System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-33197, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-33197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33197
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 19:17 UTC
- **Last Updated**: January 14, 2025 at 19:32 UTC
- **Reserved Date**: May 17, 2023 at 22:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Craft is a CMS for creating custom digital experiences on the web. Cross-site scripting (XSS) can be triggered via the Update Asset Index utility. This issue has been patched in version 4.4.6.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**craftcms - cms**
Affected versions:
- >= 4.0.0-RC1, <= 4.4.5 (Status: affected)
### References
1. [https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr](https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr)
2. [https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766](https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766)
3. [https://github.com/craftcms/cms/releases/tag/4.4.6](https://github.com/craftcms/cms/releases/tag/4.4.6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-40348, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-40348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40348
- **State**: PUBLISHED
- **Published Date**: November 01, 2021 at 04:32 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: August 31, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2021/10/28/4)
2. [](https://github.com/uyuni-project/uyuni/commit/790c7388efac6923c5475e01c1ff718dffa9f052)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-22974, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-22974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22974
- **State**: PUBLISHED
- **Published Date**: February 12, 2021 at 16:23 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x, an authenticated attacker with access to iControl REST over the control plane may be able to take advantage of a race condition to execute commands with an elevated privilege level. This vulnerability is due to an incomplete fix for CVE-2017-6167. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
### Affected Products
**n/a - BIG-IP, BIG-IQ**
Affected versions:
- BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6 and all versions of BIG-IQ 7.x and 6.x (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K68652018)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-38180, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-38180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38180
- **State**: PUBLISHED
- **Published Date**: October 12, 2021 at 14:03 UTC
- **Last Updated**: August 04, 2024 at 01:37 UTC
- **Reserved Date**: August 07, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution.
### Weakness Classification (CWE)
- CWE-1236: Security Weakness
### Affected Products
**SAP SE - SAP Business One**
Affected versions:
- < 10.0 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983)
2. [](https://launchpad.support.sap.com/#/notes/3079427)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-1299, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-1299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1299
- **State**: PUBLISHED
- **Published Date**: March 24, 2006 at 11:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: March 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Baby FTP Server 1.2, and possibly other versions before May 31, 2003 allows remote authenticated users to list arbitrary directories and possibly read files via "..." (triple dot) manipulations to the CWD command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.pablosoftwaresolutions.com/html/baby_ftp_server.html)
2. [7749](http://www.securityfocus.com/bid/7749)
3. [24538](http://www.osvdb.org/24538)
4. [](http://packetstormsecurity.org/0305-exploits/baby.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-1694, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-1694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1694
- **State**: PUBLISHED
- **Published Date**: June 05, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 12, 2016 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [90876](http://www.securityfocus.com/bid/90876)
2. [openSUSE-SU-2016:1496](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html)
3. [1035981](http://www.securitytracker.com/id/1035981)
4. [DSA-3590](http://www.debian.org/security/2016/dsa-3590)
5. [](http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html)
6. [openSUSE-SU-2016:1430](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html)
7. [](https://codereview.chromium.org/1941073002)
8. [RHSA-2016:1190](https://access.redhat.com/errata/RHSA-2016:1190)
9. [](https://crbug.com/603682)
10. [GLSA-201607-07](https://security.gentoo.org/glsa/201607-07)
11. [openSUSE-SU-2016:1433](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-34652, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-34652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34652
- **State**: PUBLISHED
- **Published Date**: June 28, 2023 at 00:00 UTC
- **Last Updated**: November 27, 2024 at 14:59 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phpgurukul.com/hostel-management-system/)
2. [](https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34652)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9469, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9469
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: January 03, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in vBulletin 3.5.4, 3.6.0, 3.6.7, 3.8.7, 4.2.2, 5.0.5, and 5.1.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [72592](http://www.securityfocus.com/bid/72592)
2. [](http://packetstormsecurity.com/files/130393/vBulletin-5.1.3-Cross-Site-Scripting.html)
3. [20150212 CVE-2014-9469 vBulletin XSS (Cross-Site Scripting) Security Vulnerabilities](http://seclists.org/fulldisclosure/2015/Feb/49)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-26135, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-26135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26135
- **State**: PUBLISHED
- **Published Date**: October 02, 2020 at 08:29 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Live Helper Chat before 3.44v allows reflected XSS via the setsettingajax PATH_INFO.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://livehelperchat.com/3.44v-security-update-and-few-other-bits-586a.html)
2. [](https://github.com/LiveHelperChat/livehelperchat/commit/a131b937dd6a87271ed1c0c8b8deb8710cf78f58)
3. [](https://github.com/rekter0/exploits/tree/master/CVE-2020-26134)
4. [](https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-28912, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-28912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28912
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 17:00 UTC
- **Last Updated**: May 03, 2025 at 00:39 UTC
- **Reserved Date**: March 13, 2024 at 01:26 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft SQL Server 2022 for (CU 12)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (CU 25)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (GDR)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (GDR)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft OLE DB Driver 19 for SQL Server**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft OLE DB Driver 18 for SQL Server**
Affected versions:
- 18.0.0 (Status: affected)
### References
1. [Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28912)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-2797, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-2797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2797
- **State**: PUBLISHED
- **Published Date**: September 10, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 06:07 UTC
- **Reserved Date**: August 17, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WebKit component in Safari in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, does not remove usernames and passwords from URLs sent in Referer headers, which allows remote attackers to obtain sensitive information by reading Referer logs on a web server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
3. [43068](http://secunia.com/advisories/43068)
4. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
5. [41856](http://secunia.com/advisories/41856)
6. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
7. [ipod-ipone-referer-info-disclosure(53187)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53187)
8. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
9. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
10. [36339](http://www.securityfocus.com/bid/36339)
11. [APPLE-SA-2009-09-09-1](http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html)
12. [36677](http://secunia.com/advisories/36677)
13. [](http://support.apple.com/kb/HT3860)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-2073, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-2073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2073
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:21 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
2. [GLSA-202101-15](https://security.gentoo.org/glsa/202101-15)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1010311, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1010311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010311
- **State**: REJECTED
- **Published Date**: July 12, 2019 at 17:37 UTC
- **Last Updated**: July 13, 2019 at 00:00 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6151, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6151
- **State**: PUBLISHED
- **Published Date**: July 26, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 01, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CA eHealth 6.2.x allows remote authenticated users to cause a denial of service or possibly execute arbitrary commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160721-01-security-notice-for-ca-ehealth.aspx)
2. [1036433](http://www.securitytracker.com/id/1036433)
3. [92107](http://www.securityfocus.com/bid/92107)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7113, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7113
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 16:14 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A vulnerability was found when an attacker, while communicating with the ClearPass management interface, is able to intercept and change parameters in the HTTP packets resulting in the compromise of some of ClearPass' service accounts. Resolution: Fixed in 6.7.10, 6.8.1, 6.9.0 and higher.
