advisories/43221)
6. [](https://bugs.launchpad.net/ubuntu/+source/feh/+bug/607328)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=676389)
8. [[oss-security] 20110209 Re: CVE request for feh](http://openwall.com/lists/oss-security/2011/02/09/14)
9. [](https://derf.homelinux.org/git/feh/commit/?id=23421a86cc826dd30f3dc4f62057fafb04b3ac40)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-18418, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-18418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18418
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 19:01 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
clonos.php in ClonOS WEB control panel 19.09 allows remote attackers to gain full access via change password requests because there is no session management.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Andhrimnirr/ClonOS-WEB-control-panel-multi-vulnerability)
2. [](http://packetstormsecurity.com/files/154986/ClonOs-WEB-UI-19.09-Improper-Access-Control.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-40404, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-40404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40404
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 13:00 UTC
- **Last Updated**: May 21, 2025 at 18:43 UTC
- **Reserved Date**: September 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wshark00/Bug_report/blob/main/vendors/pushpam02/wedding-planner/SQLi-2.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20437, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20437
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 16:27 UTC
- **Last Updated**: September 25, 2024 at 19:28 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H`
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- 17.3.2 (Status: affected)
- 17.3.3 (Status: affected)
- 17.3.2a (Status: affected)
- 17.3.4 (Status: affected)
- 17.3.5 (Status: affected)
- 17.3.4a (Status: affected)
- 17.3.6 (Status: affected)
- 17.3.4b (Status: affected)
- 17.3.4c (Status: affected)
- 17.3.5a (Status: affected)
- 17.3.5b (Status: affected)
- 17.3.7 (Status: affected)
- 17.3.8 (Status: affected)
- 17.3.8a (Status: affected)
- 17.4.1 (Status: affected)
- 17.4.2 (Status: affected)
- 17.4.1a (Status: affected)
- 17.4.1b (Status: affected)
- 17.4.2a (Status: affected)
- 17.5.1 (Status: affected)
- 17.5.1a (Status: affected)
- 17.6.1 (Status: affected)
- 17.6.2 (Status: affected)
- 17.6.1w (Status: affected)
- 17.6.1a (Status: affected)
- 17.6.1x (Status: affected)
- 17.6.3 (Status: affected)
- 17.6.1y (Status: affected)
- 17.6.1z (Status: affected)
- 17.6.3a (Status: affected)
- 17.6.4 (Status: affected)
- 17.6.1z1 (Status: affected)
- 17.6.5 (Status: affected)
- 17.6.6 (Status: affected)
- 17.6.6a (Status: affected)
- 17.6.5a (Status: affected)
- 17.7.1 (Status: affected)
- 17.7.1a (Status: affected)
- 17.7.1b (Status: affected)
- 17.7.2 (Status: affected)
- 17.10.1 (Status: affected)
- 17.10.1a (Status: affected)
- 17.10.1b (Status: affected)
- 17.8.1 (Status: affected)
- 17.8.1a (Status: affected)
- 17.9.1 (Status: affected)
- 17.9.1w (Status: affected)
- 17.9.2 (Status: affected)
- 17.9.1a (Status: affected)
- 17.9.1x (Status: affected)
- 17.9.1y (Status: affected)
- 17.9.3 (Status: affected)
- 17.9.2a (Status: affected)
- 17.9.1x1 (Status: affected)
- 17.9.3a (Status: affected)
- 17.9.4 (Status: affected)
- 17.9.1y1 (Status: affected)
- 17.9.4a (Status: affected)
- 17.11.1 (Status: affected)
- 17.11.1a (Status: affected)
- 17.12.1 (Status: affected)
- 17.12.1w (Status: affected)
- 17.12.1a (Status: affected)
- 17.12.1x (Status: affected)
- 17.12.1y (Status: affected)
- 17.11.99SW (Status: affected)
### References
1. [cisco-sa-webui-csrf-ycUYxkKO](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-26383, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-26383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26383
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:08 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Adobe - Substance3D - Stager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_stager/apsb23-26.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2050
- **State**: PUBLISHED
- **Published Date**: June 26, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15764](http://secunia.com/advisories/15764/)
2. [](http://archives.seul.org/or/announce/Jun-2005/msg00001.html)
3. [tor-information-disclosure(21093)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21093)
4. [GLSA-200506-18](http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml)
5. [](http://bugs.gentoo.org/show_bug.cgi?id=96320)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-20018, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-20018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20018
- **State**: PUBLISHED
- **Published Date**: June 09, 2022 at 22:35 UTC
- **Last Updated**: April 15, 2025 at 14:30 UTC
- **Reserved Date**: June 05, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in XAMPP 7.1.1-0-VC14. It has been classified as problematic. Affected is an unknown function of the component Installer. The manipulation leads to privilege escalation. It is possible to launch the attack remotely.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**unspecified - XAMPP**
Affected versions:
- 7.1.1-0-VC14 (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/142406/xampp-dllhijack.txt)
