System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15213 - **State**: PUBLISHED - **Published Date**: October 10, 2017 at 05:00 UTC - **Last Updated**: September 16, 2024 at 22:35 UTC - **Reserved Date**: October 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stored XSS vulnerability in Flyspray before 1.0-rc6 allows an authenticated user to inject JavaScript to gain administrator privileges, via the real_name or email_address field to themes/CleanFS/templates/common.editallusers.tpl. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Flyspray/flyspray/commit/754ec5d04348ef7ecb8cb02ade976dc412b031f8) 2. [](https://github.com/Flyspray/flyspray/releases/tag/v1.0-rc6) 3. [](http://openwall.com/lists/oss-security/2017/10/07/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8888 - **State**: PUBLISHED - **Published Date**: September 18, 2024 at 11:54 UTC - **Last Updated**: September 18, 2024 at 13:14 UTC - **Reserved Date**: September 16, 2024 at 10:20 UTC - **Assigned By**: INCIBE ### Vulnerability Description An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **CIRCUTOR - CIRCUTOR Q-SMT** Affected versions: - 1.0.4 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products) ### Credits - Aarón Flecha - Gabriel Vía Echezarreta
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40010, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40010 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40010 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 15:06 UTC - **Last Updated**: May 06, 2025 at 18:43 UTC - **Reserved Date**: August 08, 2023 at 12:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in realmag777 HUSKY – Products Filter for WooCommerce Professional.This issue affects HUSKY – Products Filter for WooCommerce Professional: from n/a through 1.3.4.2. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **realmag777 - HUSKY – Products Filter for WooCommerce Professional** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woocommerce-products-filter/wordpress-husky-plugin-1-3-4-2-sql-injection-vulnerability?_s_id=cve) ### Credits - Tien Nguyen Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-45820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-45820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-45820 - **State**: PUBLISHED - **Published Date**: May 08, 2025 at 00:00 UTC - **Last Updated**: May 12, 2025 at 18:35 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Slims (Senayan Library Management Systems) 9 Bulian 9.6.1 is vulnerable to SQL Injection in admin/modules/bibliography/pop_author_edit.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/slims/slims9_bulian/issues/282) 2. [](https://github.com/christopherralinanggoman/cve-skripsi/blob/main/my_reports/slims-9-bulian-pop-author-edit-report.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28582 - **State**: PUBLISHED - **Published Date**: December 01, 2020 at 18:40 UTC - **Last Updated**: August 04, 2024 at 16:40 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: trendmicro ### Vulnerability Description An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents. ### Affected Products **Trend Micro - Trend Micro Apex One** Affected versions: - 2019 (Status: affected) **Trend Micro - Trend Micro OfficeScan** Affected versions: - XG SP1 (Status: affected) ### References 1. [](https://success.trendmicro.com/solution/000281949) 2. [](https://success.trendmicro.com/solution/000281947) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1386/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41061, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41061 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41061 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 14:57 UTC - **Last Updated**: May 04, 2025 at 09:21 UTC - **Reserved Date**: July 12, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport [Why] Potential out of bounds access in dml2_calculate_rq_and_dlg_params() because the value of out_lowest_state_idx used as an index for FCLKChangeSupport array can be greater than 1. [How] Currently dml2 core specifies identical values for all FCLKChangeSupport elements. Always use index 0 in the condition to avoid out of bounds access. ### Affected Products **Linux - Linux** Affected versions: - 7966f319c66d9468623c6a6a017ecbc0dd79be75 (Status: affected) - 7966f319c66d9468623c6a6a017ecbc0dd79be75 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 6.9.11 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/94166fe12543fbef122ca2d093e794ea41073a85) 2. [](https://git.kernel.org/stable/c/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3764 - **State**: PUBLISHED - **Published Date**: January 16, 2024 at 15:50 UTC - **Last Updated**: August 03, 2024 at 01:20 UTC - **Reserved Date**: October 31, 2022 at 09:55 UTC - **Assigned By**: WPScan ### Vulnerability Description The plugin does not filter the "delete_entries" parameter from user requests, leading to an SQL Injection vulnerability. ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Form Vibes** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/) ### Credits - Nguyen Duy Quoc Khanh - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7646 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: October 01, 2015 at 00:00 UTC - **Assigned By**: airbus ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6604 - **State**: PUBLISHED - **Published Date**: January 06, 2025 at 16:41 UTC - **Last Updated**: January 06, 2025 at 17:06 UTC - **Reserved Date**: December 08, 2023 at 06:53 UTC - **Assigned By**: fedora ### Vulnerability Description A flaw was found in FFmpeg. This vulnerability allows unexpected additional CPU load and storage consumption, potentially leading to degraded performance or denial of service via the demuxing of arbitrary data as XBIN-formatted data without proper format validation. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-99: Security Weakness ### Affected Products **Unknown - Unknown** Affected versions: - 2.0 (Status: affected) ### References 1. [RHBZ#2334337](https://bugzilla.redhat.com/show_bug.cgi?id=2334337)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25221, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25221 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25221 - **State**: PUBLISHED - **Published Date**: February 18, 2025 at 00:10 UTC - **Last Updated**: February 18, 2025 at 15:24 UTC - **Reserved Date**: February 04, 2025 at 05:38 UTC - **Assigned By**: jpcert ### Vulnerability Description The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains an SQL injection vulnerability in pdf.php. If this vulnerability is exploited, information in a database may be deleted, altered, or retrieved. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **LuxSoft - The LuxCal Web Calendar** Affected versions: - prior to 5.3.3M (MySQL version) (Status: affected) **LuxSoft - The LuxCal Web Calendar** Affected versions: - prior to 5.3.3L (SQLite version) (Status: affected) ### References 1. [](https://www.luxsoft.eu/?download) 2. [](https://www.luxsoft.eu/lcforum/viewtopic.php?pid=1984#p1984) 3. [](https://jvn.jp/en/jp/JVN26024080/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23595 - **State**: PUBLISHED - **Published Date**: February 04, 2022 at 22:32 UTC - **Last Updated**: April 22, 2025 at 18:26 UTC - **Reserved Date**: January 19, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **tensorflow - tensorflow** Affected versions: - >= 2.7.0, < 2.7.1 (Status: affected) - >= 2.6.0, < 2.6.3 (Status: affected) - < 2.5.3 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx) 2. [](https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8) 3. [](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0343 - **State**: PUBLISHED - **Published Date**: May 03, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:49 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Hotline Client 1.8.5 stores sensitive user information, including passwords, in plaintext in the bookmarks file, which could allow local users with access to the bookmarks file to gain privileges by extracting the passwords. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4210](http://www.securityfocus.com/bid/4210) 2. [hotline-connect-plaintext-password(8327)](http://www.iss.net/security_center/static/8327.php) 3. [20020228 Hotline Client Plain password vuln.](http://marc.info/?l=bugtraq&m=101495128121299&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1670, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1670 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1670 - **State**: PUBLISHED - **Published Date**: April 28, 2008 at 17:00 UTC - **Last Updated**: August 07, 2024 at 08:32 UTC - **Reserved Date**: April 03, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-1371](http://www.vupen.com/english/advisories/2008/1371/references) 2. [SUSE-SR:2008:011](http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html) 3. [28937](http://www.securityfocus.com/bid/28937) 4. [kde-khtml-png-bo(42038)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42038) 5. [1019929](http://www.securitytracker.com/id?1019929) 6. [](http://www.kde.org/info/security/advisory-20080426-1.txt) 7. [29980](http://secunia.com/advisories/29980)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4710, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4710 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4710 - **State**: PUBLISHED - **Published Date**: March 15, 2010 at 21:00 UTC - **Last Updated**: September 17, 2024 at 00:02 UTC - **Reserved Date**: March 15, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Reset backend password (cwt_resetbepassword) extension 1.20 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35876](http://www.securityfocus.com/bid/35876) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-010/) 3. [36084](http://secunia.com/advisories/36084)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34161 - **State**: PUBLISHED - **Published Date**: May 29, 2024 at 16:02 UTC - **Last Updated**: February 13, 2025 at 17:52 UTC - **Reserved Date**: May 14, 2024 at 16:31 UTC - **Assigned By**: f5 ### Vulnerability Description When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **F5 - NGINX Open Source** Affected versions: - 1.25.0 (Status: affected) **F5 - NGINX Plus** Affected versions: - R30 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000139627) 2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/) 3. [](http://www.openwall.com/lists/oss-security/2024/05/30/4) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/) ### Credits - F5
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20021 - **State**: PUBLISHED - **Published Date**: December 27, 2019 at 01:11 UTC - **Last Updated**: August 05, 2024 at 02:32 UTC - **Reserved Date**: December 27, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/upx/upx/issues/315) 2. [FEDORA-2020-20cf0743f5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D7XU42G6MUQQXHWRP7DCF2JSIBOJ5GOO/) 3. [openSUSE-SU-2020:0163](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html) 4. [openSUSE-SU-2020:0180](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html) 5. [FEDORA-2020-67590fbf08](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUTVSTXAFTD552NO2K2RIF6MDQEHP3BE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12401 - **State**: PUBLISHED - **Published Date**: February 28, 2019 at 18:00 UTC - **Last Updated**: August 05, 2024 at 08:38 UTC - **Reserved Date**: June 14, 2018 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2018-26/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1422456) 3. [105721](http://www.securityfocus.com/bid/105721) 4. [USN-3801-1](https://usn.ubuntu.com/3801-1/) 5. [1041944](http://www.securitytracker.com/id/1041944)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4188 - **State**: PUBLISHED - **Published Date**: September 23, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 10:08 UTC - **Reserved Date**: September 23, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the TYPO3 Secure Directory (kw_secdir) extension before 1.0.2 allows remote attackers to execute arbitrary code via unknown vectors related to "injection of control characters." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31253](http://www.securityfocus.com/bid/31253) 2. [31897](http://secunia.com/advisories/31897) 3. [kwsecdir-unspecified-code-execution(45260)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45260) 4. [](http://typo3.org/extensions/repository/view/kw_secdir/1.0.2/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1194 - **State**: PUBLISHED - **Published Date**: June 09, 2020 at 19:43 UTC - **Last Updated**: August 04, 2024 at 06:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations, aka 'Windows Registry Denial of Service Vulnerability'. ### Affected Products **Microsoft - Windows 10 Version 2004 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 2004 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows** Affected versions: - 10 Version 1803 for 32-bit Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1803 for ARM64-based Systems (Status: affected) - 10 Version 1809 for 32-bit Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) - 10 Version 1809 for ARM64-based Systems (Status: affected) - 10 Version 1709 for 32-bit Systems (Status: affected) - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1709 for ARM64-based Systems (Status: affected) - 10 for 32-bit Systems (Status: affected) - 10 for x64-based Systems (Status: affected) - 10 Version 1607 for 32-bit Systems (Status: affected) - 10 Version 1607 for x64-based Systems (Status: affected) - 7 for 32-bit Systems Service Pack 1 (Status: affected) - 7 for x64-based Systems Service Pack 1 (Status: affected) - 8.1 for 32-bit systems (Status: affected) - 8.1 for x64-based systems (Status: affected) - RT 8.1 (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Status: affected) - 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected) - 2008 for Itanium-Based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Status: affected) - 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected) - 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected) - 2012 (Status: affected) - 2012 (Core installation) (Status: affected) - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) **Microsoft - Windows 10 Version 2004 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1194)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31951 - **State**: PUBLISHED - **Published Date**: June 01, 2022 at 15:43 UTC - **Last Updated**: August 03, 2024 at 07:32 UTC - **Reserved Date**: May 31, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/classes/Master.php?f=delete_respondent_type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/rescue-dispatch-management-system/SQLi-4.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29198 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 21:50 UTC - **Last Updated**: April 22, 2025 at 17:59 UTC - **Reserved Date**: April 13, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `dense_shape` is a vector and `indices` is a matrix (as part of requirements for sparse tensors) but there is no validation for this. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.6.4 (Status: affected) - >= 2.7.0rc0, < 2.7.2 (Status: affected) - >= 2.8.0rc0, < 2.8.1 (Status: affected) - >= 2.9.0rc0, < 2.9.0 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4) 2. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2) 3. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1) 4. [](https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0) 5. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mg66-qvc5-rm93) 6. [](https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11) 7. [](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/sparse/sparse_tensor_to_csr_sparse_matrix_op.cc#L65-L119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4997 - **State**: PUBLISHED - **Published Date**: October 09, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 19:32 UTC - **Reserved Date**: September 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265) 2. [20363](http://www.securityfocus.com/bid/20363) 3. [MDKSA-2007:025](http://www.mandriva.com/security/advisories?name=MDKSA-2007:025) 4. [SUSE-SA:2006:079](http://www.novell.com/linux/security/advisories/2006_79_kernel.html) 5. [22253](http://secunia.com/advisories/22253) 6. [RHSA-2007:0012](http://www.redhat.com/support/errata/RHSA-2007-0012.html) 7. [22279](http://secunia.com/advisories/22279) 8. [23788](http://secunia.com/advisories/23788) 9. [22292](http://secunia.com/advisories/22292) 10. [RHSA-2007:0013](http://www.redhat.com/support/errata/RHSA-2007-0013.html) 11. [RHSA-2006:0689](http://www.redhat.com/support/errata/RHSA-2006-0689.html) 12. [MDKSA-2007:012](http://www.mandriva.com/security/advisories?name=MDKSA-2007:012) 13. [1017526](http://securitytracker.com/id?1017526) 14. [23384](http://secunia.com/advisories/23384) 15. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2) 16. [23752](http://secunia.com/advisories/23752) 17. [DSA-1237](http://www.us.debian.org/security/2006/dsa-1237) 18. [22762](http://secunia.com/advisories/22762) 19. [24288](http://secunia.com/advisories/24288) 20. [23474](http://secunia.com/advisories/23474) 21. [23064](http://secunia.com/advisories/23064) 22. [DSA-1233](http://www.us.debian.org/security/2006/dsa-1233) 23. [23370](http://secunia.com/advisories/23370) 24. [](http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm) 25. [ADV-2006-3999](http://www.vupen.com/english/advisories/2006/3999) 26. [](http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm) 27. [20070615 rPSA-2007-0124-1 kernel xen](http://www.securityfocus.com/archive/1/471457) 28. [](http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm) 29. [oval:org.mitre.oval:def:10388](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388) 30. [22497](http://secunia.com/advisories/22497) 31. [22945](http://secunia.com/advisories/22945) 32. [RHSA-2006:0710](http://www.redhat.com/support/errata/RHSA-2006-0710.html) 33. [USN-395-1](http://www.ubuntu.com/usn/usn-395-1) 34. [ADV-2006-3937](http://www.vupen.com/english/advisories/2006/3937) 35. [MDKSA-2006:197](http://www.mandriva.com/security/advisories?name=MDKSA-2006:197) 36. [23395](http://secunia.com/advisories/23395) 37. [25691](http://secunia.com/advisories/25691) 38. [kernel-clipmkip-dos(29387)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29387)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35110, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35110 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35110 - **State**: PUBLISHED - **Published Date**: June 14, 2023 at 00:00 UTC - **Last Updated**: January 02, 2025 at 20:35 UTC - **Reserved Date**: June 13, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered jjson thru 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/grobmeier/jjson/issues/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48420 - **State**: PUBLISHED - **Published Date**: December 08, 2023 at 15:45 UTC - **Last Updated**: August 28, 2024 at 15:23 UTC - **Reserved Date**: November 16, 2023 at 16:28 UTC - **Assigned By**: Google_Devices ### Vulnerability Description there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6651 - **State**: PUBLISHED - **Published Date**: May 07, 2020 at 15:58 UTC - **Last Updated**: September 16, 2024 at 23:06 UTC - **Reserved Date**: January 09, 2020 at 00:00 UTC - **Assigned By**: Eaton ### Vulnerability Description Improper Input Validation in Eaton's Intelligent Power Manager (IPM) v 1.67 & prior on file name during configuration file import functionality allows attackers to perform command injection or code execution via specially crafted file names while uploading the configuration file in the application. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Eaton - Intelligent Power manager (IPM)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/eaton-vulnerability-advisory-intelligent-power-manager-v1-1.pdf) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-649/) ### Credits - Eaton would like to thank Sivathmican Sivakumaran for working with Eaton and helping Eaton in releasing more robust and secure products.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2773 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 14:02 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users in multiple components included in PCF Elastic Runtime, aka an "Unauthenticated JWT signing algorithm in multiple components" issue. ### Affected Products **n/a - PCF Elastic Runtime** Affected versions: - PCF Elastic Runtime (Status: affected) ### References 1. [97135](http://www.securityfocus.com/bid/97135) 2. [](https://pivotal.io/security/cve-2017-2773)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30920, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30920 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30920 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:55 UTC - **Last Updated**: March 27, 2025 at 18:57 UTC - **Reserved Date**: March 26, 2025 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in teastudio.pl WP Posts Carousel allows Stored XSS. This issue affects WP Posts Carousel: from n/a through 1.3.7. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **teastudio.pl - WP Posts Carousel** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-posts-carousel/vulnerability/wordpress-wp-posts-carousel-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Peter Thaleikis (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3731 - **State**: PUBLISHED - **Published Date**: August 23, 2021 at 12:42 UTC - **Last Updated**: August 03, 2024 at 17:01 UTC - **Reserved Date**: August 21, 2021 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description LedgerSMB does not sufficiently guard against being wrapped by other sites, making it vulnerable to 'clickjacking'. This allows an attacker to trick a targetted user to execute unintended actions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-1021: Security Weakness ### Affected Products **ledgersmb - ledgersmb/ledgersmb** Affected versions: - 1.7.33 (Status: unaffected) - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/5664331d-f5f8-4412-8566-408f8655888a) 2. [](https://ledgersmb.org/cve-2021-3731-clickjacking) 3. [DSA-4962](https://www.debian.org/security/2021/dsa-4962)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7613 - **State**: PUBLISHED - **Published Date**: February 20, 2017 at 08:35 UTC - **Last Updated**: August 06, 2024 at 02:04 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages object-lifetime mishandling during process spawning. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/HT207271) 2. [](https://support.apple.com/HT207269) 3. [](https://support.apple.com/HT207270) 4. [](https://support.apple.com/HT207275) 5. [94116](http://www.securityfocus.com/bid/94116)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43437 - **State**: PUBLISHED - **Published Date**: December 20, 2021 at 19:24 UTC - **Last Updated**: August 04, 2024 at 03:55 UTC - **Reserved Date**: November 08, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://portswigger.net/web-security/host-header) 2. [](https://medium.com/%40mayhem7999/cve-2021-43437-5c5e3b977e84)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26965 - **State**: PUBLISHED - **Published Date**: December 09, 2020 at 00:24 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 12, 2020 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. ### Affected Products **Mozilla - Firefox** Affected versions: - < 83 (Status: affected) **Mozilla - Firefox ESR** Affected versions: - < 78.5 (Status: affected) **Mozilla - Thunderbird** Affected versions: - < 78.5 (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1661617) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-50/) 3. [](https://www.mozilla.org/security/advisories/mfsa2020-52/) 4. [](https://www.mozilla.org/security/advisories/mfsa2020-51/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28142 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 12:35 UTC - **Last Updated**: December 12, 2024 at 15:29 UTC - **Reserved Date**: March 05, 2024 at 09:15 UTC - **Assigned By**: SEC-VLab ### Vulnerability Description Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "File Name" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the "file name" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins. This attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the "Default" User can be changed. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Image Access GmbH - Scan2Net** Affected versions: - 0 (Status: affected) ### References 1. [](https://r.sec-consult.com/imageaccess) 2. [](https://www.imageaccess.de/?page=SupportPortal&lang=en) ### Credits - Daniel Hirschberger (SEC Consult Vulnerability Lab) - Tobias Niemann (SEC Consult Vulnerability Lab)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17352 - **State**: PUBLISHED - **Published Date**: October 08, 2019 at 12:13 UTC - **Last Updated**: August 05, 2024 at 01:40 UTC - **Reserved Date**: October 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In JFinal cos before 2019-08-13, as used in JFinal 4.4, there is a vulnerability that can bypass the isSafeFile() function: one can upload any type of file. For example, a .jsp file may be stored and almost immediately deleted, but this deletion step does not occur for certain exceptions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jfinal/jfinal/issues/171) 2. [](https://gitee.com/jfinal/cos/commit/5eb23d6e384abaad19faa7600d14c9a2f525946a) 3. [](https://gitee.com/jfinal/cos/commit/8d26eec61f0d072a68bf7393cf3a8544a1112130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5685 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 03, 2006 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20119 - **State**: PUBLISHED - **Published Date**: November 09, 2021 at 18:13 UTC - **Last Updated**: August 03, 2024 at 17:30 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password. ### Affected Products **n/a - Arris SurfBoard SB8200** Affected versions: - Arris SurfBoard SB8200 AB01.02.053.01_112320_193.0A.NSH (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2021-49)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5288 - **State**: REJECTED - **Last Updated**: September 14, 2023 at 18:40 UTC - **Reserved Date**: August 15, 2013 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4452 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 13:51 UTC - **Last Updated**: August 01, 2024 at 20:40 UTC - **Reserved Date**: May 02, 2024 at 22:09 UTC - **Assigned By**: Wordfence ### Vulnerability Description The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **wpmet - ElementsKit Pro** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve) 2. [](https://wpmet.com/plugin/elementskit/) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0570 - **State**: PUBLISHED - **Published Date**: July 13, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 14:33 UTC - **Reserved Date**: December 16, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The Fibre Channel over Ethernet (FCoE) feature in IBM System Networking and Blade Network Technology (BNT) switches running IBM Networking Operating System (aka NOS, formerly BLADE Operating System) floods data frames with unknown MAC addresses out on all interfaces on the same VLAN, which might allow remote attackers to obtain sensitive information in opportunistic circumstances by eavesdropping on the broadcast domain. IBM X-Force ID: 83166. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-networking-cve20130570(83166)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83166) 2. [](https://www-304.ibm.com/support/docview.wss?uid=isg3T1019715)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1043 - **State**: PUBLISHED - **Published Date**: June 12, 2019 at 13:49 UTC - **Last Updated**: May 20, 2025 at 17:50 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. The security update addresses the vulnerability by modifying how comctl32.dll handles objects in memory. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1703** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1803 (Server Core Installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Systems Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Comctl32 Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1043)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1532 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 09:31 UTC - **Last Updated**: April 17, 2025 at 18:17 UTC - **Reserved Date**: February 21, 2025 at 01:20 UTC - **Assigned By**: Honor ### Vulnerability Description Phoneservice module is affected by code injection vulnerability, successful exploitation of this vulnerability may affect service confidentiality and integrity. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N` ### Affected Products **Honor - com.hihonor.phoneservice** Affected versions: - 11.0.0.271 (Status: affected) ### References 1. [](https://www.honor.com/global/security/cve-2025-1532/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4123 - **State**: PUBLISHED - **Published Date**: April 03, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves alarm and timer handling in the "Clock" component. It allows physically proximate attackers to discover the iTunes e-mail address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1040604](http://www.securitytracker.com/id/1040604) 2. [](https://support.apple.com/HT208693) 3. [103578](http://www.securityfocus.com/bid/103578)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6901 - **State**: PUBLISHED - **Published Date**: September 26, 2016 at 16:00 UTC - **Last Updated**: August 06, 2024 at 01:43 UTC - **Reserved Date**: August 22, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerability in Huawei AR100, AR120, AR150, AR200, AR500, AR550, AR1200, AR2200, AR2500, AR3200, and AR3600 routers with software before V200R007C00SPC900 and NetEngine 16EX routers with software before V200R007C00SPC900 allows remote authenticated users to cause a denial of service via format string specifiers in vectors involving partial commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92618](http://www.securityfocus.com/bid/92618) 2. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160824-01-vrp-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31632, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31632 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31632 - **State**: PUBLISHED - **Published Date**: May 23, 2025 at 12:44 UTC - **Last Updated**: May 23, 2025 at 13:34 UTC - **Reserved Date**: March 31, 2025 at 10:06 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in SpyroPress La Boom allows PHP Local File Inclusion. This issue affects La Boom: from n/a through 2.7. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **SpyroPress - La Boom** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/laboom/vulnerability/wordpress-la-boom-2-7-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3861 - **State**: PUBLISHED - **Published Date**: April 20, 2017 at 22:00 UTC - **Last Updated**: August 05, 2024 at 14:39 UTC - **Reserved Date**: December 21, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCut47751. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **n/a - Cisco IOS and IOS XE** Affected versions: - Cisco IOS and IOS XE (Status: affected) ### References 1. [1038313](http://www.securitytracker.com/id/1038313) 2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise) 3. [97935](http://www.securityfocus.com/bid/97935)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37186 - **State**: PUBLISHED - **Published Date**: April 16, 2023 at 00:00 UTC - **Last Updated**: February 06, 2025 at 18:50 UTC - **Reserved Date**: August 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In LemonLDAP::NG before 2.0.15. some sessions are not deleted when they are supposed to be deleted according to the timeoutActivity setting. This can occur when there are at least two servers, and a session is manually removed before the time at which it would have been removed automatically. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2758) 2. [](https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/59c781b393947663ad3bf26bad0581413dd6fae4) 3. [](https://lists.debian.org/debian-lts-announce/2023/01/msg00027.html) 4. [](https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.0.15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12539 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: April 30, 2020 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7943 - **State**: PUBLISHED - **Published Date**: March 11, 2020 at 21:56 UTC - **Last Updated**: August 04, 2024 at 09:48 UTC - **Reserved Date**: January 23, 2020 at 00:00 UTC - **Assigned By**: puppet ### Vulnerability Description Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13 ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **n/a - Puppet Enterprise 2018.1.x stream** Affected versions: - prior to 2018.1.13 (Status: affected) **n/a - Puppet Enterprise** Affected versions: - prior to 2019.5.0 (Status: affected) **n/a - Puppet Server** Affected versions: - prior to 6.9.2 (Status: affected) - prior to 5.3.12 (Status: affected) **n/a - PuppetDB** Affected versions: - prior to 6.9.1 (Status: affected) - prior to 5.2.13 (Status: affected) **n/a - Resolved in Puppet Enterprise, Puppet Server, PuppetDB** Affected versions: - Puppet Enterprise 2018.1.13 and 2019.5.0 (Status: affected) - Puppet Server 6.9.2 and 5.3.12 (Status: affected) - PuppetDB 6.9.1 and 5.2.13 (Status: affected) ### References 1. [](https://puppet.com/security/cve/CVE-2020-7943/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2140 - **State**: PUBLISHED - **Published Date**: May 02, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: May 01, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in OrbitHYIP 2.0 and earlier allow remote attackers to inject arbitrary web script via the (1) referral parameter to signup.php or (2) id parameter to members.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2006/04/orbithyip-xss.html) 2. [25142](http://www.osvdb.org/25142) 3. [17766](http://www.securityfocus.com/bid/17766) 4. [orbithyip-signup-members-xss(26163)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26163) 5. [19877](http://secunia.com/advisories/19877) 6. [ADV-2006-1583](http://www.vupen.com/english/advisories/2006/1583) 7. [25141](http://www.osvdb.org/25141)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10497 - **State**: PUBLISHED - **Published Date**: September 30, 2019 at 15:40 UTC - **Last Updated**: August 04, 2024 at 22:24 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Use after free issue occurs If another instance of open for voice_svc node has been called from application without closing the previous one. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 ### Affected Products **Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables** Affected versions: - MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 (Status: affected) ### References 1. [](https://www.codeaurora.org/security-bulletin/2019/08/05/august-2019-code-aurora-security-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10504 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:06 UTC - **Last Updated**: August 04, 2024 at 11:06 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSRF in admin/edit-comments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a comment, given the id, via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=343#csrf27) 2. [](https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-editing-a-comment-cve-2020-10504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0962 - **State**: PUBLISHED - **Published Date**: April 14, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 08:01 UTC - **Reserved Date**: February 25, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the File System Manager for EMC DiskXtender 6.20.060 allows remote authenticated users to execute arbitrary code via a crafted request to the RPC interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [emc-diskxtender-filesystemmanager-bo(41774)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41774) 2. [ADV-2008-1198](http://www.vupen.com/english/advisories/2008/1198/references) 3. [20080410 EMC DiskXtender File System Manager Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=684) 4. [29778](http://secunia.com/advisories/29778) 5. [1019828](http://www.securitytracker.com/id?1019828) 6. [28728](http://www.securityfocus.com/bid/28728) 7. [44418](http://www.osvdb.org/44418)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30643 - **State**: PUBLISHED - **Published Date**: September 07, 2023 at 13:12 UTC - **Last Updated**: February 27, 2025 at 20:58 UTC - **Reserved Date**: May 12, 2022 at 21:38 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Adobe - Illustrator** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/illustrator/apsb22-26.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6786 - **State**: PUBLISHED - **Published Date**: September 09, 2019 at 19:28 UTC - **Last Updated**: August 04, 2024 at 20:31 UTC - **Reserved Date**: January 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control (issue 1 of 3). The contents of an LFS object can be accessed by an unauthorized user, if the file size and OID are known. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/) 2. [](https://gitlab.com/gitlab-org/gitlab-workhorse/issues/197)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22124 - **State**: PUBLISHED - **Published Date**: August 04, 2021 at 18:18 UTC - **Last Updated**: October 25, 2024 at 13:52 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An uncontrolled resource consumption (denial of service) vulnerability in the login modules of FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6; and FortiAuthenticator before 6.0.6 may allow an unauthenticated attacker to bring the device into an unresponsive state via specifically-crafted long request parameters. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:X/RC:X` ### Affected Products **Fortinet - Fortinet FortiSandbox, FortiAuthenticator** Affected versions: - FortiSandbox 3.2.2, 3.2.1, 3.2.0, 3.1.4, 3.1.3, 3.1.2, 3.1.1, 3.1.0, 3.0.6, 3.0.5, 3.0.4, 3.0.3, 3.0.2, 3.0.1, 3.0.0, FortiAuthenticator before 6.0.6 (Status: affected) ### References 1. [](https://fortiguard.com/advisory/FG-IR-20-170)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0487 - **State**: PUBLISHED - **Published Date**: February 01, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 31, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in Tumbleweed MailGate Email Firewall (EMF) 6.x allow remote attackers to (1) trigger temporarily incorrect processing of an e-mail message under "extremely heavy loads" and (2) cause an "increased number of missed spam" during "spam outbreaks." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060121 Tumbleweed EMF 6.x Processing Issues](http://www.securityfocus.com/archive/1/422591/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12150 - **State**: PUBLISHED - **Published Date**: May 24, 2019 at 15:39 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 16, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Karamasoft UltimateEditor 1 does not ensure that an uploaded file is an image or document (neither file types nor extensions are restricted). The attacker must use the Attach icon to perform an upload. An uploaded file is accessible under the UltimateEditorInclude/UserFiles/ URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.karamasoft.com) 2. [](https://github.com/Gr4y21/My-CVE-IDs/blob/master/CVE-2019-12150/Karamasoft%20Arbitrary%20File%20Upload)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32384 - **State**: PUBLISHED - **Published Date**: July 01, 2022 at 20:32 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC23 v16.03.07.44 was discovered to contain a stack overflow via the security_5g parameter in the function formWifiBasicSet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://tenda.com) 2. [](http://ac23.com) 3. [](https://drive.google.com/file/d/16hshiCHS8j3YaFPkQD3xajVuwu_QVBe3/view?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20570 - **State**: PUBLISHED - **Published Date**: December 28, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 12:05 UTC - **Reserved Date**: December 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description jp2_encode in jp2/jp2_enc.c in JasPer 2.0.14 has a heap-based buffer over-read. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20190102 [SECURITY] [DLA 1628-1] jasper security update](https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html) 2. [](https://github.com/mdadams/jasper/issues/191) 3. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 4. [openSUSE-SU-2020:1517](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html) 5. [openSUSE-SU-2020:1523](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4730 - **State**: PUBLISHED - **Published Date**: May 16, 2025 at 00:00 UTC - **Last Updated**: May 16, 2025 at 13:35 UTC - **Reserved Date**: May 15, 2025 at 07:23 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMapDel of the component HTTP POST Request Handler. The manipulation of the argument devicemac1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **TOTOLINK - A3002R** Affected versions: - 3.0.0-B20230809.1615 (Status: affected) **TOTOLINK - A3002RU** Affected versions: - 3.0.0-B20230809.1615 (Status: affected) ### References 1. [VDB-309032 | TOTOLINK A3002R/A3002RU HTTP POST Request formMapDel buffer overflow](https://vuldb.com/?id.309032) 2. [VDB-309032 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.309032) 3. [Submit #570687 | TOTOLINK A3002RU V3 and A3002R_V4 V3.0.0-B20230809.1615 Buffer Overflow](https://vuldb.com/?submit.570687) 4. [](https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/3.md) 5. [](https://www.totolink.net/) ### Credits - BabyShark (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0612, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0612 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0612 - **State**: PUBLISHED - **Published Date**: March 08, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 12, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [apple-webkit-cve20120612-code-execution(73831)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73831) 2. [52365](http://www.securityfocus.com/bid/52365) 3. [79934](http://osvdb.org/79934) 4. [1026774](http://www.securitytracker.com/id?1026774) 5. [48377](http://secunia.com/advisories/48377) 6. [APPLE-SA-2012-03-12-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html) 7. [48274](http://secunia.com/advisories/48274) 8. [oval:org.mitre.oval:def:17156](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17156) 9. [APPLE-SA-2012-03-07-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html) 10. [48288](http://secunia.com/advisories/48288) 11. [APPLE-SA-2012-03-07-2](http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1321, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1321 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1321 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 18:03 UTC - **Reserved Date**: December 07, 2017 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11, 2.0.x before 2.0.8, and unsupported releases 1.0.x and 1.1.x which may be also affected, can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution. ### Affected Products **Apache Software Foundation - Apache Syncope** Affected versions: - Releases prior to 1.2.11, Releases prior to 2.0.8 (Status: affected) - The unsupported Releases 1.0.x, 1.1.x may be also affected. (Status: affected) ### References 1. [103508](http://www.securityfocus.com/bid/103508) 2. [](http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements) 3. [45400](https://www.exploit-db.com/exploits/45400/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1650 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 11:05 UTC - **Last Updated**: August 07, 2024 at 17:42 UTC - **Reserved Date**: February 19, 2024 at 23:34 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Categorify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the categorifyAjaxRenameCategory function in all versions up to, and including, 1.0.7.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to rename categories. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **frenify - Categorify – WordPress Media Library Category & File Manager** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f9a3dc87-5309-41fe-bfc3-60b5878b6c57?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3034410/categorify) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5772 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414) 2. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 3. [RHSA-2013:1447](http://rhn.redhat.com/errata/RHSA-2013-1447.html) 4. [RHSA-2013:1440](http://rhn.redhat.com/errata/RHSA-2013-1440.html) 5. [USN-2033-1](http://www.ubuntu.com/usn/USN-2033-1) 6. [USN-2089-1](http://www.ubuntu.com/usn/USN-2089-1) 7. [63089](http://www.securityfocus.com/bid/63089) 8. [oval:org.mitre.oval:def:19219](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19219) 9. [RHSA-2013:1508](http://rhn.redhat.com/errata/RHSA-2013-1508.html) 10. [SUSE-SU-2013:1677](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html) 11. [HPSBUX02944](http://marc.info/?l=bugtraq&m=138674073720143&w=2) 12. [RHSA-2013:1505](http://rhn.redhat.com/errata/RHSA-2013-1505.html) 13. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655201) 14. [HPSBUX02943](http://marc.info/?l=bugtraq&m=138674031212883&w=2) 15. [openSUSE-SU-2013:1663](http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html) 16. [SUSE-SU-2013:1666](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html) 17. [RHSA-2013:1793](http://rhn.redhat.com/errata/RHSA-2013-1793.html) 18. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) 19. [APPLE-SA-2013-10-15-1](http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html) 20. [RHSA-2013:1507](http://rhn.redhat.com/errata/RHSA-2013-1507.html) 21. [](http://support.apple.com/kb/HT5982) 22. [RHSA-2013:1451](http://rhn.redhat.com/errata/RHSA-2013-1451.html) 23. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4241 - **State**: PUBLISHED - **Published Date**: June 26, 2019 at 14:35 UTC - **Last Updated**: September 17, 2024 at 02:01 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access. IBM X-Force ID: 159467. ### Affected Products **IBM - PureApplication System** Affected versions: - 2.2.3.0 (Status: affected) - 2.2.3.1 (Status: affected) - 2.2.3.2 (Status: affected) - 2.2.4.0 (Status: affected) - 2.2.5.0 (Status: affected) - 2.2.5.1 (Status: affected) - 2.2.5.2 (Status: affected) - 2.2.5.3 (Status: affected) ### References 1. [](https://www-01.ibm.com/support/docview.wss?uid=ibm10885602) 2. [ibm-pure-cve20194241-auth-bypass (159467)](https://exchange.xforce.ibmcloud.com/vulnerabilities/159467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15706 - **State**: PUBLISHED - **Published Date**: July 29, 2020 at 17:45 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: July 14, 2020 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-362: Security Weakness ### Affected Products **Ubuntu - grub2 in Ubuntu** Affected versions: - 20.04 LTS (Status: affected) - 18.04 LTS (Status: affected) - 16.04 LTS (Status: affected) - 14.04 ESM (Status: affected) ### References 1. [](https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/) 2. [](https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass) 3. [](http://ubuntu.com/security/notices/USN-4432-1) 4. [](https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot) 5. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011) 6. [](https://access.redhat.com/security/vulnerabilities/grub2bootloader) 7. [](https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/) 8. [](https://www.suse.com/support/kb/doc/?id=000019673) 9. [](https://www.openwall.com/lists/oss-security/2020/07/29/3) 10. [](https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html) 11. [DSA-4735](https://www.debian.org/security/2020/dsa-4735) 12. [[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities](http://www.openwall.com/lists/oss-security/2020/07/29/3) 13. [](https://security.netapp.com/advisory/ntap-20200731-0008/) 14. [USN-4432-1](https://usn.ubuntu.com/4432-1/) 15. [openSUSE-SU-2020:1169](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html) 16. [openSUSE-SU-2020:1168](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html) 17. [GLSA-202104-05](https://security.gentoo.org/glsa/202104-05) ### Credits - Chris Coulson
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2222, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2222 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2222 - **State**: PUBLISHED - **Published Date**: June 12, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 24, 2007 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote attackers to execute arbitrary code via a crafted ActiveX object that triggers memory corruption, as demonstrated via the ModeName parameter to the FindEngine function in ACTIVEVOICEPROJECTLib.DirectSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ie-speech-code-execution(34630)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34630) 2. [35353](http://osvdb.org/35353) 3. [VU#507433](http://www.kb.cert.org/vuls/id/507433) 4. [25627](http://secunia.com/advisories/25627) 5. [4065](http://www.exploit-db.com/exploits/4065) 6. [SSRT071438](http://www.securityfocus.com/archive/1/471947/100/0/threaded) 7. [24426](http://www.securityfocus.com/bid/24426) 8. [1018235](http://securitytracker.com/id?1018235) 9. [](http://retrogod.altervista.org/win_speech_2k_sp4.html) 10. [ADV-2007-2153](http://www.vupen.com/english/advisories/2007/2153) 11. [TA07-163A](http://www.us-cert.gov/cas/techalerts/TA07-163A.html) 12. [oval:org.mitre.oval:def:2031](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2031) 13. [](http://retrogod.altervista.org/win_speech_xp_sp2.html) 14. [MS07-033](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-033) 15. [HPSBST02231](http://www.securityfocus.com/archive/1/471947/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15695 - **State**: PUBLISHED - **Published Date**: December 26, 2019 at 15:24 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 27, 2019 at 00:00 UTC - **Assigned By**: Kaspersky ### Vulnerability Description TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Kaspersky - TigerVNC** Affected versions: - 1.10.0 (Status: affected) ### References 1. [](https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1) 2. [[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update](https://www.openwall.com/lists/oss-security/2019/12/20/2) 3. [](https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89) 4. [openSUSE-SU-2020:0087](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51601 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:15 UTC - **Last Updated**: September 18, 2024 at 18:30 UTC - **Reserved Date**: December 20, 2023 at 21:52 UTC - **Assigned By**: zdi ### Vulnerability Description Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of xml files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18563. ### Weakness Classification (CWE) - CWE-611: Security Weakness ### Affected Products **Honeywell - Saia PG5 Controls Suite** Affected versions: - PG5 v2.3.193 (Status: affected) ### References 1. [ZDI-23-1850](https://www.zerodayinitiative.com/advisories/ZDI-23-1850/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6195 - **State**: PUBLISHED - **Published Date**: June 20, 2024 at 16:00 UTC - **Last Updated**: August 01, 2024 at 21:33 UTC - **Reserved Date**: June 20, 2024 at 06:06 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file orderadd.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269167. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **itsourcecode - Tailoring Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-269167 | itsourcecode Tailoring Management System orderadd.php sql injection](https://vuldb.com/?id.269167) 2. [VDB-269167 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.269167) 3. [Submit #359127 | itsourcecode Tailoring Management System Project In PHP 1.0 SQL Injection](https://vuldb.com/?submit.359127) 4. [](https://github.com/2768210355/cve/issues/2) ### Credits - qwetvg (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3584, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3584 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3584 - **State**: PUBLISHED - **Published Date**: January 23, 2019 at 15:00 UTC - **Last Updated**: August 04, 2024 at 19:12 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: trellix ### Vulnerability Description Exploitation of Authentication vulnerability in MVision Endpoint in McAfee MVision Endpoint Prior to 1811 Update 1 (18.11.31.62) allows authenticated administrator users --> administrators to Remove MVision Endpoint via unspecified vectors. ### Affected Products **Mcafee - MVision Endpoint** Affected versions: - All (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10265) 2. [106789](http://www.securityfocus.com/bid/106789)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16911 - **State**: REJECTED - **Published Date**: November 05, 2020 at 23:19 UTC - **Last Updated**: November 05, 2020 at 23:19 UTC - **Reserved Date**: September 11, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25223 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 07:01 UTC - **Last Updated**: April 08, 2025 at 15:58 UTC - **Reserved Date**: April 07, 2025 at 18:33 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Team Circle Image Slider With Lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **nik00726 - Team Circle Image Slider With Lightbox** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bd3e30ea-8f58-4895-b78c-fb18c94d5253?source=cve) 2. [](https://wordpress.org/plugins/circle-image-slider-with-lightbox/) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2061993%40circle-image-slider-with-lightbox&new=2061993%40circle-image-slider-with-lightbox&sfp_email=&sfph_mail=) ### Credits - Ala Arfaoui