### Affected Products
**n/a - ClearPass Policy Manager**
Affected versions:
- ClearPass 6.8.x prior to 6.8.5 ClearPass 6.7.x prior to 6.7.13 (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-004.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-14486, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-14486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14486
- **State**: PUBLISHED
- **Published Date**: March 17, 2019 at 21:14 UTC
- **Last Updated**: August 05, 2024 at 09:29 UTC
- **Reserved Date**: July 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DNN (formerly DotNetNuke) 9.1.1 allows cross-site scripting (XSS) via XML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html)
2. [](http://www.dnnsoftware.com/community/security/security-center)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3031, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3031
- **State**: PUBLISHED
- **Published Date**: April 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:16 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the XSLT engine.
### Affected Products
**n/a - Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier.**
Affected versions:
- Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier. (Status: affected)
### References
1. [97554](http://www.securityfocus.com/bid/97554)
2. [1038228](http://www.securitytracker.com/id/1038228)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-11.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1813, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1813
- **State**: PUBLISHED
- **Published Date**: May 15, 2019 at 22:20 UTC
- **Last Updated**: November 20, 2024 at 17:19 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability exists because software digital signatures are not properly verified during CLI command execution. An attacker could exploit this vulnerability to install an unsigned software image on an affected device.
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**Cisco - Cisco NX-OS Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190515 Cisco NX-OS CLI Command Software Image Signature Verification Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-sisv2)
2. [108425](http://www.securityfocus.com/bid/108425)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4973, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4973
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**n/a - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions**
Affected versions:
- Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-09.html)
2. [1040920](http://www.securitytracker.com/id/1040920)
3. [104175](http://www.securityfocus.com/bid/104175)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-42375, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-42375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42375
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 19:24 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: JFROG
### Vulnerability Description
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.
### Weakness Classification (CWE)
- CWE-159: Security Weakness
### Affected Products
**busybox - busybox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)
2. [FEDORA-2021-5a95823596](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)
3. [FEDORA-2021-c52c0fe490](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)
4. [](https://security.netapp.com/advisory/ntap-20211223-0002/)
5. [](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1454, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1454
- **State**: PUBLISHED
- **Published Date**: April 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: April 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in MySQL before 3.23.33 allows remote attackers to execute arbitrary code via a long drop database request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [mysql-drop-database-bo(6419)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6419)
2. [20010209 Some more MySql security issues](http://www.securityfocus.com/archive/1/161917)
3. [](http://dev.mysql.com/doc/mysql/en/news-3-23-33.html)
4. [VU#367320](http://www.kb.cert.org/vuls/id/367320)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14551, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14551
- **State**: PUBLISHED
- **Published Date**: September 18, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .djvu file, related to "Data from Faulting Address controls Branch Selection starting at STDUDjVuFile!DllUnregisterServer+0x000000000000d9f2."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14551)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4139, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4139
- **State**: PUBLISHED
- **Published Date**: June 18, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: May 31, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in smilies4wp.php in the WP Smiley plugin 1.4.1 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the s4w-more parameter to wp-admin/options-general.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150531 Re: CVE request: XSS and CSRF in WP Smiley plugin for WordPress](http://www.openwall.com/lists/oss-security/2015/05/31/2)
2. [74914](http://www.securityfocus.com/bid/74914)
3. [[oss-security] 20150529 CVE request: XSS and CSRF in WP Smiley plugin for WordPress](http://www.openwall.com/lists/oss-security/2015/05/29/1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11686, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11686
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 11:11 UTC
- **Last Updated**: January 09, 2025 at 14:28 UTC
- **Reserved Date**: November 25, 2024 at 16:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WhatsApp 🚀 click to chat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'manycontacts_code' parameter in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**manycontacts - WhatsApp 🚀 click to chat**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7d623840-30d1-4599-a52d-08c28e190699?source=cve)
2. [](https://wordpress.org/plugins/manycontacts-bar/)
### Credits
- Dale Mavers
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41752, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41752
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 06:57 UTC
- **Last Updated**: February 13, 2025 at 17:09 UTC
- **Reserved Date**: August 31, 2023 at 20:55 UTC
- **Assigned By**: apache
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2.
Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Apache Software Foundation - Apache Traffic Server**
Affected versions:
- 8.0.0 (Status: affected)
- 9.0.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q)
2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/)
5. [](https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html)
6. [](https://www.debian.org/security/2023/dsa-5549)
### Credits
- Masakazu Kitajo
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2945, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2945
- **State**: PUBLISHED
- **Published Date**: September 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
arc 5.21j and earlier create temporary files with world-readable permissions, which allows local users to read sensitive information from files created by (1) arc (arc.c) or (2) marc (marc.c).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16805](http://secunia.com/advisories/16805)
2. [20050916 arc insecure temporary file creation](http://marc.info/?l=bugtraq&m=112689596714383&w=2)
3. [](http://www.zataz.net/adviso/arc-09052005.txt)
4. [DSA-843](http://www.debian.org/security/2005/dsa-843)
5. [17068](http://secunia.com/advisories/17068)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25512, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25512
- **State**: PUBLISHED
- **Published Date**: March 10, 2022 at 23:35 UTC
- **Last Updated**: August 03, 2024 at 04:42 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FreeTAKTeam/UI/issues/26)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0683, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0683
- **State**: PUBLISHED
- **Published Date**: May 01, 2023 at 14:23 UTC
- **Last Updated**: January 30, 2025 at 15:51 UTC
- **Reserved Date**: February 06, 2023 at 15:09 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Lenovo - XClarity Controller**
Affected versions:
- See product security advisory below (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-99936)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-18964, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-18964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18964
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 18:37 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Request Forgery (CSRF) Vulnerability in ForestBlog latest version via the website Management background, which could let a remote malicious gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/saysky/ForestBlog/issues/20)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-40723, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-40723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40723
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 10:27 UTC
- **Last Updated**: August 02, 2024 at 16:05 UTC
- **Reserved Date**: July 09, 2024 at 03:30 UTC
- **Assigned By**: twcert
### Vulnerability Description
The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**CHANGING Information Technology - HWATAIServiSign Windows Version**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7968-ce2ef-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-7974-0562f-2.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-35248, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-35248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35248