2. [](https://vuldb.com/?id.100950)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9536, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9536
- **State**: PUBLISHED
- **Published Date**: November 22, 2019 at 17:41 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 01, 2019 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Apple iPhone 3GS bootrom malloc implementation returns a non-NULL pointer when unable to allocate memory, aka 'alloc8'. An attacker with physical access to the device can install arbitrary firmware.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Apple - iPhone**
Affected versions:
- 3GS (Status: affected)
### References
1. [](https://github.com/axi0mX/ipwndfu/blob/master/alloc8.py)
2. [](https://github.com/axi0mX/alloc8)
### Credits
- axi0mX
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21446, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21446
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 19:06 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper input validation in MyFiles prior to version 12.2.09 in Android R(11), 13.1.03.501 in Android S( 12) and 14.1.00.422 in Android T(13) allows local attacker to access data of MyFiles.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - MyFiles**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=02)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3971, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3971
- **State**: PUBLISHED
- **Published Date**: December 25, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: June 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b)
2. [](https://jira.mongodb.org/browse/SERVER-13753)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2933, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2933
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 18:09 UTC
- **Last Updated**: January 13, 2025 at 17:09 UTC
- **Reserved Date**: August 22, 2022 at 13:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The 0mk Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.2. This is due to missing or incorrect nonce validation on the zeromk_options_page function. This makes it possible for unauthenticated attackers to inject malicious web scripts via the 'zeromk_user' and 'zeromk_apikluc' parameters through a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Affected Products
**kuzmanov - 0mk Shortener**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3b798c64-3434-427d-b578-5abbdac8cd0e)
2. [](https://plugins.trac.wordpress.org/browser/0mk-shortener/trunk/0mk.php#L28)
### Credits
- Juampa Rodríguez
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6811, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6811
- **State**: PUBLISHED
- **Published Date**: September 04, 2015 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:48 UTC
- **Reserved Date**: September 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Sophos Cyberoam CR500iNG-XP firewall appliance with CyberoamOS 10.6.2 MR-1 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to login.xml.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/133378/Cyberoam-CR500iNG-XP-10.6.2-MR-1-Blind-SQL-Injection.html)
2. [38034](https://www.exploit-db.com/exploits/38034/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10405, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10405
- **State**: PUBLISHED
- **Published Date**: September 07, 2017 at 13:00 UTC
- **Last Updated**: August 06, 2024 at 03:21 UTC
- **Reserved Date**: August 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Session fixation vulnerability in D-Link DIR-600L routers (rev. Ax) with firmware before FW1.17.B01 allows remote attackers to hijack web sessions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-600L/DIR-600L_REVA_FIRMWARE_PATCH_NOTES_1.17.B01_EN_WW.PDF)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0460, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0460
- **State**: PUBLISHED
- **Published Date**: January 28, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: January 28, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in staff/index.php in Kayako SupportSuite 3.60.04 and earlier allow remote authenticated users to inject arbitrary web script or HTML via the (1) subject parameter and (2) contents parameter (aka body) in an insertquestion action. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100121 Kayako SupportSuite Multiple Persistent Cross Site Scripting (Current Versions)](http://www.securityfocus.com/archive/1/509122/100/0/threaded)
2. [supportsuite-contents-xss(55859)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55859)
3. [37947](http://www.securityfocus.com/bid/37947)
4. [38322](http://secunia.com/advisories/38322)
5. [](http://packetstormsecurity.org/1001-advisories/kayako-xss.txt)
6. [61928](http://osvdb.org/61928)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-38336, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-38336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38336
- **State**: PUBLISHED
- **Published Date**: December 05, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 14:35 UTC
- **Reserved Date**: August 15, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38336.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12493, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12493
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
