System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8448 - **State**: PUBLISHED - **Published Date**: August 13, 2019 at 14:39 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description The login.jsp resource in Jira before version 7.13.4, and from version 8.0.0 before version 8.2.2 allows remote attackers to enumerate usernames via an information disclosure vulnerability. ### Affected Products **Atlassian - Jira** Affected versions: - unspecified (Status: affected) - 8.0.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-69797)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19037 - **State**: PUBLISHED - **Published Date**: May 13, 2019 at 12:13 UTC - **Last Updated**: August 05, 2024 at 11:23 UTC - **Reserved Date**: November 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On Virgin Media wireless router 3.0 hub devices, the web interface is vulnerable to denial of service. When POST requests are sent and keep the connection open, the router lags and becomes unusable to anyone currently using the web interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/45776/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0407 - **State**: PUBLISHED - **Published Date**: June 02, 2000 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19990209 ALERT: IIS4 allows proxied password attacks over NetBIOS](http://marc.info/?l=bugtraq&m=91983486431506&w=2) 2. [19990209 Re: IIS4 allows proxied password attacks over NetBIOS](http://marc.info/?l=bugtraq&m=92000623021036&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5602 - **State**: PUBLISHED - **Published Date**: October 20, 2023 at 07:29 UTC - **Last Updated**: February 05, 2025 at 19:03 UTC - **Reserved Date**: October 16, 2023 at 13:15 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.5. This is due to missing or incorrect nonce validation on several functions corresponding to AJAX actions. This makes it possible for unauthenticated attackers to invoke those actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Affected Products **socialdude - Social Media Share Buttons & Social Sharing Icons** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d44a45fb-3bff-4a1f-8319-a58a47a9d76b?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/2975574/ultimate-social-media-icons/tags/2.8.6/libs/controllers/sfsi_buttons_controller.php?old=2956446&old_path=ultimate-social-media-icons%2Ftags%2F2.8.5%2Flibs%2Fcontrollers%2Fsfsi_buttons_controller.php) ### Credits - Marco Wotschka
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20593, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20593 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20593 - **State**: PUBLISHED - **Published Date**: December 16, 2022 at 00:00 UTC - **Last Updated**: April 18, 2025 at 14:46 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In pop_descriptor_string of BufferDescriptor.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239415809References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1720 - **State**: PUBLISHED - **Published Date**: April 09, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:50 UTC - **Reserved Date**: January 29, 2014 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use-after-free vulnerability in the HTMLBodyElement::insertedInto function in core/html/HTMLBodyElement.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attributes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code.google.com/p/chromium/issues/detail?id=356095) 2. [](http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html) 3. [openSUSE-SU-2014:0601](http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html) 4. [GLSA-201408-16](http://security.gentoo.org/glsa/glsa-201408-16.xml) 5. [DSA-2905](http://www.debian.org/security/2014/dsa-2905) 6. [](https://src.chromium.org/viewvc/blink?revision=170216&view=revision)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14228 - **State**: PUBLISHED - **Published Date**: September 09, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 19:20 UTC - **Reserved Date**: September 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392423) 2. [USN-3694-1](https://usn.ubuntu.com/3694-1/) 3. [GLSA-201903-19](https://security.gentoo.org/glsa/201903-19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0762 - **State**: PUBLISHED - **Published Date**: February 26, 2022 at 09:35 UTC - **Last Updated**: August 02, 2024 at 23:40 UTC - **Reserved Date**: February 25, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Incorrect Authorization in GitHub repository microweber/microweber prior to 1.3. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **microweber - microweber/microweber** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48) 2. [](https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4640 - **State**: PUBLISHED - **Published Date**: June 19, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:18 UTC - **Reserved Date**: June 17, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices relies on an HTTP connection to the skslm.swiftkey.net server, which allows man-in-the-middle attackers to write to language-pack files by modifying an HTTP response. NOTE: CVE-2015-4640 exploitation can be combined with CVE-2015-4641 exploitation for man-in-the-middle code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.nowsecure.com/keyboard-vulnerability/) 2. [](https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/) 3. [](https://github.com/nowsecure/samsung-ime-rce-poc/) 4. [75347](http://www.securityfocus.com/bid/75347) 5. [](http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/) 6. [VU#155412](http://www.kb.cert.org/vuls/id/155412)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42067, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42067 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42067 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 15:52 UTC - **Last Updated**: May 04, 2025 at 09:22 UTC - **Reserved Date**: July 29, 2024 at 15:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() set_memory_rox() can fail, leaving memory unprotected. Check return and bail out when bpf_jit_binary_lock_ro() returns an error. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.9.8 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/044da7ae7afd4ef60806d73654a2e6a79aa4ed7a) 2. [](https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3185 - **State**: PUBLISHED - **Published Date**: July 20, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 05:39 UTC - **Reserved Date**: April 10, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openSUSE-SU-2015:1684](http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html) 2. [](http://httpd.apache.org/security/vulnerabilities_24.html) 3. [](https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708) 4. [RHSA-2015:1667](http://rhn.redhat.com/errata/RHSA-2015-1667.html) 5. [](https://support.apple.com/HT205217) 6. [](http://www.apache.org/dist/httpd/CHANGES_2.4) 7. [APPLE-SA-2015-09-16-2](http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html) 8. [RHSA-2017:2709](https://access.redhat.com/errata/RHSA-2017:2709) 9. [RHSA-2015:1666](http://rhn.redhat.com/errata/RHSA-2015-1666.html) 10. [1032967](http://www.securitytracker.com/id/1032967) 11. [USN-2686-1](http://www.ubuntu.com/usn/USN-2686-1) 12. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html) 13. [75965](http://www.securityfocus.com/bid/75965) 14. [DSA-3325](http://www.debian.org/security/2015/dsa-3325) 15. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html) 16. [](https://support.apple.com/kb/HT205031) 17. [RHSA-2017:2710](https://access.redhat.com/errata/RHSA-2017:2710) 18. [APPLE-SA-2015-09-16-4](http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html) 19. [](https://support.apple.com/HT205219) 20. [RHSA-2017:2708](https://access.redhat.com/errata/RHSA-2017:2708) 21. [[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E) 22. [[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E) 23. [[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E) 24. [[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E) 25. [](https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73) 26. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E) 27. [[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E) 28. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E) 29. [[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E) 30. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E) 31. [[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E) 32. [[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E) 33. [[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E) 34. [[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E) 35. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46826 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 21:32 UTC - **Last Updated**: May 08, 2025 at 13:42 UTC - **Reserved Date**: April 30, 2025 at 19:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description insa-auth is an authentication server for INSA Rouen. A minor issue allowed third-party websites to access the server's secondary authentication bridge, potentially revealing basic student information (name and number). However, the issue posed minimal risk, was never exploited, and had limited impact. A fix was implemented promptly on May 3, 2025. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **INSAgenda - insa-auth** Affected versions: - < 2025-05-03 (Status: affected) ### References 1. [https://github.com/INSAgenda/insa-auth/security/advisories/GHSA-63xr-gvjv-r6xv](https://github.com/INSAgenda/insa-auth/security/advisories/GHSA-63xr-gvjv-r6xv) 2. [https://github.com/INSAgenda/insa-auth/commit/8c1e68b2fb55aa952f522ead55a6587526982a2c](https://github.com/INSAgenda/insa-auth/commit/8c1e68b2fb55aa952f522ead55a6587526982a2c) 3. [https://github.com/INSAgenda/insa-auth/commit/b0e7508e6ca4360e39fb1fd931f8d47b1f992ced](https://github.com/INSAgenda/insa-auth/commit/b0e7508e6ca4360e39fb1fd931f8d47b1f992ced) 4. [https://github.com/INSAgenda/insa-auth/commit/c77cf2e25778f83ebf5c4fdb4ded3ffcc8cfd74d](https://github.com/INSAgenda/insa-auth/commit/c77cf2e25778f83ebf5c4fdb4ded3ffcc8cfd74d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27256 - **State**: PUBLISHED - **Published Date**: April 13, 2022 at 13:35 UTC - **Last Updated**: August 03, 2024 at 05:25 UTC - **Reserved Date**: March 20, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A PHP Local File inclusion vulnerability in the Redbasic theme for Hubzilla before version 7.2 allows remote attackers to include arbitrary php files via the schema parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hubzilla.org/channel/hubzilla/) 2. [](https://framagit.org/hubzilla/core/-/commit/0784cd593a39a4fc297e8a82f7e79bc8019a0868#1c497fbb3a46b78edf04cc2a2fa33f67e3ffbe2a) 3. [](https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35531 - **State**: PUBLISHED - **Published Date**: June 07, 2022 at 20:07 UTC - **Last Updated**: September 16, 2024 at 16:12 UTC - **Reserved Date**: June 28, 2021 at 00:00 UTC - **Assigned By**: Hitachi Energy ### Vulnerability Description Improper Input Validation vulnerability in a particular configuration setting field of Hitachi Energy TXpert Hub CoreTec 4 product, allows an attacker with access to an authorized user with ADMIN or ENGINEER role rights to inject an OS command that is executed by the system. This issue affects: Hitachi Energy TXpert Hub CoreTec 4 version 2.0.0; 2.0.1; 2.1.0; 2.1.1; 2.1.2; 2.1.3; 2.2.0; 2.2.1. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Hitachi Energy - TXpert Hub CoreTec 4 version** Affected versions: - 2.0.0 (Status: affected) - 2.0.1 (Status: affected) - 2.1.0 (Status: affected) - 2.1.1 (Status: affected) - 2.1.2 (Status: affected) - 2.1.3 (Status: affected) - 2.2.0 (Status: affected) - 2.2.1 (Status: affected) ### References 1. [](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000080&LanguageCode=en&DocumentPartId=&Action=Launch&utm_campaign=&utm_content=2022.04_5763_Cybersecurity%20Advisory%20Update_May_03&utm_medium=email&utm_source=Eloqua)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9345 - **State**: PUBLISHED - **Published Date**: June 02, 2017 at 05:04 UTC - **Last Updated**: August 05, 2024 at 17:02 UTC - **Reserved Date**: June 01, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [98798](http://www.securityfocus.com/bid/98798) 2. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633) 3. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206) 4. [](https://www.wireshark.org/security/wnpa-sec-2017-26.html) 5. [1038612](http://www.securitytracker.com/id/1038612) 6. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0899 - **State**: PUBLISHED - **Published Date**: December 15, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:31 UTC - **Reserved Date**: September 22, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [winnt-dhcp-machinename-dos(18341)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18341) 2. [oval:org.mitre.oval:def:4282](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4282) 3. [oval:org.mitre.oval:def:2280](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2280) 4. [MS04-042](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43016 - **State**: PUBLISHED - **Published Date**: February 03, 2024 at 00:55 UTC - **Last Updated**: August 02, 2024 at 19:37 UTC - **Reserved Date**: September 15, 2023 at 01:11 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote user to log into the server due to a user account with an empty password. IBM X-Force ID: 266154. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-258: Security Weakness ### Affected Products **IBM - Security Verify Access Appliance** Affected versions: - 10.0.0.0 (Status: affected) **IBM - Security Verify Access Docker** Affected versions: - 10.0.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7106586) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/266154)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16215 - **State**: PUBLISHED - **Published Date**: June 07, 2018 at 02:00 UTC - **Last Updated**: September 16, 2024 at 23:56 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description sgqserve is a simple file server. sgqserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **HackerOne - sgqserve node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/419) 2. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38292 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 00:00 UTC - **Last Updated**: March 14, 2025 at 01:48 UTC - **Reserved Date**: June 13, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Extreme Networks XIQ-SE before 24.2.11, due to a missing access control check, a path traversal is possible, which may lead to privilege escalation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2024-104-xiq-se-path-traversal-privilege-escalation-cve-2024/ba-p/116362)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000218 - **State**: PUBLISHED - **Published Date**: August 20, 2018 at 20:00 UTC - **Last Updated**: September 17, 2024 at 03:53 UTC - **Reserved Date**: August 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenEMR version v5_0_1_4 contains a Cross Site Scripting (XSS) vulnerability in The 'file' parameter in line #43 of interface/fax/fax_view.php that can result in The vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.. This attack appear to be exploitable via The victim must visit on a specially crafted URL.. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openemr/openemr/issues/1781) 2. [](https://github.com/openemr/openemr/blob/1b495b0b3cd16daf1e5f085145d9e19dea479c7f/interface/fax/fax_view.php#L43)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4615 - **State**: PUBLISHED - **Published Date**: July 22, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:32 UTC - **Reserved Date**: May 11, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description libxml2 in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4614, CVE-2016-4616, and CVE-2016-4619. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2016-07-18-4](http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html) 2. [APPLE-SA-2016-07-18-3](http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html) 3. [APPLE-SA-2016-07-18-2](http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html) 4. [](https://support.apple.com/HT206901) 5. [91826](http://www.securityfocus.com/bid/91826) 6. [APPLE-SA-2016-07-18-1](http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html) 7. [APPLE-SA-2016-07-18-6](http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html) 8. [](https://support.apple.com/HT206905) 9. [1036348](http://www.securitytracker.com/id/1036348) 10. [](https://support.apple.com/HT206903) 11. [](https://support.apple.com/HT206902) 12. [](https://support.apple.com/HT206904) 13. [](https://support.apple.com/HT206899)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5657 - **State**: PUBLISHED - **Published Date**: October 30, 2020 at 03:35 UTC - **Last Updated**: August 04, 2024 at 08:39 UTC - **Reserved Date**: January 06, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. ### Affected Products **Mitsubishi Electric Corporation - MELSEC iQ-R series** Affected versions: - RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before (Status: affected) ### References 1. [](https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-012.pdf) 2. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf) 3. [](https://jvn.jp/vu/JVNVU92513419/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1378 - **State**: PUBLISHED - **Published Date**: December 17, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 03:19 UTC - **Reserved Date**: December 16, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [6328](http://www.securityfocus.com/bid/6328) 2. [N-043](http://www.ciac.org/ciac/bulletins/n-043.shtml) 3. [RHSA-2003:040](http://www.redhat.com/support/errata/RHSA-2003-040.html) 4. [200212-12](http://www.securityfocus.com/advisories/4827) 5. [TLSA-2003-5](http://www.turbolinux.com/security/TLSA-2003-5.txt) 6. [openldap-multiple-bo(10800)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10800) 7. [SuSE-SA:2002:047](http://www.novell.com/linux/security/advisories/2002_047_openldap2.html) 8. [MDKSA-2003:006](http://www.mandriva.com/security/advisories?name=MDKSA-2003:006) 9. [CLA-2002:556](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000556) 10. [DSA-227](http://www.debian.org/security/2003/dsa-227) 11. [](http://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24671 - **State**: PUBLISHED - **Published Date**: June 10, 2021 at 15:17 UTC - **Last Updated**: August 04, 2024 at 15:19 UTC - **Reserved Date**: August 26, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Trace Financial CRESTBridge <6.3.0.02 contains an authenticated SQL injection vulnerability, which was fixed in 6.3.0.03. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.accenture.com) 2. [](https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11407 - **State**: PUBLISHED - **Published Date**: June 13, 2018 at 16:00 UTC - **Last Updated**: August 05, 2024 at 08:10 UTC - **Reserved Date**: May 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Ldap component in Symfony 2.8.x before 2.8.37, 3.3.x before 3.3.17, 3.4.x before 3.4.7, and 4.0.x before 4.0.7. It allows remote attackers to bypass authentication by logging in with a "null" password and valid username, which triggers an unauthenticated bind. NOTE: this issue exists because of an incomplete fix for CVE-2016-2403. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://symfony.com/blog/cve-2018-11407-unauthorized-access-on-a-misconfigured-ldap-server-when-using-an-empty-password)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2192, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2192 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2192 - **State**: PUBLISHED - **Published Date**: June 03, 2020 at 12:40 UTC - **Last Updated**: August 04, 2024 at 07:01 UTC - **Reserved Date**: December 05, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A cross-site request forgery vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier allows attackers to add or remove agent labels. ### Affected Products **Jenkins project - Jenkins Self-Organizing Swarm Plug-in Modules Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1200) 2. [[oss-security] 20200603 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/06/03/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4892 - **State**: REJECTED - **Published Date**: December 30, 2019 at 16:19 UTC - **Last Updated**: December 30, 2019 at 16:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9310 - **State**: PUBLISHED - **Published Date**: June 07, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 13:40 UTC - **Reserved Date**: December 07, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the WordPress Backup to Dropbox plugin before 4.1 for WordPress. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75082](http://www.securityfocus.com/bid/75082) 2. [](https://security.szurek.pl/wordpress-backup-to-dropbox-40-reflected-xss.html) 3. [](https://wordpress.org/plugins/wordpress-backup-to-dropbox/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37167 - **State**: PUBLISHED - **Published Date**: June 25, 2024 at 19:28 UTC - **Last Updated**: August 02, 2024 at 03:50 UTC - **Reserved Date**: June 03, 2024 at 17:29 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Enalean - tuleap** Affected versions: - < 15.9.99.97 (Status: affected) ### References 1. [https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj](https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj) 2. [https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e](https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e) 3. [https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e](https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e) 4. [https://tuleap.net/plugins/tracker/?aid=38297](https://tuleap.net/plugins/tracker/?aid=38297)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6628 - **State**: PUBLISHED - **Published Date**: December 11, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 01:36 UTC - **Reserved Date**: August 06, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92492](http://www.securityfocus.com/bid/92492) 2. [](https://www.phpmyadmin.net/security/PMASA-2016-51) 3. [GLSA-201701-32](https://security.gentoo.org/glsa/201701-32) 4. [[debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2676 - **State**: PUBLISHED - **Published Date**: June 12, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 09:14 UTC - **Reserved Date**: June 11, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the iJoomla News Portal (com_news_portal) component 1.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [newsportal-index-sql-injection(42936)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42936) 2. [5761](https://www.exploit-db.com/exploits/5761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3748 - **State**: PUBLISHED - **Published Date**: June 29, 2017 at 15:00 UTC - **Last Updated**: September 16, 2024 at 18:55 UTC - **Reserved Date**: December 16, 2016 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description On Lenovo VIBE mobile phones, improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as 'rooting' or "jail breaking" a device). ### Affected Products **Lenovo Group Ltd. - Lenovo Vibe and Lenovo China-only Moto Mobile Phones** Affected versions: - Earlier than 6.0 (Status: affected) ### References 1. [99295](http://www.securityfocus.com/bid/99295) 2. [](https://support.lenovo.com/us/en/product_security/LEN-15823)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5780 - **State**: PUBLISHED - **Published Date**: February 19, 2019 at 17:00 UTC - **Last Updated**: August 04, 2024 at 20:01 UTC - **Reserved Date**: January 09, 2019 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [106767](http://www.securityfocus.com/bid/106767) 2. [](https://crbug.com/891697) 3. [RHSA-2019:0309](https://access.redhat.com/errata/RHSA-2019:0309) 4. [DSA-4395](https://www.debian.org/security/2019/dsa-4395) 5. [](https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html) 6. [FEDORA-2019-561eae4626](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/) 7. [FEDORA-2019-05a780936d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21122 - **State**: PUBLISHED - **Published Date**: February 09, 2021 at 13:55 UTC - **Last Updated**: August 03, 2024 at 18:01 UTC - **Reserved Date**: December 21, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html) 2. [](https://crbug.com/1162131) 3. [](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-21122)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54449 - **State**: PUBLISHED - **Published Date**: March 14, 2025 at 18:04 UTC - **Last Updated**: March 18, 2025 at 16:27 UTC - **Reserved Date**: December 02, 2024 at 14:24 UTC - **Assigned By**: BlackDuck ### Vulnerability Description The API used to interact with documents in the application contains two endpoints with a flaw that allows an authenticated attacker to write a file with controlled contents to an arbitrary location on the underlying file system. This can be used to facilitate RCE. An account with ‘read’ and ‘write’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC. ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **LogicalDOC - LogicalDOC Community** Affected versions: - 0 (Status: affected) **LogicalDOC - LogicalDOC Enterprise** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html) ### Credits - Matthew Hogg