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 20:08 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: June 22, 2021 at 00:00 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
It has been reported that any Orion user, e.g. guest accounts can query the Orion.UserSettings entity and enumerate users and their basic settings.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**SolarWinds - Orion**
Affected versions:
- 2020.2.6 HF 2 and previous versions (Status: affected)
### References
1. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35248)
2. [](https://support.solarwinds.com/SuccessCenter/s/article/Orion-Platform-2020-2-6-Hotfix-3)
3. [](https://documentation.solarwinds.com/en/Success_Center/orionplatform/content/core-secure-configuration.htm)
### Credits
- N/A
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46097, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46097
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 11:04 UTC
- **Last Updated**: January 08, 2025 at 16:35 UTC
- **Reserved Date**: October 16, 2023 at 11:24 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly neutralize user provided inputs. This could allow an authenticated adjacent attacker to execute SQL statements in the underlying database.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Siemens - SIMATIC PCS neo**
Affected versions:
- All versions < V4.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13294, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13294
- **State**: PUBLISHED
- **Published Date**: April 04, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 20:36 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A information disclosure vulnerability in the Android framework (aosp email application). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-71814449.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
- 8.1 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-04-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-7146, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-7146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7146
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 02:00 UTC
- **Last Updated**: September 12, 2024 at 18:41 UTC
- **Reserved Date**: December 28, 2023 at 08:33 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in gopeak MasterLab up to 3.3.10. This issue affects the function sqlInjectDelete of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument phone leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249149 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**gopeak - MasterLab**
Affected versions:
- 3.3.0 (Status: affected)
- 3.3.1 (Status: affected)
- 3.3.2 (Status: affected)
- 3.3.3 (Status: affected)
- 3.3.4 (Status: affected)
- 3.3.5 (Status: affected)
- 3.3.6 (Status: affected)
- 3.3.7 (Status: affected)
- 3.3.8 (Status: affected)
- 3.3.9 (Status: affected)
- 3.3.10 (Status: affected)
### References
1. [](https://vuldb.com/?id.249149)
2. [](https://vuldb.com/?ctiid.249149)
3. [](https://note.zhaoj.in/share/jRqEcVBTsZh4)
### Credits
- glzjin (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24563, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24563
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 08:24 UTC
- **Last Updated**: February 10, 2025 at 22:06 UTC
- **Reserved Date**: January 23, 2025 at 14:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGlow Cleanup – Directory Listing & Classifieds WordPress Plugin allows Reflected XSS. This issue affects Cleanup – Directory Listing & Classifieds WordPress Plugin: from n/a through 1.0.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ThemeGlow - Cleanup – Directory Listing & Classifieds WordPress Plugin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cleanup-light/vulnerability/wordpress-cleanup-directory-listing-classifieds-plugin-1-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3064, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3064
- **State**: PUBLISHED
- **Published Date**: July 19, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: April 29, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.x and 11.x before 11.0 FP4 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 allows remote authenticated users to read arbitrary files via a crafted UNIX file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69027](http://www.securityfocus.com/bid/69027)
2. [ibm-imdm-cve20143064-unix-alter(93600)](https://exchange.xforce.ibmcloud.com/vulnerabilities/93600)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677299)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2026, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2026
- **State**: PUBLISHED
- **Published Date**: June 08, 2022 at 08:35 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: June 08, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository kromitgmbh/titra prior to 0.77.0.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**kromitgmbh - kromitgmbh/titra**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/kromitgmbh/titra/commit/e606b674a2b7564407d89e38a341d72e22b14694)
2. [](https://huntr.dev/bounties/dcfa6790-c609-4ed5-ba5e-8f31f98e5e11)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6104
- **State**: PUBLISHED
- **Published Date**: November 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6103.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38713](https://www.exploit-db.com/exploits/38713/)
2. [](http://packetstormsecurity.com/files/134398/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html)
3. [MS15-115](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115)
4. [](https://code.google.com/p/google-security-research/issues/detail?id=507)
5. [1034114](http://www.securitytracker.com/id/1034114)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0978, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0978
- **State**: PUBLISHED
- **Published Date**: April 05, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 05, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the Object Push service in IVT BlueSoleil 1.4 allows remote attackers to upload arbitrary files via a .. (dot dot) in a PUSH command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050401 DMA[2005-0401a] - 'IVT BlueSoleil Directory Transversal'](http://marc.info/?l=bugtraq&m=111238511206503&w=2)
2. [14790](http://secunia.com/advisories/14790/)
3. [](http://www.digitalmunition.com/DMA%5B2005-0401a%5D.txt)
4. [bluesoleil-object-push-directory-traversal(19930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19930)
5. [12961](http://www.securityfocus.com/bid/12961)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20241, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20241
- **State**: PUBLISHED
- **Published Date**: November 22, 2023 at 17:10 UTC
- **Last Updated**: June 05, 2025 at 14:23 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Secure Client Software, formerly AnyConnect Secure Mobility Client, could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.
These vulnerabilities are due to an out-of-bounds memory read from Cisco Secure Client Software. An attacker could exploit these vulnerabilities by logging in to an affected device at the same time that another user is accessing Cisco Secure Client on the same system, and then sending crafted packets to a port on that local host. A successful exploit could allow the attacker to crash the VPN Agent service, causing it to be unavailable to all users of the system. To exploit these vulnerabilities, the attacker must have valid credentials on a multi-user system.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Cisco - Cisco Secure Client**
Affected versions:
- 4.9.00086 (Status: affected)
- 4.9.01095 (Status: affected)
- 4.9.02028 (Status: affected)
- 4.9.03047 (Status: affected)
- 4.9.03049 (Status: affected)
- 4.9.04043 (Status: affected)
- 4.9.04053 (Status: affected)
- 4.9.05042 (Status: affected)
- 4.9.06037 (Status: affected)
- 4.10.00093 (Status: affected)
- 4.10.01075 (Status: affected)
- 4.10.02086 (Status: affected)
- 4.10.03104 (Status: affected)
- 4.10.04065 (Status: affected)
- 4.10.04071 (Status: affected)
- 4.10.05085 (Status: affected)
- 4.10.05095 (Status: affected)
- 4.10.05111 (Status: affected)
- 4.10.06079 (Status: affected)
- 4.10.06090 (Status: affected)
- 4.10.07061 (Status: affected)
- 4.10.07062 (Status: affected)
- 4.10.07073 (Status: affected)
- 5.0.00238 (Status: affected)
- 5.0.00529 (Status: affected)
- 5.0.00556 (Status: affected)
- 5.0.01242 (Status: affected)
- 5.0.02075 (Status: affected)
- 5.0.03072 (Status: affected)
- 5.0.03076 (Status: affected)
- 5.0.04032 (Status: affected)
### References
1. [cisco-sa-accsc-dos-9SLzkZ8](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-accsc-dos-9SLzkZ8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4192, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4192
- **State**: PUBLISHED
- **Published Date**: December 13, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in templates/notepads/notepads.inc in Horde Mnemo Note Manager H3 before 2.0.3 allow remote authenticated users to inject arbitrary web script or HTML via (1) the notepad's name or (2) description, when creating a new notepad.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[horde-announce] 20051211 Mnemo H3 (2.0.3) (final)](http://lists.horde.org/archives/announce/2005/000237.html)
2. [17964](http://secunia.com/advisories/17964)