### Affected Products
**Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT**
Affected versions:
- PLAT 7.3 (E0504) (Status: affected)
### References
1. [1039152](http://www.securitytracker.com/id/1039152)
2. [100367](http://www.securityfocus.com/bid/100367)
3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-26328, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-26328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26328
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 15:25 UTC
- **Last Updated**: August 21, 2024 at 16:49 UTC
- **Reserved Date**: February 28, 2022 at 21:48 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText Performance Center on Windows allows Cross-Site Scripting (XSS).This issue affects Performance Center: 12.63.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OpenText - Performance Center**
Affected versions:
- 12.63 (Status: affected)
### References
1. [](https://portal.microfocus.com/s/article/KM000032041?language=en_US)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-47690, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-47690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47690
- **State**: PUBLISHED
- **Published Date**: November 13, 2023 at 23:03 UTC
- **Last Updated**: January 08, 2025 at 21:07 UTC
- **Reserved Date**: November 08, 2023 at 18:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Anton Bond Additional Order Filters for WooCommerce plugin <= 1.10 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Anton Bond - Additional Order Filters for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/additional-order-filters-for-woocommerce/wordpress-additional-order-filters-for-woocommerce-plugin-1-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- qilin_99 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41124, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41124
- **State**: PUBLISHED
- **Published Date**: July 19, 2024 at 19:45 UTC
- **Last Updated**: August 02, 2024 at 04:46 UTC
- **Reserved Date**: July 15, 2024 at 15:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Puncia is the Official CLI utility for Subdomain Center & Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, Unauthorized Data Access & MITM Attacks. This issue has been addressed in release version 0.21 by using https rather than http connections. All users are advised to upgrade. There is no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
- CWE-311: Security Weakness
### Affected Products
**ARPSyndicate - puncia**
Affected versions:
- < 0.21 (Status: affected)
### References
1. [https://github.com/ARPSyndicate/puncia/security/advisories/GHSA-rwcj-7jjp-4w38](https://github.com/ARPSyndicate/puncia/security/advisories/GHSA-rwcj-7jjp-4w38)
2. [https://github.com/ARPSyndicate/puncia/issues/8](https://github.com/ARPSyndicate/puncia/issues/8)
3. [https://github.com/ARPSyndicate/puncia/commit/033f3b68126eabbb2040ce16e2c3a2ce17437fbd#diff-3ec6c2de51e702726b23c452e3f4a899f6f4253af9fbf5be7254a5c1407ab526](https://github.com/ARPSyndicate/puncia/commit/033f3b68126eabbb2040ce16e2c3a2ce17437fbd#diff-3ec6c2de51e702726b23c452e3f4a899f6f4253af9fbf5be7254a5c1407ab526)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4887, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4887
- **State**: PUBLISHED
- **Published Date**: April 05, 2010 at 15:15 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: April 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1)
2. [](https://bugzilla.novell.com/show_bug.cgi?id=133977)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7703, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7703
- **State**: PUBLISHED
- **Published Date**: July 24, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 07:59 UTC
- **Reserved Date**: October 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
2. [RHSA-2016:2583](http://rhn.redhat.com/errata/RHSA-2016-2583.html)
3. [1033951](http://www.securitytracker.com/id/1033951)
4. [77278](http://www.securityfocus.com/bid/77278)
5. [RHSA-2016:0780](http://rhn.redhat.com/errata/RHSA-2016-0780.html)
6. [](http://support.ntp.org/bin/view/Main/NtpBug2902)
7. [DSA-3388](http://www.debian.org/security/2015/dsa-3388)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=1254547)
9. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15)
10. [](https://security.netapp.com/advisory/ntap-20171004-0001/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3621, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3621
- **State**: PUBLISHED
- **Published Date**: October 20, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:25 UTC
- **Reserved Date**: October 20, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**Linux - Kernel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856)
2. [](https://vuldb.com/?id.211920)
3. [[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html)
4. [[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6741, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6741
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 15:56 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 12, 2023 at 15:58 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Customer Area WordPress plugin before 8.2.1 does not properly validate users capabilities in some of its AJAX actions, allowing malicious users to edit other users' account address.