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50913 - **State**: PUBLISHED - **Published Date**: December 05, 2024 at 00:00 UTC - **Last Updated**: December 11, 2024 at 16:41 UTC - **Reserved Date**: December 15, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Oxide control plane software before 5 allows SSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://oxide.computer) 2. [](https://docs.oxide.computer/security/advisories/20231215-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14987 - **State**: PUBLISHED - **Published Date**: August 13, 2019 at 03:38 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Adive Framework through 2.0.7 is affected by XSS in the Create New Table and Create New Navigation Link functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sevenlayers.com/index.php/231-adive-framework-2-0-7-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44608 - **State**: PUBLISHED - **Published Date**: February 23, 2022 at 18:51 UTC - **Last Updated**: August 04, 2024 at 04:25 UTC - **Reserved Date**: December 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple Cross Site Scripting (XSS) vulnerabilities exists in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) file parameter and (2) type parameter in an edit action in index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/alexlang24/bloofoxCMS/issues/12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31363 - **State**: PUBLISHED - **Published Date**: April 12, 2024 at 12:21 UTC - **Last Updated**: August 02, 2024 at 01:52 UTC - **Reserved Date**: April 01, 2024 at 06:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in LifterLMS.This issue affects LifterLMS: from n/a through 7.5.0. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **LifterLMS - LifterLMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/lifterlms/wordpress-lifterlms-plugin-7-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0021 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:36 UTC - **Reserved Date**: January 07, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The "screen dump" feature in Eterm 0.9.1 and earlier allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030224 Terminal Emulator Security Issues](http://marc.info/?l=bugtraq&m=104612710031920&w=2) 2. [MDKSA-2003:040](http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:040) 3. [terminal-emulator-screen-dump(11413)](http://www.iss.net/security_center/static/11413.php) 4. [20030224 Terminal Emulator Security Issues](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html) 5. [6936](http://www.securityfocus.com/bid/6936)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1512 - **State**: PUBLISHED - **Published Date**: May 01, 2009 at 22:00 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: May 01, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Static code injection vulnerability in X-Forum 0.6.2 allows remote authenticated administrators to inject arbitrary PHP code into Config.php via the adminEMail parameter to SaveConfig.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [xforum-config-code-execution(50390)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50390) 2. [8317](https://www.exploit-db.com/exploits/8317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14814 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:18 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.21 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 2. [](https://security.netapp.com/advisory/ntap-20201023-0003/) 3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4472, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4472 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4472 - **State**: PUBLISHED - **Published Date**: October 07, 2008 at 18:27 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [designreview-liveupdate-unauth-access(45521)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45521) 2. [31490](http://www.securityfocus.com/bid/31490) 3. [](http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366) 4. [6630](https://www.exploit-db.com/exploits/6630) 5. [](http://images.autodesk.com/adsk/files/live_update_hotfix0.html) 6. [4361](http://securityreason.com/securityalert/4361) 7. [](http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html) 8. [ADV-2008-2704](http://www.vupen.com/english/advisories/2008/2704) 9. [20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit](http://www.securityfocus.com/archive/1/496847/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39338, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39338 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39338 - **State**: PUBLISHED - **Published Date**: October 15, 2021 at 12:15 UTC - **Last Updated**: March 31, 2025 at 17:59 UTC - **Reserved Date**: August 20, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The MyBB Cross-Poster WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/classes/MyBBXPSettings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **MyBB Cross-Poster - MyBB Cross-Poster** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39338) 2. [](https://github.com/BigTiger2020/word-press/blob/main/MyBB%20Cross-Poster.md) 3. [](https://plugins.trac.wordpress.org/browser/mybb-cross-poster/trunk/classes/MyBBXPSettings.php) ### Credits - Thinkland Security Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4396 - **State**: PUBLISHED - **Published Date**: August 04, 2020 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:18 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Jazz Foundation and IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 179359. ### Affected Products **IBM - Rational Rhapsody Design Manager** Affected versions: - 6.0.2 (Status: affected) - 7.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6255694) 2. [ibm-etm-cve20204396-xss (179359)](https://exchange.xforce.ibmcloud.com/vulnerabilities/179359)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-20448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-20448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-20448 - **State**: PUBLISHED - **Published Date**: May 25, 2021 at 17:55 UTC - **Last Updated**: August 04, 2024 at 14:22 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote malicious user to cause a Denial of Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://trac.ffmpeg.org/ticket/7990)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-28413, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-28413 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-28413 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 00:00 UTC - **Last Updated**: April 08, 2025 at 16:05 UTC - **Reserved Date**: March 11, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the SysDictTypeController component ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/yangzongzhuan/RuoYi) 2. [](https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28413.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2289 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 13:48 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Untrusted search path vulnerability in Installer of Qua station connection tool for Windows version 1.00.03 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. ### Affected Products **KDDI CORPORATION - Installer of Qua station connection tool for Windows** Affected versions: - version 1.00.03 (Status: affected) ### References 1. [JVN#81659403](https://jvn.jp/en/jp/JVN81659403/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22475 - **State**: PUBLISHED - **Published Date**: February 22, 2021 at 16:11 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description "Tasks" application version before 9.7.3 is affected by insecure permissions. The VoiceCommandActivity application component allows arbitrary applications on a device to add tasks with no restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lyhinslab.org/index.php/2020/07/18/how-the-white-box-hacking-works-ok-google-i-wanna-pwn-this-app/) 2. [](https://www.exploit-db.com/exploits/49563)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30312 - **State**: PUBLISHED - **Published Date**: May 28, 2024 at 00:00 UTC - **Last Updated**: November 07, 2024 at 11:15 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue discovered in OpenWrt 18.06, 19.07, 21.02, 22.03, and beyond allows off-path attackers to hijack TCP sessions, which could lead to a denial of service, impersonating the client to the server (e.g., for access to files over FTP), and impersonating the server to the client (e.g., to deliver false information from a finance website). This occurs because nf_conntrack_tcp_no_window_check is true by default. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://openwrt.org/docs/guide-developer/security) 2. [](https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/) 3. [](https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/) 4. [](https://news.ycombinator.com/item?id=40723150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8049 - **State**: PUBLISHED - **Published Date**: December 10, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: November 02, 2015 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted autoSize property value, a different vulnerability than CVE-2015-8048, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2015:2239](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html) 2. [](https://helpx.adobe.com/security/products/flash-player/apsb15-32.html) 3. [78715](http://www.securityfocus.com/bid/78715) 4. [SUSE-SU-2015:2236](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html) 5. [SUSE-SU-2015:2247](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html) 6. [](http://zerodayinitiative.com/advisories/ZDI-15-601) 7. [1034318](http://www.securitytracker.com/id/1034318) 8. [GLSA-201601-03](https://security.gentoo.org/glsa/201601-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51962 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 19:58 UTC - **Last Updated**: April 10, 2025 at 19:20 UTC - **Reserved Date**: November 04, 2024 at 16:54 UTC - **Assigned By**: Esri ### Vulnerability Description A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify Column properties allowing for the execution of a SQL Injection by a remote authenticated user with elevated (non admin) privileges.  There is a high impact to integrity and confidentiality and no impact to availability. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Esri - ArcGIS Server** Affected versions: - all (Status: affected) ### References 1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18421 - **State**: PUBLISHED - **Published Date**: August 02, 2019 at 15:36 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 66.0.2 allows demo accounts to create databases and users (SEC-271). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/66+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4860 - **State**: PUBLISHED - **Published Date**: June 05, 2014 at 20:00 UTC - **Last Updated**: August 06, 2024 at 16:59 UTC - **Reserved Date**: July 17, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Radio Thermostat CT80 And CT50 with firmware 1.4.64 and earlier does not restrict access to the API, which allows remote attackers to change the operation mode, wifi connection settings, temperature thresholds, and other settings via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [radiothermostat-cve20134860-security-bypass(86197)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86197) 2. [61581](http://www.securityfocus.com/bid/61581) 3. [](http://packetstormsecurity.com/files/122657/Radio-Thermostat-Of-America-Inc-Lack-Of-Authentication.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0942 - **State**: PUBLISHED - **Published Date**: January 26, 2024 at 19:31 UTC - **Last Updated**: August 23, 2024 at 19:03 UTC - **Reserved Date**: January 26, 2024 at 12:37 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-252186 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-613: Security Weakness ### Affected Products **Totolink - N200RE V5** Affected versions: - 9.3.5u.6255_B20211224 (Status: affected) ### References 1. [VDB-252186 | Totolink N200RE V5 cstecgi.cgi session expiration](https://vuldb.com/?id.252186) 2. [VDB-252186 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.252186) 3. [Submit #269679 | Totolink N200RE_V5 V9.3.5u.6255_B20211224 Insufficient Session Expiration](https://vuldb.com/?submit.269679) 4. [](https://drive.google.com/file/d/1oWAGbmDtHDIUN1WSRAh4ZnuzHOuvTU4T/view?usp=sharing) 5. [](https://youtu.be/b0tU2CiLbnU) ### Credits - Chun-Li Lin - lin7lic (VulDB User) - lin7lic (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1900, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1900 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1900 - **State**: PUBLISHED - **Published Date**: October 22, 2012 at 23:00 UTC - **Last Updated**: August 06, 2024 at 19:17 UTC - **Reserved Date**: March 26, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in admin/index.php in RazorCMS 1.2.1 and earlier allows remote attackers to hijack the authentication of administrators for requests that delete arbitrary web pages via a showcats action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/files/110593/RazorCMS-1.2.1-STABLE-Cross-Site-Request-Forgery.html) 2. [18575](http://www.exploit-db.com/exploits/18575) 3. [razorcms-deletewebpage-csrf(73902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73902)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46635 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 19:46 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 26, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. Crafted data in a DGN file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15507. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Bentley - MicroStation CONNECT** Affected versions: - 10.16.0.80 (Status: affected) ### References 1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-222/) ### Credits - Mat Powell of Trend Micro Zero Day Initiative
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2411 - **State**: PUBLISHED - **Published Date**: April 18, 2016 at 00:00 UTC - **Last Updated**: August 05, 2024 at 23:24 UTC - **Reserved Date**: February 18, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A Qualcomm Power Management kernel driver in Android 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application that leverages root access, aka internal bug 26866053. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2016-04-02.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-125049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-125049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-125049 - **State**: PUBLISHED - **Published Date**: January 06, 2023 at 12:29 UTC - **Last Updated**: August 06, 2024 at 14:10 UTC - **Reserved Date**: January 06, 2023 at 12:29 UTC - **Assigned By**: VulDB ### Vulnerability Description ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in typcn Blogile. Affected is the function getNav of the file server.js. The manipulation of the argument query leads to sql injection. The name of the patch is cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217560. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **typcn - Blogile** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.217560) 2. [](https://vuldb.com/?ctiid.217560) 3. [](https://github.com/typcn/Blogile/commit/cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3453 - **State**: PUBLISHED - **Published Date**: September 04, 2020 at 02:26 UTC - **Last Updated**: November 13, 2024 at 18:07 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340 Series Routers could allow an authenticated, remote attacker with administrative credentials to execute arbitrary commands on the underlying operating system (OS) as a restricted user. For more information about these vulnerabilities, see the Details section of this advisory. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20200902 Cisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-osinj-rce-pwTkPCJv) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1101/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16829 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:52 UTC - **Last Updated**: December 20, 2021 at 22:52 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7571 - **State**: PUBLISHED - **Published Date**: April 06, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 06, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description public/rolechangeadmin in Faveo 1.9.3 allows CSRF. The impact is obtaining admin privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ladybirdweb/faveo-helpdesk/issues/446) 2. [97493](http://www.securityfocus.com/bid/97493) 3. [41830](https://www.exploit-db.com/exploits/41830/) 4. [](http://rungga.blogspot.co.id/2017/04/csrf-privilege-escalation-manipulation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3968 - **State**: PUBLISHED - **Published Date**: February 09, 2012 at 02:00 UTC - **Last Updated**: August 06, 2024 at 23:53 UTC - **Reserved Date**: October 01, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving Cascading Style Sheets (CSS) token sequences. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [](http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html) 5. [](http://code.google.com/p/chromium/issues/detail?id=109743) 6. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 7. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 8. [](http://support.apple.com/kb/HT5400) 9. [oval:org.mitre.oval:def:14483](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14483)