3. [15803](http://www.securityfocus.com/bid/15803)
4. [ADV-2005-2833](http://www.vupen.com/english/advisories/2005/2833)
5. [](http://www.sec-consult.com/245.html)
6. [](http://cvs.horde.org/diff.php/mnemo/templates/notepads/notepads.inc?r1=1.9&r2=1.10&ty=h)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41831, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41831
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 15:07 UTC
- **Last Updated**: August 15, 2024 at 03:56 UTC
- **Reserved Date**: July 22, 2024 at 17:16 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb24-57.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-19676, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-19676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19676
- **State**: PUBLISHED
- **Published Date**: September 30, 2020 at 17:52 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nacos 1.1.4 is affected by: Incorrect Access Control. An environment can be set up locally to get the service details interface. Then other Nacos service names can be accessed through the service list interface. Service details can then be accessed when not logged in. (detail:https://github.com/alibaba/nacos/issues/2284)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/alibaba/nacos/issues/2284)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1267, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1267
- **State**: PUBLISHED
- **Published Date**: April 06, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 06, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in WebMaid CMS 0.2-6 Beta and earlier allow remote attackers to read arbitrary files via directory traversal sequences in the com parameter to (1) cContactus.php, (2) cGuestbook.php, and (3) cArticle.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-0674](http://www.vupen.com/english/advisories/2010/0674)
2. [11831](http://www.exploit-db.com/exploits/11831)
3. [38993](http://www.securityfocus.com/bid/38993)
4. [](http://inj3ct0r.com/exploits/11394)
5. [](http://packetstormsecurity.org/1003-exploits/webmaid-rfilfi.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4307, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4307
- **State**: PUBLISHED
- **Published Date**: July 11, 2012 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: November 04, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in mod/wiki/lang/en/wiki.php in Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the section parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=41017112cff7f5bd7969c72d321320f3090e7c68)
2. [](http://moodle.org/mod/forum/discuss.php?d=188321)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=747444)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44001, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44001
- **State**: PUBLISHED
- **Published Date**: November 17, 2022 at 00:00 UTC
- **Last Updated**: April 29, 2025 at 14:56 UTC
- **Reserved Date**: October 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037)
2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3657, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3657
- **State**: PUBLISHED
- **Published Date**: December 21, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ActiveX control in MCINSCTL.DLL for McAfee VirusScan Security Center does not use the IObjectSafetySiteLock API to restrict access to required domains, which allows remote attackers to create or append to arbitrary files via the StartLog and AddLog methods in the MCINSTALL.McLog object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [279](http://securityreason.com/securityalert/279)
2. [1015390](http://securitytracker.com/id?1015390)
3. [ADV-2005-3006](http://www.vupen.com/english/advisories/2005/3006)
4. [20051220 McAfee Security Center MCINSCTL.DLL ActiveX Control File Overwrite](http://www.idefense.com/intelligence/vulnerabilities/display.php?id=358)
5. [15986](http://www.securityfocus.com/bid/15986)
6. [18169](http://secunia.com/advisories/18169)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40840, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40840
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 20:09 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "fromGetWirelessRepeat."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/6/6.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10994, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10994
- **State**: PUBLISHED
- **Published Date**: November 08, 2024 at 06:00 UTC
- **Last Updated**: November 08, 2024 at 14:32 UTC
- **Reserved Date**: November 07, 2024 at 20:32 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Codezips Online Institute Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit_user.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**Codezips - Online Institute Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-283459 | Codezips Online Institute Management System edit_user.php unrestricted upload](https://vuldb.com/?id.283459)
2. [VDB-283459 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.283459)
3. [Submit #438412 | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 Unrestricted Upload](https://vuldb.com/?submit.438412)
4. [](https://github.com/Hacker0xone/CVE/issues/1)
### Credits
- hacker1106 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27584, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27584
- **State**: PUBLISHED
- **Published Date**: September 19, 2024 at 22:54 UTC
- **Last Updated**: September 26, 2024 at 03:55 UTC
- **Reserved Date**: March 04, 2023 at 01:03 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**dragonflyoss - Dragonfly2**
Affected versions:
- < 2.0.9 (Status: affected)
### References
1. [https://github.com/dragonflyoss/Dragonfly2/security/advisories/GHSA-hpc8-7wpm-889w](https://github.com/dragonflyoss/Dragonfly2/security/advisories/GHSA-hpc8-7wpm-889w)
2. [https://github.com/dragonflyoss/Dragonfly2/releases/tag/v2.0.9](https://github.com/dragonflyoss/Dragonfly2/releases/tag/v2.0.9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21230, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21230
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 19:52 UTC
- **Last Updated**: March 13, 2025 at 15:25 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Cluster**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-8331, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-8331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8331
- **State**: PUBLISHED
- **Published Date**: February 20, 2019 at 16:00 UTC
- **Last Updated**: August 04, 2024 at 21:17 UTC
- **Reserved Date**: February 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [107375](http://www.securityfocus.com/bid/107375)
2. [20190509 dotCMS v5.1.1 Vulnerabilities](https://seclists.org/bugtraq/2019/May/18)
3. [20190510 dotCMS v5.1.1 HTML Injection & XSS Vulnerability](http://seclists.org/fulldisclosure/2019/May/11)
4. [20190510 dotCMS v5.1.1 Vulnerabilities](http://seclists.org/fulldisclosure/2019/May/10)
5. [20190510 Re: dotCMS v5.1.1 HTML Injection & XSS Vulnerability](http://seclists.org/fulldisclosure/2019/May/13)
6. [RHSA-2019:1456](https://access.redhat.com/errata/RHSA-2019:1456)
7. [[flink-user] 20190811 Apache flink 1.7.2 security issues](https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E)
8. [[flink-dev] 20190811 Apache flink 1.7.2 security issues](https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E)
9. [[flink-user] 20190813 Apache flink 1.7.2 security issues](https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E)
10. [[flink-user] 20190813 Re: Apache flink 1.7.2 security issues](https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E)
11. [[superset-dev] 20190926 Re: [VOTE] Release Superset 0.34.1 based on Superset 0.34.1rc1](https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E)
12. [RHSA-2019:3023](https://access.redhat.com/errata/RHSA-2019:3023)
13. [RHSA-2019:3024](https://access.redhat.com/errata/RHSA-2019:3024)
14. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E)
15. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E)
16. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E)
17. [](http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html)
18. [[hbase-issues] 20201116 [GitHub] [hbase] symat opened a new pull request #2661: HBASE-25261 Upgrade Bootstrap to 3.4.1](https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714%40%3Cissues.hbase.apache.org%3E)
19. [[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list](https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E)
20. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
21. [](https://github.com/twbs/bootstrap/pull/28236)
22. [](https://github.com/twbs/bootstrap/releases/tag/v4.3.1)
23. [](https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/)
24. [](https://github.com/twbs/bootstrap/releases/tag/v3.4.1)
25. [](https://support.f5.com/csp/article/K24383845)
26. [](https://support.f5.com/csp/article/K24383845?utm_source=f5support&%3Butm_medium=RSS)
27. [](https://www.tenable.com/security/tns-2021-14)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1390, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1390
- **State**: REJECTED
- **Published Date**: May 02, 2005 at 04:00 UTC
- **Last Updated**: May 04, 2005 at 09:00 UTC
- **Reserved Date**: May 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25043, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25043
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 09:05 UTC
- **Last Updated**: August 02, 2024 at 11:11 UTC