### Weakness Classification (CWE)
- CWE-284 Improper Access Control: Security Weakness
### Affected Products
**Unknown - WP Customer Area**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/9debe1ea-18ad-44c4-8078-68eb66d36c4a/)
### Credits
- Krzysztof Zając (CERT PL)
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40155, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40155
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 02, 2024 at 18:24 UTC
- **Reserved Date**: September 22, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path for some Intel(R) CST software before version 2.1.10300 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) CST software**
Affected versions:
- before version 2.1.10300 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01021.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-18149, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-18149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18149
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10081, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10081
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 14:33 UTC
- **Last Updated**: November 06, 2024 at 15:01 UTC
- **Reserved Date**: October 17, 2024 at 12:36 UTC
- **Assigned By**: ERIC
### Vulnerability Description
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.
Authentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.
This issue affects CodeChecker: through 6.24.1.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
- CWE-420: Security Weakness
### Affected Products
**Ericsson - CodeChecker**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/Ericsson/codechecker/security/advisories/GHSA-f3f8-vx3w-hp5q)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15356, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15356
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal.
### Affected Products
**Huawei Technologies Co., Ltd. - DP300,RP200,TE30,TE40,TE50,TE60,TX50**
Affected versions:
- DP300 ,V500R002C00 ,RP200 ,V600R006C00 ,TE30 ,V100R001C10 ,V500R002C00 ,V600R006C00 ,TE40 ,V500R002C00 ,V600R006C00 ,TE50 ,V500R002C00 ,V600R006C00 ,TE60 ,V100R001C10 ,V500R002C00 ,V600R006C00 ,TX50 ,V500R002C00 ,V600R006C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171108-02-http-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1579, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1579
- **State**: PUBLISHED
- **Published Date**: April 21, 2005 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: April 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Cenroll ActiveX control (xenroll.dll) for Terminal Server Editions of Windows NT 4.0 and Windows NT Server 4.0 before SP6 allows remote attackers to cause a denial of service (resource consumption) by creating a large number of arbitrary files on the target machine.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [winnt-xenroll-dos(7107)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7107)
2. [Q242366](http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B242366)
3. [VU#3062](http://www.kb.cert.org/vuls/id/3062)
4. [6827](http://www.securityfocus.com/bid/6827)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-27359, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-27359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27359
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 12:54 UTC
- **Last Updated**: June 06, 2025 at 14:39 UTC
- **Reserved Date**: February 21, 2025 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Seerox WP Media File Type Manager allows Cross Site Request Forgery. This issue affects WP Media File Type Manager: from n/a through 2.3.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Seerox - WP Media File Type Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-media-file-type-manager/vulnerability/wordpress-wp-media-file-type-manager-plugin-2-3-0-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0253, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0253
- **State**: PUBLISHED
- **Published Date**: April 04, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 29, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in hsx.cgi program in iWeb Hyperseek 2000 allows remote attackers to read arbitrary files and directories via a .. (dot dot) attack in the show parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#146704](http://www.kb.cert.org/vuls/id/146704)
2. [2314](http://www.securityfocus.com/bid/2314)
3. [20010128 Hyperseek 2000 Search Engine - "show directory & files" bug](http://archives.neohapsis.com/archives/bugtraq/2001-01/0463.html)
4. [hyperseek-cgi-reveal-info(6012)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6012)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1084, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1084
- **State**: PUBLISHED
- **Published Date**: March 09, 2023 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 21:34 UTC
- **Reserved Date**: February 28, 2023 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=0.0, <15.7.8 (Status: affected)
- >=15.8, <15.8.4 (Status: affected)
- >=15.9, <15.9.2 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/390696)
2. [](https://hackerone.com/reports/1805549)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1084.json)
### Credits
- Thanks [@shubham_sohi](https://hackerone.com/shubham_sohi,) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24315, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24315
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)**
Affected versions:
- Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior) (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-322/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-43119, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-43119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43119
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 01, 2024 at 17:54 UTC
- **Reserved Date**: August 07, 2024 at 09:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Aruba.It Aruba HiSpeed Cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.12.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Aruba.it - Aruba HiSpeed Cache**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-12-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.