- **Reserved Date**: February 02, 2023 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Incorrect Authorization vulnerability in Supsystic Data Tables Generator.This issue affects Data Tables Generator: from n/a through 1.10.25.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Supsystic - Data Tables Generator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/data-tables-generator-by-supsystic/wordpress-data-tables-generator-by-supsystic-plugin-1-10-25-broken-acces-control-vulnerability?_s_id=cve-2023-25043)
### Credits
- Rafshanzani Suhada (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41203, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41203
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 17:49 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
In some workflow of SAP BusinessObjects BI Platform (Central Management Console and BI LaunchPad), an authenticated attacker with low privileges can intercept a serialized object in the parameters and substitute with another malicious serialized object, which leads to deserialization of untrusted data vulnerability. This could highly compromise the Confidentiality, Integrity, and Availability of the system.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**SAP SE - SAP BusinessObjects Business Intelligence Platform (Central Management Console and BI Launchpad)**
Affected versions:
- = 4.2 (Status: affected)
- = 4.3 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3243924)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-1508, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-1508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1508
- **State**: PUBLISHED
- **Published Date**: February 19, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
init.php in WebCalendar allows remote attackers to execute arbitrary local PHP scripts via the user_inc parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20041109 Multiple Vulnerabilities in WebCalendar](http://marc.info/?l=bugtraq&m=110011618724455&w=2)
2. [11651](http://www.securityfocus.com/bid/11651)
3. [webcalendar-init-file-include(18028)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18028)
4. [13164](http://secunia.com/advisories/13164)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1105, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1105
- **State**: PUBLISHED
- **Published Date**: February 28, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: February 28, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Mutare EVM allow remote attackers to inject arbitrary web script or HTML via (1) a delivery address and possibly (2) a PIN.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#136612](http://www.kb.cert.org/vuls/id/136612)
2. [mutare-evm-pin-xss(65768)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65768)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4468, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4468
- **State**: PUBLISHED
- **Published Date**: December 22, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file include vulnerability in help_text_vars.php in PHPGedView 3.3.7 and earlier allows remote attackers to execute arbitrary code via a URL in the PGV_BASE_DIRECTORY parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15983](http://www.securityfocus.com/bid/15983)
2. [](http://rgod.altervista.org/phpgedview_337_xpl.html)
3. [20051220 PHPGedView <= 3.3.7 remote code execution](http://www.securityfocus.com/archive/1/419906/100/0/threaded)
4. [phpgedview-helptextvars-file-include(23871)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23871)
5. [18177](http://secunia.com/advisories/18177)
6. [](http://cvs.sourceforge.net/viewcvs.py/phpgedview/phpGedView/help_text_vars.php?r1=1.63&r2=1.64)
7. [ADV-2005-3033](http://www.vupen.com/english/advisories/2005/3033)
8. [22009](http://www.osvdb.org/22009)
9. [1015395](http://securitytracker.com/id?1015395)
10. [](https://sourceforge.net/tracker/index.php?func=detail&aid=1386434&group_id=55456&atid=477081)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10841, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10841
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Directory traversal vulnerability in WebCalendar 1.2.7 and earlier allows authenticated attackers to read arbitrary files via unspecified vectors.
### Affected Products
**k5n.us - WebCalendar**
Affected versions:
- 1.2.7 and earlier (Status: affected)
### References
1. [JVN#23340457](https://jvn.jp/en/jp/JVN23340457/index.html)
2. [](https://github.com/craigk5n/webcalendar/releases/tag/v1.2.8)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0824, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0824
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:28 UTC
- **Reserved Date**: October 15, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [glibc-ld-unsetenv(5173)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5173)
2. [19990917 A few bugs...](http://marc.info/?l=bugtraq&m=93760201002154&w=2)
3. [20000924 glibc locale security problem](http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html)
4. [20000906 [slackware-security]: glibc 2.1.3 vulnerabilities patched](http://archives.neohapsis.com/archives/bugtraq/2000-08/0525.html)
5. [RHSA-2000:057](http://www.redhat.com/support/errata/RHSA-2000-057.html)
6. [MDKSA-2000:045](http://www.linux-mandrake.com/en/updates/MDKSA-2000-045.php3)
7. [20000902 Conectiva Linux Security Announcement - glibc](http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html)
8. [1639](http://www.securityfocus.com/bid/1639)
9. [TLSA2000020-1](http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html)
10. [20000902 glibc: local root exploit](http://www.debian.org/security/2000/20000902)
11. [20000831 glibc unsetenv bug](http://www.securityfocus.com/archive/1/79537)
12. [20000905 Conectiva Linux Security Announcement - glibc](http://archives.neohapsis.com/archives/bugtraq/2000-08/0509.html)
13. [648](http://www.securityfocus.com/bid/648)
14. [CSSA-2000-028.0](http://www.calderasystems.com/support/security/advisories/CSSA-2000-028.0.txt)
15. [MDKSA-2000:040](http://www.linux-mandrake.com/en/updates/MDKSA-2000-040.php3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3138, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3138
- **State**: PUBLISHED
- **Published Date**: August 12, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 12, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The LTPA STS module support implementation in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.9 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.9 relies on a static instance of a Java Development Kit (JDK) class, which might allow attackers to bypass LTPA token signature verification by leveraging lack of thread safety.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IV01318](http://www-01.ibm.com/support/docview.wss?uid=swg1IV01318)
2. [ibm-tfim-security-bypass(69198)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69198)
3. [](http://www.ibm.com/support/docview.wss?uid=swg24029498)
4. [](http://www.ibm.com/support/docview.wss?uid=swg24029497)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22786, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22786
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 14:03 UTC
- **Last Updated**: January 31, 2025 at 18:07 UTC
- **Reserved Date**: January 06, 2023 at 15:24 UTC
- **Assigned By**: hpe
### Vulnerability Description
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Access Points running InstantOS and ArubaOS 10**
Affected versions:
- InstantOS 8.10.x.x: 8.10.0.2 and below (Status: affected)
- ArubaOS 10.3.x.x: 10.3.1.4 and below (Status: affected)
- See reference document for further details (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt)
### Credits
- Erik de Jong (bugcrowd.com/erikdejong)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-35719, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-35719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35719
- **State**: PUBLISHED
- **Published Date**: January 11, 2021 at 02:55 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Search/index.jsp file via the added parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://un4gi.io/blog/multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications)
2. [](https://clandestinelabs.io/security-advisories/advisory-multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8522, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8522
- **State**: PUBLISHED
- **Published Date**: September 12, 2024 at 08:30 UTC
- **Last Updated**: September 12, 2024 at 13:07 UTC
- **Reserved Date**: September 06, 2024 at 15:23 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**thimpress - LearnPress – WordPress LMS Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e495507d-7eac-4f38-ab6f-b8f0809b2be4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/jwt/rest-api/version1/class-lp-rest-courses-v1-controller.php#L441)
3. [](https://plugins.trac.wordpress.org/changeset/3148560/learnpress/tags/4.2.7.1/inc/jwt/rest-api/version1/class-lp-rest-courses-v1-controller.php?old=3138586&old_path=learnpress%2Ftags%2F4.2.7%2Finc%2Fjwt%2Frest-api%2Fversion1%2Fclass-lp-rest-courses-v1-controller.php)
### Credits
- abrahack
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-21802, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-21802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21802
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 13:45 UTC
- **Last Updated**: September 16, 2024 at 23:25 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package grapesjs before 0.19.5 are vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P`
### Affected Products
**n/a - grapesjs**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960)
2. [](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781)
3. [](https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709)
4. [](https://github.com/artf/grapesjs/commit/13e85d152d486b968265c4b8017e8901e7d89ff3)
5. [](https://github.com/artf/grapesjs/releases/tag/v0.19.5)
### Credits
- zgeist
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-23894, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-23894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23894
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 21:57 UTC
- **Last Updated**: January 09, 2025 at 15:23 UTC
- **Reserved Date**: January 19, 2023 at 14:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Surbma Surbma | GDPR Proof Cookie Consent & Notice Bar plugin <= 17.5.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Surbma - Surbma | GDPR Proof Cookie Consent & Notice Bar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/surbma-gdpr-proof-google-analytics/wordpress-surbma-gdpr-proof-cookie-consent-notice-bar-plugin-17-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0379, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0379
- **State**: PUBLISHED
- **Published Date**: February 13, 2023 at 14:31 UTC
- **Last Updated**: March 21, 2025 at 14:46 UTC
- **Reserved Date**: January 18, 2023 at 07:27 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Spotlight Social Feeds WordPress plugin before 1.4.3 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Spotlight Social Feeds [Block, Shortcode, and Widget]**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/14b4f0c5-c7b1-4ac4-8c9c-f8c35ca5de4a)
### Credits
- Lana Codes
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11753, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11753
- **State**: PUBLISHED
- **Published Date**: July 30, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The GetImageDepth function in MagickCore/attribute.c in ImageMagick 7.0.6-4 might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted Flexible Image Transport System (FITS) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/629)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0684, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0684
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Denial of service in Sendmail 8.8.6 in HPUX.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5481, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5481
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 22:28 UTC
- **Last Updated**: February 13, 2025 at 17:25 UTC
- **Reserved Date**: October 10, 2023 at 00:12 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Downloads in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 118.0.5993.70 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html)
2. [](https://crbug.com/1458934)
3. [](https://www.debian.org/security/2023/dsa-5526)
4. [](https://security.gentoo.org/glsa/202311-11)
5. [](https://security.gentoo.org/glsa/202312-07)
6. [](https://security.gentoo.org/glsa/202401-34)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20710, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20710
- **State**: PUBLISHED
- **Published Date**: February 10, 2022 at 17:06 UTC
- **Last Updated**: November 06, 2024 at 16:31 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20220203 Cisco Small Business RV Series Routers Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32077, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32077
- **State**: PUBLISHED
- **Published Date**: May 06, 2021 at 23:00 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search selectors. This discloses doctors' and nurses' social security numbers and PII.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.veritystream.com/legacy/msow-solutions)
2. [](https://www.marbasec.com/blog/cve-2021-32077-fun-with-social-security-numbers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24099, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24099
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 16:32 UTC
- **Last Updated**: January 30, 2025 at 21:25 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122069)
2. [](https://support.apple.com/en-us/122068)
3. [](https://support.apple.com/en-us/122070)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16096, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16096 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16096
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 03:19 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
serveryaozeyan is a simple HTTP server. serveryaozeyan is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - serveryaozeyan node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/355)
2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-36836, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-36836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36836
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 06:43 UTC
- **Last Updated**: October 16, 2024 at 18:05 UTC
- **Reserved Date**: October 15, 2024 at 18:35 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized arbitrary file deletion in versions up to, and including, 0.9.0.2 due to a lack of capability checking and insufficient path validation. This makes it possible for authenticated users with minimal permissions to delete arbitrary files from the server.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**emrevona - WP Fastest Cache**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/82f80916-37ab-4c5a-9787-2544c620acac?source=cve)
2. [](https://wearetradecraft.com/advisories/tc-2020-0001/)
3. [](https://plugins.trac.wordpress.org/changeset/2235160/wp-fastest-cache)
### Credits
- Glyn Wintle
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38011, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38011
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 17:03 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: June 11, 2024 at 18:18 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Secure Boot Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-130: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Secure Boot Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13341, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13341
- **State**: PUBLISHED
- **Published Date**: February 01, 2025 at 06:41 UTC
- **Last Updated**: February 03, 2025 at 16:37 UTC
- **Reserved Date**: January 10, 2025 at 19:46 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to SQL Injection via the 'data-id' parameter in all versions up to, and including, 4.1.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Techspawn - MultiLoca - WooCommerce Multi Locations Inventory Management**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb172cc-b7a6-401d-a246-1918702d654d?source=cve)
2. [](https://codecanyon.net/item/woocommerce-multi-locations-inventory-management/28949586)
### Credits
- Aiden
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-43295, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-43295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43295
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 19:59 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Request Forgery vulnerability in Click Studios (SA) Pty Ltd Passwordstate v.Build 9785 and before allows a local attacker to execute arbitrary code via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.clickstudios.com.au/security/advisories/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3306, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3306
- **State**: PUBLISHED
- **Published Date**: May 18, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 15, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.rapid7.com/db/modules/exploit/unix/ftp/proftpd_modcopy_exec)
2. [36803](https://www.exploit-db.com/exploits/36803/)
3. [](http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html)
4. [DSA-3263](http://www.debian.org/security/2015/dsa-3263)
5. [](http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html)
6. [](http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html)
7. [openSUSE-SU-2015:1031](http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html)
8. [FEDORA-2015-7164](http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html)
9. [FEDORA-2015-6401](http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html)
10. [74238](http://www.securityfocus.com/bid/74238)
11. [36742](https://www.exploit-db.com/exploits/36742/)
12. [FEDORA-2015-7086](http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157581.html)
13. [](http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html)
14. [](http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2344, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2344
- **State**: PUBLISHED
- **Published Date**: April 27, 2023 at 14:00 UTC
- **Last Updated**: August 02, 2024 at 06:19 UTC
- **Reserved Date**: April 27, 2023 at 13:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227587.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Service Provider Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.227587)
2. [](https://vuldb.com/?ctiid.227587)
3. [](http://cdn.polowong.top/image-20230427193041378.png)
### Credits
- polowong (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21761, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21761
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:18 UTC
- **Last Updated**: May 04, 2025 at 07:20 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
ovs_vport_cmd_fill_info() can be called without RTNL or RCU.
Use RCU protection and dev_net_rcu() to avoid potential UAF.
### Affected Products
**Linux - Linux**
Affected versions:
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
- 9354d452034273a50a4fd703bea31e5d6b1fc20b (Status: affected)
**Linux - Linux**
Affected versions:
- 4.15 (Status: affected)
- 0 (Status: unaffected)
- 5.4.291 (Status: unaffected)
- 5.10.235 (Status: unaffected)
- 5.15.179 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.79 (Status: unaffected)
- 6.12.16 (Status: unaffected)
- 6.13.4 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e)
2. [](https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11)
3. [](https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1)
4. [](https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da)
5. [](https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074)
6. [](https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a)
7. [](https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0)
8. [](https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-30421, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-30421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30421
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 08:57 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 27, 2024 at 05:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Pixelite Events Manager.This issue affects Events Manager: from n/a through 6.4.7.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Pixelite - Events Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/events-manager/wordpress-events-manager-plugin-6-4-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-36395, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-36395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36395
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 17:57 UTC
- **Last Updated**: April 29, 2025 at 23:34 UTC
- **Reserved Date**: June 21, 2023 at 15:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Deployment Services Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Deployment Services Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5330, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5330
- **State**: PUBLISHED
- **Published Date**: December 05, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the web interface in ClearCase RWP server in IBM Rational ClearCase 7.0.0 before 7.0.0.4, and 7.0.1.1-RATL-RCC-IFIX02 and possibly other 7.0.1 versions before 7.0.1.3, allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO of a URI associated with a VOB page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-3330](http://www.vupen.com/english/advisories/2008/3330)
2. [32957](http://secunia.com/advisories/32957)
3. [PK70972](http://www-01.ibm.com/support/docview.wss?uid=swg1PK70972)
4. [1021295](http://securitytracker.com/id?1021295)
5. [32574](http://www.securityfocus.com/bid/32574)
6. [ibm-clearcase-interface-xss(46983)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46983)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0250, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0250
- **State**: PUBLISHED
- **Published Date**: January 22, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ryneezy phoSheezy 0.2 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the file containing the administrator's password hash via a direct request for config/password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4935](http://securityreason.com/securityalert/4935)
2. [51411](http://osvdb.org/51411)
3. [7780](https://www.exploit-db.com/exploits/7780)
4. [33531](http://secunia.com/advisories/33531)
5. [phosheezy-configpassword-info-disclosure(48056)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48056)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-4496, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-4496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4496
- **State**: PUBLISHED
- **Published Date**: May 12, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Panasonic FPWIN Pro 5.x through 7.x before 7.130 allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by triggering a crafted index value, as demonstrated by an integer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zerodayinitiative.com/advisories/ZDI-16-337/)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-131-01)
3. [](http://zerodayinitiative.com/advisories/ZDI-16-333/)
4. [](http://zerodayinitiative.com/advisories/ZDI-16-336/)
5. [](http://zerodayinitiative.com/advisories/ZDI-16-335/)
6. [90520](http://www.securityfocus.com/bid/90520)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16141, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16141
- **State**: PUBLISHED
- **Published Date**: August 30, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ThinkCMF X2.2.3 has an arbitrary file deletion vulnerability in do_avatar in \application\User\Controller\ProfileController.class.php via an imgurl parameter with a ..\ sequence. A member user can delete any file on a Windows server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://unothing.github.io/posts/thinkcmfx223/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-48921, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-48921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48921
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 01:32 UTC
- **Last Updated**: May 04, 2025 at 12:44 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
sched/fair: Fix fault in reweight_entity
Syzbot found a GPF in reweight_entity. This has been bisected to
commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid
sched_task_group")
There is a race between sched_post_fork() and setpriority(PRIO_PGRP)
within a thread group that causes a null-ptr-deref in
reweight_entity() in CFS. The scenario is that the main process spawns
number of new threads, which then call setpriority(PRIO_PGRP, 0, -20),
wait, and exit. For each of the new threads the copy_process() gets
invoked, which adds the new task_struct and calls sched_post_fork()
for it.
In the above scenario there is a possibility that
setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread
in the group that is just being created by copy_process(), and for
which the sched_post_fork() has not been executed yet. This will
trigger a null pointer dereference in reweight_entity(), as it will
try to access the run queue pointer, which hasn't been set.
Before the mentioned change the cfs_rq pointer for the task has been
set in sched_fork(), which is called much earlier in copy_process(),
before the new task is added to the thread_group. Now it is done in
the sched_post_fork(), which is called after that. To fix the issue
the remove the update_load param from the update_load param() function
and call reweight_task() only if the task flag doesn't have the
TASK_NEW flag set.
### Affected Products
**Linux - Linux**
Affected versions:
- c85c6fadbef0a3eab41540ea628fa8fe8928c820 (Status: affected)
- 3869eecf050416a1d19bac60926f6b5d64b0aa58 (Status: affected)
- 4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a (Status: affected)
- 4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a (Status: affected)
- 25d40b828fb855ee62e1039c65a666c9afd60786 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 5.10.137 (Status: unaffected)
- 5.15.27 (Status: unaffected)
- 5.16.13 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8f317cd888059c59e2fa924bf4b0957cfa53f78e)
2. [](https://git.kernel.org/stable/c/e0bcd6b5779352aed88f2e538a82a39f1a7715bb)
3. [](https://git.kernel.org/stable/c/589a954daab5e18399860b6c8ffaeaf79844eb20)
4. [](https://git.kernel.org/stable/c/13765de8148f71fa795e0a6607de37c49ea5915a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-12893, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-12893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12893
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 19:45 UTC
- **Last Updated**: September 16, 2024 at 23:15 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
### Affected Products
**AMD - AMD Radeon Software**
Affected versions:
- Radeon Software (Status: affected)
- Radeon Pro Software for Enterprise (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12900, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12900
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 22:07 UTC
- **Last Updated**: June 09, 2025 at 15:57 UTC
- **Reserved Date**: June 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20190624 [SECURITY] [DLA 1833-1] bzip2 security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html)
2. [USN-4038-2](https://usn.ubuntu.com/4038-2/)
3. [USN-4038-1](https://usn.ubuntu.com/4038-1/)
4. [20190715 [slackware-security] bzip2 (SSA:2019-195-01)](https://seclists.org/bugtraq/2019/Jul/22)
5. [[debian-lts-announce] 20190718 [SECURITY] [DLA 1833-2] bzip2 regression update](https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html)
6. [openSUSE-SU-2019:1781](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html)
7. [FreeBSD-SA-19:18](https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc)
8. [20190806 FreeBSD Security Advisory FreeBSD-SA-19:18.bzip2](https://seclists.org/bugtraq/2019/Aug/4)
9. [openSUSE-SU-2019:1918](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html)
10. [USN-4146-1](https://usn.ubuntu.com/4146-1/)
11. [USN-4146-2](https://usn.ubuntu.com/4146-2/)
12. [[debian-lts-announce] 20191010 [SECURITY] [DLA 1953-1] clamav security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html)
13. [[debian-lts-announce] 20191014 [SECURITY] [DLA 1953-2] clamav regression update](https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html)
14. [openSUSE-SU-2019:2595](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html)
15. [openSUSE-SU-2019:2597](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html)
16. [[kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka](https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E)
17. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
18. [](http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html)
19. [](http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html)
20. [](https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc)
21. [](https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS)
22. [[flink-user] 20210716 Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni](https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E)
23. [[flink-user] 20210717 Re: Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni](https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-31450, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-31450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31450
- **State**: PUBLISHED
- **Published Date**: August 09, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 16:50 UTC
- **Reserved Date**: April 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.paessler.com/prtg/history/stable)
2. [](https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1898, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1898
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 02:00 UTC
- **Last Updated**: March 04, 2025 at 14:38 UTC
- **Reserved Date**: March 03, 2025 at 18:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Tenda TX3 16.03.13.11_multi. Affected is an unknown function of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**Tenda - TX3**
Affected versions:
- 16.03.13.11_multi (Status: affected)
### References
1. [VDB-298416 | Tenda TX3 openSchedWifi buffer overflow](https://vuldb.com/?id.298416)
2. [VDB-298416 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.298416)
3. [Submit #506606 | Tenda TX3 V16.03.13.11_multi buffer overflow](https://vuldb.com/?submit.506606)
4. [](https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_4.pdf)
5. [](https://www.tenda.com.cn/)
### Credits
- shiny (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-47177, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-47177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47177
- **State**: PUBLISHED
- **Published Date**: March 25, 2024 at 09:16 UTC
- **Last Updated**: May 04, 2025 at 07:05 UTC
- **Reserved Date**: March 25, 2024 at 09:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu_device_sysfs_add() is called before, so is has to be cleaned on subsequent
errors.
### Affected Products
**Linux - Linux**
Affected versions:
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
- 39ab9555c24110671f8dc671311a26e5c985b592 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.11 (Status: affected)
- 0 (Status: unaffected)
- 4.14.235 (Status: unaffected)
- 4.19.193 (Status: unaffected)
- 5.4.124 (Status: unaffected)
- 5.10.42 (Status: unaffected)
- 5.12.9 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8)
2. [](https://git.kernel.org/stable/c/2ec5e9bb6b0560c90d315559c28a99723c80b996)
3. [](https://git.kernel.org/stable/c/044bbe8b92ab4e542de7f6c93c88ea65cccd8e29)
4. [](https://git.kernel.org/stable/c/f01134321d04f47c718bb41b799bcdeda27873d2)
5. [](https://git.kernel.org/stable/c/ca466561eef36d1ec657673e3944eb6340bddb5b)
6. [](https://git.kernel.org/stable/c/0ee74d5a48635c848c20f152d0d488bf84641304)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-28320, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-28320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28320
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 16:58 UTC
- **Reserved Date**: March 31, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.16.02.022. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DM files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16282.
### Weakness Classification (CWE)
- CWE-457: Security Weakness
### Affected Products
**Bentley - View**
Affected versions:
- 10.16.02.022 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0002)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-597/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9193, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9193
- **State**: PUBLISHED
- **Published Date**: December 20, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 02, 2014 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-11684, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-11684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11684
- **State**: PUBLISHED
- **Published Date**: June 04, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Liblouis 3.5.0 has a stack-based Buffer Overflow in the function includeFile in compileTranslationTable.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3672-1](https://usn.ubuntu.com/3672-1/)
2. [](https://github.com/liblouis/liblouis/issues/592)
3. [openSUSE-SU-2019:1160](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-2311, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-2311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2311
- **State**: PUBLISHED
- **Published Date**: November 04, 2020 at 14:35 UTC
- **Last Updated**: August 04, 2024 at 07:09 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A missing permission check in Jenkins AWS Global Configuration Plugin 1.5 and earlier allows attackers with Overall/Read permission to replace the global AWS configuration.
### Affected Products
**Jenkins project - Jenkins AWS Global Configuration Plugin**
Affected versions:
- unspecified (Status: affected)
- 1.3.1 (Status: unaffected)
### References
1. [](https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2101)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3353, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3353
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 mishandles .url files from the Internet zone, which allows remote attackers to bypass intended access restrictions via a crafted file, aka "Internet Explorer Security Feature Bypass."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92827](http://www.securityfocus.com/bid/92827)
2. [](http://zerodayinitiative.com/advisories/ZDI-16-506/)
3. [MS16-104](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-104)
4. [1036788](http://www.securitytracker.com/id/1036788)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-8819, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-8819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8819
- **State**: REJECTED
- **Published Date**: July 08, 2022 at 17:37 UTC
- **Last Updated**: July 08, 2022 at 17:37 UTC
- **Reserved Date**: March 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-13612, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-13612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13612
- **State**: PUBLISHED
- **Published Date**: July 16, 2019 at 12:24 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MDaemon Email Server 19 through 20.0.1 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a customer deploys a server with sufficient resources to scan large messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://lists.altn.com/WebX/.59862f3c)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.