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29179, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29179 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29179 - **State**: PUBLISHED - **Published Date**: March 25, 2024 at 20:27 UTC - **Last Updated**: April 10, 2025 at 18:29 UTC - **Reserved Date**: March 18, 2024 at 17:07 UTC - **Assigned By**: GitHub_M ### Vulnerability Description phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **thorsten - phpMyFAQ** Affected versions: - 3.2.5 (Status: affected) ### References 1. [https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9](https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33645, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33645 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33645 - **State**: PUBLISHED - **Published Date**: October 11, 2022 at 00:00 UTC - **Last Updated**: January 02, 2025 at 21:27 UTC - **Reserved Date**: June 14, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows TCP/IP Driver Denial of Service Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows TCP/IP Driver Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30609 - **State**: PUBLISHED - **Published Date**: March 24, 2025 at 13:47 UTC - **Last Updated**: March 24, 2025 at 22:00 UTC - **Reserved Date**: March 24, 2025 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Insertion of Sensitive Information Into Sent Data vulnerability in AppExperts AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps allows Retrieve Embedded Sensitive Data. This issue affects AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps: from n/a through 1.4.3. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-201: Improper Input Validation ### Affected Products **AppExperts - AppExperts – WordPress to Mobile App – WooCommerce to iOs and Android Apps** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/appexperts/vulnerability/wordpress-appexperts-wordpress-to-mobile-app-woocommerce-to-ios-and-android-apps-1-4-3-sensitive-data-exposure-vulnerability?_s_id=cve) ### Credits - Phan Trong Quan - VNPT Cyber Immunity (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6978 - **State**: PUBLISHED - **Published Date**: March 24, 2020 at 20:09 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 14, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the usage of old jQuery libraries. ### Weakness Classification (CWE) - CWE-477: Security Weakness ### Affected Products **n/a - Honeywell WIN-PAK 4.7.2, Web and prior versions** Affected versions: - Honeywell WIN-PAK 4.7.2, Web and prior versions (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-20-056-05)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13502 - **State**: REJECTED - **Published Date**: September 24, 2020 at 14:10 UTC - **Last Updated**: September 29, 2020 at 20:25 UTC - **Reserved Date**: May 26, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3964 - **State**: PUBLISHED - **Published Date**: September 10, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 09, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517) 2. [[oss-security] 20080909 CVE request (libpng)](http://www.openwall.com/lists/oss-security/2008/09/09/3) 3. [35386](http://secunia.com/advisories/35386) 4. [1020521](http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1) 5. [libpng-pngpushreadztxt-dos(44928)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44928) 6. [ADV-2009-1560](http://www.vupen.com/english/advisories/2009/1560) 7. [ADV-2009-1462](http://www.vupen.com/english/advisories/2009/1462) 8. [31049](http://www.securityfocus.com/bid/31049) 9. [259989](http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1) 10. [35302](http://secunia.com/advisories/35302) 11. [[oss-security] 20080909 Re: CVE request (libpng)](http://www.openwall.com/lists/oss-security/2008/09/09/8) 12. [VU#889484](http://www.kb.cert.org/vuls/id/889484) 13. [ADV-2008-2512](http://www.vupen.com/english/advisories/2008/2512) 14. [GLSA-200812-15](http://security.gentoo.org/glsa/glsa-200812-15.xml) 15. [31781](http://secunia.com/advisories/31781) 16. [33137](http://secunia.com/advisories/33137) 17. [[png-mng-implement] 20080918 libpng-1.0.40 and libpng-1.2.32 available](http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implement) 18. [](http://sourceforge.net/project/shownotes.php?release_id=624518) 19. [](http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm) 20. [MDVSA-2009:051](http://www.mandriva.com/security/advisories?name=MDVSA-2009:051) 21. [](http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3818 - **State**: PUBLISHED - **Published Date**: September 27, 2021 at 12:25 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: September 20, 2021 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking ### Weakness Classification (CWE) - CWE-565: Security Weakness ### Affected Products **getgrav - getgrav/grav** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea) 2. [](https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4026 - **State**: PUBLISHED - **Published Date**: July 26, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 14:37 UTC - **Reserved Date**: July 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description epesi framework before 0.8.6 does not properly verify file extensions, which allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors involving the gallery images upload feature. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38600](http://osvdb.org/38600) 2. [](http://sourceforge.net/project/shownotes.php?release_id=527102) 3. [epesi-upload-file-upload(35596)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35596) 4. [26175](http://secunia.com/advisories/26175)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0509 - **State**: PUBLISHED - **Published Date**: February 04, 2025 at 20:01 UTC - **Last Updated**: February 17, 2025 at 12:03 UTC - **Reserved Date**: January 15, 2025 at 21:25 UTC - **Assigned By**: fedora ### Vulnerability Description A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **sparkle-project - Sparkle** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/sparkle-project/Sparkle/pull/2550) 2. [](https://sparkle-project.org/documentation/security-and-reliability/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5118 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through "file:" URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections. This vulnerability affects Firefox < 58. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [1040270](http://www.securitytracker.com/id/1040270) 2. [USN-3544-1](https://usn.ubuntu.com/3544-1/) 3. [102786](http://www.securityfocus.com/bid/102786) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1420049) 5. [](https://www.mozilla.org/security/advisories/mfsa2018-02/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1146 - **State**: PUBLISHED - **Published Date**: March 10, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 17:03 UTC - **Reserved Date**: March 10, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the Cmd_Say_f function in g_cmds.c in Alien Arena 2006 Gold Edition 5.00 allows remote attackers (possibly authenticated) to execute arbitrary code by sending a long message to the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060307 Multiple vulnerabilities in Alien Arena 2006 GE 5.00](http://www.securityfocus.com/archive/1/426984/100/0/threaded) 2. [alien-cmd-sa-f-bo(25200)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25200) 3. [](http://aluigi.altervista.org/adv/aa2k6x-adv.txt) 4. [ADV-2006-0882](http://www.vupen.com/english/advisories/2006/0882) 5. [23748](http://www.osvdb.org/23748) 6. [19144](http://secunia.com/advisories/19144) 7. [20060307 Multiple vulnerabilities in Alien Arena 2006 GE 5.00](http://archives.neohapsis.com/archives/fulldisclosure/2006-03/0147.html) 8. [17028](http://www.securityfocus.com/bid/17028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5469 - **State**: PUBLISHED - **Published Date**: June 14, 2024 at 04:04 UTC - **Last Updated**: January 09, 2025 at 21:40 UTC - **Reserved Date**: May 29, 2024 at 12:30 UTC - **Assigned By**: GitLab ### Vulnerability Description DoS in KAS in GitLab CE/EE affecting all versions from 16.10.0 prior to 16.10.6 and 16.11.0 prior to 16.11.3 allows an attacker to crash KAS via crafted gRPC requests. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **GitLab - GitLab** Affected versions: - 16.10.0 (Status: affected) - 16.11.0 (Status: affected) ### References 1. [GitLab Issue #464143](https://gitlab.com/gitlab-org/gitlab/-/issues/464143) ### Credits - This vulnerability has been discovered internally by the Environments team.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32634, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32634 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32634 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 15:47 UTC - **Last Updated**: April 17, 2025 at 18:33 UTC - **Reserved Date**: April 09, 2025 at 11:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mdedev Run Contests, Raffles, and Giveaways with ContestsWP allows Reflected XSS. This issue affects Run Contests, Raffles, and Giveaways with ContestsWP: from n/a through 2.0.6. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **mdedev - Run Contests, Raffles, and Giveaways with ContestsWP** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/contest-code-checker/vulnerability/wordpress-run-contests-raffles-and-giveaways-plugin-2-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34180 - **State**: PUBLISHED - **Published Date**: June 22, 2022 at 14:41 UTC - **Last Updated**: August 03, 2024 at 08:16 UTC - **Reserved Date**: June 21, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build. ### Affected Products **Jenkins project - Jenkins Embeddable Build Status Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2794)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1959 - **State**: PUBLISHED - **Published Date**: April 25, 2008 at 14:00 UTC - **Last Updated**: August 07, 2024 at 08:41 UTC - **Reserved Date**: April 25, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the get_remote_video_port_media function in call.cpp in SIPp 3.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SIP message. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2008-3508](https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00001.html) 2. [sipp-getremotevideoportmedia-bo(41945)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41945) 3. [28884](http://www.securityfocus.com/bid/28884) 4. [30193](http://secunia.com/advisories/30193) 5. [29890](http://secunia.com/advisories/29890) 6. [ADV-2008-1322](http://www.vupen.com/english/advisories/2008/1322/references) 7. [](http://sourceforge.net/project/shownotes.php?release_id=593806&group_id=104305)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4945, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4945 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4945 - **State**: PUBLISHED - **Published Date**: June 24, 2021 at 18:45 UTC - **Last Updated**: September 16, 2024 at 16:42 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user to overwrite arbirary files due to improper group permissions. IBM X-Force ID: 191945. ### Affected Products **IBM - DB2 for Linux and UNIX** Affected versions: - 11.5 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6466367) 2. [ibm-db2-cve20204945-file-overwrite (191945)](https://exchange.xforce.ibmcloud.com/vulnerabilities/191945) 3. [](https://security.netapp.com/advisory/ntap-20210720-0006/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4839 - **State**: PUBLISHED - **Published Date**: May 05, 2010 at 18:00 UTC - **Last Updated**: September 17, 2024 at 03:07 UTC - **Reserved Date**: May 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Basic Analysis and Security Engine (BASE), possibly 1.4.4 and earlier, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) admin/base_roleadmin.php, (2) admin/base_useradmin.php, (3) base_conf_contents.php, (4) base_qry_sqlcalls.php, and (5) base_ag_main.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://secureideas.cvs.sourceforge.net/viewvc/secureideas/base-php4/admin/base_roleadmin.php?view=log) 2. [](http://secureideas.cvs.sourceforge.net/viewvc/secureideas/base-php4/admin/base_useradmin.php?view=log) 3. [](http://secureideas.cvs.sourceforge.net/viewvc/secureideas/base-php4/base_conf_contents.php?view=log) 4. [](http://secureideas.cvs.sourceforge.net/viewvc/secureideas/base-php4/base_qry_sqlcalls.php?view=log) 5. [](http://secureideas.cvs.sourceforge.net/viewvc/secureideas/base-php4/base_ag_main.php?view=log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28108 - **State**: PUBLISHED - **Published Date**: March 16, 2023 at 16:34 UTC - **Last Updated**: February 25, 2025 at 14:55 UTC - **Reserved Date**: March 10, 2023 at 18:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Pimcore is an open source data and experience management platform. Prior to version 10.5.19, quoting is not done properly in UUID DAO model. There is the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the DAO class. Users should update to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually. ### CVSS Metrics - **CVSS Base Score**: 7.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **pimcore - pimcore** Affected versions: - < 10.5.19 (Status: affected) ### References 1. [https://github.com/pimcore/pimcore/security/advisories/GHSA-xc9p-r5qj-8xm9](https://github.com/pimcore/pimcore/security/advisories/GHSA-xc9p-r5qj-8xm9) 2. [https://github.com/pimcore/pimcore/pull/14633](https://github.com/pimcore/pimcore/pull/14633) 3. [https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch](https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1825 - **State**: PUBLISHED - **Published Date**: September 08, 2021 at 14:55 UTC - **Last Updated**: August 03, 2024 at 16:25 UTC - **Reserved Date**: December 08, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - iTunes for Windows** Affected versions: - unspecified (Status: affected) **Apple - iCloud for Windows** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212317) 2. [](https://support.apple.com/en-us/HT212323) 3. [](https://support.apple.com/en-us/HT212324) 4. [](https://support.apple.com/en-us/HT212325) 5. [](https://support.apple.com/en-us/HT212318) 6. [](https://support.apple.com/en-us/HT212319) 7. [](https://support.apple.com/en-us/HT212321)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6416 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 16, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7125 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:11 UTC - **Last Updated**: August 05, 2024 at 06:17 UTC - **Reserved Date**: February 15, 2018 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7454 - **State**: PUBLISHED - **Published Date**: August 04, 2024 at 09:00 UTC - **Last Updated**: August 07, 2024 at 18:24 UTC - **Reserved Date**: August 03, 2024 at 17:17 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in SourceCodester Clinics Patient Management System 1.0. Affected by this issue is the function patient_name of the file patients.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273548. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Clinics Patient Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-273548 | SourceCodester Clinics Patient Management System patients.php patient_name sql injection](https://vuldb.com/?id.273548) 2. [VDB-273548 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.273548) 3. [Submit #385005 | sourcecodester Clinic's Patient Management System v1.0 SQL injection](https://vuldb.com/?submit.385005) 4. [](https://github.com/lche511/cve/blob/main/sql.md) ### Credits - pengguogood (VulDB User) - pengguogood (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3576 - **State**: PUBLISHED - **Published Date**: June 14, 2013 at 18:00 UTC - **Last Updated**: August 06, 2024 at 16:14 UTC - **Reserved Date**: May 21, 2013 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description ginkgosnmp.inc in HP System Management Homepage (SMH) allows remote authenticated users to execute arbitrary commands via shell metacharacters in the PATH_INFO to smhutil/snmpchp.php.en. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBMU02917](http://marc.info/?l=bugtraq&m=137952496405683&w=2) 2. [VU#735364](http://www.kb.cert.org/vuls/id/735364)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2045, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2045 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2045 - **State**: PUBLISHED - **Published Date**: May 08, 2019 at 16:24 UTC - **Last Updated**: August 04, 2024 at 18:35 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In JSCallTyper of typer.cc, there is an out of bounds write due to an incorrect bounds check. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.1 Android-9 Android ID: A-117554758 ### Affected Products **n/a - Android** Affected versions: - Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.1 Android-9 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-05-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6683, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6683 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6683 - **State**: PUBLISHED - **Published Date**: December 21, 2006 at 19:00 UTC - **Last Updated**: September 16, 2024 at 23:30 UTC - **Reserved Date**: December 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21102](http://www.securityfocus.com/bid/21102) 2. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56474 - **State**: PUBLISHED - **Published Date**: April 02, 2025 at 15:31 UTC - **Last Updated**: April 02, 2025 at 16:28 UTC - **Reserved Date**: December 26, 2024 at 12:51 UTC - **Assigned By**: ibm ### Vulnerability Description IBM TXSeries for Multiplatforms 9.1 and 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **IBM - TXSeries for Multiplatforms** Affected versions: - 9.1, 11.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7229880)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14354 - **State**: PUBLISHED - **Published Date**: August 10, 2019 at 15:07 UTC - **Last Updated**: August 05, 2024 at 00:12 UTC - **Reserved Date**: July 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description On Ledger Nano S and Nano X devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ledger-donjon.github.io/oled-vuln/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31678, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31678 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31678 - **State**: PUBLISHED - **Published Date**: October 28, 2022 at 00:00 UTC - **Last Updated**: May 08, 2025 at 16:02 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure. ### Affected Products **n/a - VMware Cloud Foundation (NSX-V)** Affected versions: - 3.11 (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36447 - **State**: PUBLISHED - **Published Date**: July 29, 2022 at 20:32 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted tokens minted on the Chia blockchain using the CAT1 standard can be inflated to an arbitrary extent by any holder of any amount of the token. The total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chia blockchain regardless of issuance rules. This attack is auditable on chain, so maliciously altered coins can potentially be marked by off-chain observers as malicious. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://chia.net) 2. [](https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15917 - **State**: PUBLISHED - **Published Date**: September 05, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Persistent cross-site scripting (XSS) issues in Jorani 0.6.5 allow remote attackers to inject arbitrary web script or HTML via the language parameter to session/language. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45338](https://www.exploit-db.com/exploits/45338/) 2. [](https://github.com/bbalet/jorani/issues/254) 3. [](https://hackpuntes.com/cve-2018-15917-jorani-leave-management-system-0-6-5-cross-site-scripting-persistente/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5193 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 10:31 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 22, 2024 at 05:12 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Ritlabs TinyWeb Server 1.94. It has been classified as problematic. Affected is an unknown function of the component Request Handler. The manipulation with the input %0D%0A leads to crlf injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265830 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-93: Security Weakness ### Affected Products **Ritlabs - TinyWeb Server** Affected versions: - 1.94 (Status: affected) ### References 1. [VDB-265830 | Ritlabs TinyWeb Server Request crlf injection](https://vuldb.com/?id.265830) 2. [VDB-265830 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.265830) 3. [Submit #333059 | Ritlabs TinyWeb Server 1.94 CRLF Injection](https://vuldb.com/?submit.333059) 4. [](https://github.com/DMCERTCE/CRLF_Tiny) ### Credits - Senatorhotchkiss (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24320, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24320 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24320 - **State**: PUBLISHED - **Published Date**: June 01, 2021 at 11:33 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **BoldThemes - Bello - Directory & Listing** Affected versions: - 1.6.0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb) 2. [](https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt) ### Credits - m0ze
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0582 - **State**: PUBLISHED - **Published Date**: January 08, 2019 at 21:00 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0583, CVE-2019-0584. ### Affected Products **Microsoft - Windows 7** Affected versions: - 32-bit Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows RT 8.1** Affected versions: - Windows RT 8.1 (Status: affected) **Microsoft - Windows Server 2008** Affected versions: - 32-bit Systems Service Pack 2 (Status: affected) - 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected) - Itanium-Based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Status: affected) - x64-based Systems Service Pack 2 (Server Core installation) (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 32-bit systems (Status: affected) - x64-based systems (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - (Server Core installation) (Status: affected) **Microsoft - Windows Server 2008 R2** Affected versions: - Itanium-Based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Status: affected) - x64-based Systems Service Pack 1 (Server Core installation) (Status: affected) **Microsoft - Windows 10** Affected versions: - 32-bit Systems (Status: affected) - Version 1607 for 32-bit Systems (Status: affected) - Version 1607 for x64-based Systems (Status: affected) - Version 1703 for 32-bit Systems (Status: affected) - Version 1703 for x64-based Systems (Status: affected) - Version 1709 for 32-bit Systems (Status: affected) - Version 1709 for ARM64-based Systems (Status: affected) - Version 1709 for x64-based Systems (Status: affected) - Version 1803 for 32-bit Systems (Status: affected) - Version 1803 for ARM64-based Systems (Status: affected) - Version 1803 for x64-based Systems (Status: affected) - Version 1809 for 32-bit Systems (Status: affected) - Version 1809 for ARM64-based Systems (Status: affected) - Version 1809 for x64-based Systems (Status: affected) - x64-based Systems (Status: affected) **Microsoft - Windows 10 Servers** Affected versions: - version 1709 (Server Core Installation) (Status: affected) - version 1803 (Server Core Installation) (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0582) 2. [106433](http://www.securityfocus.com/bid/106433)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4344 - **State**: PUBLISHED - **Published Date**: August 24, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 24, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CRLF injection vulnerability in CGI-Rescue Mail F/W System (formd) before 8.3 allows remote attackers to spoof e-mails and inject e-mail headers via unspecified vectors in (1) mail.cgi and (2) query.cgi. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19676](http://www.securityfocus.com/bid/19676) 2. [28131](http://www.osvdb.org/28131) 3. [21543](http://secunia.com/advisories/21543) 4. [JVN#11048526](http://jvn.jp/jp/JVN%2311048526/index.html) 5. [](http://www.rescue.ne.jp/whatsnew/blog.cgi/permalink/20060822210549) 6. [ADV-2006-3359](http://www.vupen.com/english/advisories/2006/3359)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4749 - **State**: PUBLISHED - **Published Date**: July 01, 2013 at 23:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: July 01, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the UserTask Center, Messaging (sys_messages) extension 1.1.0 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [typo3-usertaskcenter-unspecified-xss(81584)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81584) 2. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52607 - **State**: PUBLISHED - **Published Date**: March 06, 2024 at 06:45 UTC - **Last Updated**: May 21, 2025 at 08:49 UTC - **Reserved Date**: March 02, 2024 at 21:55 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity. ### Affected Products **Linux - Linux** Affected versions: - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) - a0668cdc154e54bf0c85182e0535eea237d53146 (Status: affected) **Linux - Linux** Affected versions: - 2.6.33 (Status: affected) - 0 (Status: unaffected) - 4.19.307 (Status: unaffected) - 5.4.269 (Status: unaffected) - 5.10.210 (Status: unaffected) - 5.15.149 (Status: unaffected) - 6.1.77 (Status: unaffected) - 6.6.16 (Status: unaffected) - 6.7.4 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611) 2. [](https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e) 3. [](https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b) 4. [](https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7) 5. [](https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1) 6. [](https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532) 7. [](https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74) 8. [](https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1224, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1224 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1224 - **State**: PUBLISHED - **Published Date**: March 02, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 02, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Grok Developments NetProxy 4.03 allows remote attackers to bypass URL filtering via a request that omits "http://" from the URL and specifies the destination port (:80). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [3381](https://www.exploit-db.com/exploits/3381) 2. [36001](http://osvdb.org/36001) 3. [netproxy-url-filtering-bypass(32697)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32697) 4. [ADV-2007-0779](http://www.vupen.com/english/advisories/2007/0779) 5. [22741](http://www.securityfocus.com/bid/22741)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16693, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16693 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16693 - **State**: PUBLISHED - **Published Date**: September 22, 2019 at 14:58 UTC - **Last Updated**: April 16, 2025 at 14:38 UTC - **Reserved Date**: September 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/phpipam/phpipam/issues/2738) 2. [](https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2019-16693.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1629 - **State**: PUBLISHED - **Published Date**: September 20, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 19:01 UTC - **Reserved Date**: March 12, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Taxotouch module for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51387](http://www.securityfocus.com/bid/51387) 2. [taxinomynavigator-unspecified-xss(72387)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72387) 3. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1) 4. [](http://drupal.org/node/1401644)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16700 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:50 UTC - **Last Updated**: December 20, 2021 at 22:50 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6379 - **State**: PUBLISHED - **Published Date**: December 10, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 07, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the BrightStor Backup Discovery Service in multiple CA products, including ARCserve Backup r11.5 SP1 and earlier, ARCserve Backup 9.01 up to 11.1, Enterprise Backup 10.5, and CA Server Protection Suite r2, allows remote attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-4910](http://www.vupen.com/english/advisories/2006/4910) 2. [20061208 [CAID 34846]: CA BrightStor ARCserve Backup Discovery Service Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/453916/100/0/threaded) 3. [brightstor-arcserv-discovery-bo(30791)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30791) 4. [1017356](http://securitytracker.com/id?1017356) 5. [2010](http://securityreason.com/securityalert/2010) 6. [30775](http://www.osvdb.org/30775) 7. [21502](http://www.securityfocus.com/bid/21502) 8. [](http://supportconnectw.ca.com/public/storage/infodocs/babsecurity-notice.asp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2656 - **State**: PUBLISHED - **Published Date**: April 06, 2024 at 03:24 UTC - **Last Updated**: August 01, 2024 at 19:18 UTC - **Reserved Date**: March 19, 2024 at 15:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a CSV import in all versions up to, and including, 5.7.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **icegram - Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/159ddb06-e7c4-4279-a8a1-c78a02e15891?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3063438/email-subscribers/trunk/lite/includes/classes/class-es-import-subscribers.php) ### Credits - Peter Potrowl
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6774 - **State**: PUBLISHED - **Published Date**: March 30, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 17:46 UTC - **Reserved Date**: November 10, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131113 Superuser unsanitized environment vulnerability on Android <= 4.2.x](http://www.securityfocus.com/archive/1/529796) 2. [20131114 Re: Superuser unsanitized environment vulnerability on Android <= 4.2.x](http://www.securityfocus.com/archive/1/529822)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7247 - **State**: PUBLISHED - **Published Date**: May 18, 2020 at 15:52 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in AODDriver2.sys in AMD OverDrive. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x81112ee0 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0014/FEYE-2019-0014.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3219 - **State**: PUBLISHED - **Published Date**: June 14, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 14, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in sources/action_public/xmlout.php in Invision Power Board (IPB or IP.Board) 2.2.0 through 2.2.2 allows remote attackers to modify another user's profile data, such as an AIM screen name or Yahoo! identity. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ipb-xmlout-data-manipulation(34841)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34841) 2. [24442](http://www.securityfocus.com/bid/24442) 3. [25637](http://secunia.com/advisories/25637) 4. [35436](http://www.osvdb.org/35436) 5. [ADV-2007-2160](http://www.vupen.com/english/advisories/2007/2160) 6. [](http://forums.invisionpower.com/index.php?showtopic=235316)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44921, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44921 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44921 - **State**: PUBLISHED - **Published Date**: December 21, 2021 at 20:19 UTC - **Last Updated**: August 04, 2024 at 04:32 UTC - **Reserved Date**: December 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/1964)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3614 - **State**: PUBLISHED - **Published Date**: September 13, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html) 2. [](http://support.apple.com/kb/HT5485) 3. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 4. [](http://support.apple.com/kb/HT5503) 5. [85408](http://osvdb.org/85408) 6. [](http://support.apple.com/kb/HT5502) 7. [55534](http://www.securityfocus.com/bid/55534) 8. [apple-itunes-webkit-cve20123614(78513)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78513) 9. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 10. [oval:org.mitre.oval:def:16983](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16983)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2327 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31382 - **State**: PUBLISHED - **Published Date**: June 16, 2022 at 16:46 UTC - **Last Updated**: August 03, 2024 at 07:19 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory Management System v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter in search-dirctory.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://phpgurukul.com) 2. [](http://directory.com) 3. [](https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0990 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: August 27, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [simple-webserver-url-dos(10364)](http://www.iss.net/security_center/static/10364.php) 2. [20021014 Multiple Symantec Firewall Secure Webserver timeout DoS](http://marc.info/?l=bugtraq&m=103463869503124&w=2) 3. [](http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html) 4. [5958](http://www.securityfocus.com/bid/5958)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11156 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 16:54 UTC - **Last Updated**: August 04, 2024 at 22:48 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access. ### Affected Products **n/a - Intel(R) PROSet/Wireless WiFi Software Security** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3481 - **State**: PUBLISHED - **Published Date**: July 10, 2006 at 20:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 10, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Joomla! before 1.0.10 allow remote attackers to execute arbitrary SQL commands via unspecified parameters involving the (1) "Remember Me" function, (2) "Related Items" module, and the (3) "Weblinks submission". ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26910](http://www.osvdb.org/26910) 2. [ADV-2006-2608](http://www.vupen.com/english/advisories/2006/2608) 3. [26912](http://www.osvdb.org/26912) 4. [18742](http://www.securityfocus.com/bid/18742) 5. [joomla-rememberme-relateditems-sql-injection(27520)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27520) 6. [26911](http://www.osvdb.org/26911) 7. [](http://www.joomla.org/content/view/1510/74/) 8. [20874](http://secunia.com/advisories/20874) 9. [](http://www.joomla.org/content/view/1511/78/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53676 - **State**: PUBLISHED - **Published Date**: November 27, 2024 at 00:18 UTC - **Last Updated**: March 05, 2025 at 14:58 UTC - **Reserved Date**: November 21, 2024 at 16:51 UTC - **Assigned By**: hpe ### Vulnerability Description A directory traversal vulnerability in Hewlett Packard Enterprise Insight Remote Support may allow remote code execution. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **Hewlett Packard Enterprise (HPE) - HPE Insight Remote Support** Affected versions: - 0 (Status: affected) ### References 1. [](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04731en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5449 - **State**: PUBLISHED - **Published Date**: January 14, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 11, 2008 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5444 and CVE-2008-5448. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33525](http://secunia.com/advisories/33525) 2. [ADV-2009-0115](http://www.vupen.com/english/advisories/2009/0115) 3. [](http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html) 4. [33177](http://www.securityfocus.com/bid/33177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0455 - **State**: PUBLISHED - **Published Date**: December 14, 2020 at 21:53 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-170372514 ### Affected Products **n/a - Android** Affected versions: - Android SoC (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4577 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38303, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38303 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38303 - **State**: PUBLISHED - **Published Date**: September 28, 2021 at 18:52 UTC - **Last Updated**: August 04, 2024 at 01:37 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL injection vulnerability exists in Sureline SUREedge Migrator 7.0.7.29360. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ederdemattos/Sureline_SUREedge_Migrator) 2. [](https://github.com/ederdemattos/Sureline_SUREedge_Migrator/blob/main/4.png)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0529, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0529 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0529 - **State**: PUBLISHED - **Published Date**: February 11, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 11, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in SnippetMaster Webpage Editor 2.2.2 allows remote attackers to inject arbitrary web script or HTML via the language parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8017](https://www.exploit-db.com/exploits/8017) 2. [33865](http://secunia.com/advisories/33865) 3. [33705](http://www.securityfocus.com/bid/33705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1417 - **State**: PUBLISHED - **Published Date**: January 23, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036936](http://www.securitytracker.com/id/1036936) 2. [](http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt) 3. [93269](http://www.securityfocus.com/bid/93269) 4. [](http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html) 5. [20161012 Snort v2.9.7.0-WIN32 DLL Hijack](http://www.securityfocus.com/archive/1/539579/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2906 - **State**: PUBLISHED - **Published Date**: May 21, 2012 at 18:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 21, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in artpublic/recommandation/index.php in Artiphp CMS 5.5.0 Neo (r422) allow remote attackers to inject arbitrary web script or HTML via the (1) add_img_name_post, (2) asciiart_post, (3) expediteur, (4) titre_sav, or (5) z39d27af885b32758ac0e7d4014a61561 parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php) 2. [artiphp-index-xss(75689)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75689) 3. [](http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html) 4. [53586](http://www.securityfocus.com/bid/53586) 5. [49195](http://secunia.com/advisories/49195) 6. [81990](http://www.osvdb.org/81990)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30358 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 20:17 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 18:52 UTC - **Assigned By**: zdi ### Vulnerability Description Foxit PDF Reader AcroForm User-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22821. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - PDF Reader** Affected versions: - 2023.3.0.23028 (Status: affected) ### References 1. [ZDI-24-330](https://www.zerodayinitiative.com/advisories/ZDI-24-330/) 2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45633 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:32 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064511/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0514)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51928, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51928 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51928 - **State**: PUBLISHED - **Published Date**: January 20, 2024 at 00:00 UTC - **Last Updated**: September 12, 2024 at 18:39 UTC - **Reserved Date**: December 26, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in the nccloud.web.arcp.taskmonitor.action.ArcpUploadAction.doAction() method of YonBIP v3_23.05 allows attackers to execute arbitrary code via uploading a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yonyou.com/) 2. [](http://yonbip.com) 3. [](https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about/51928.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3944 - **State**: PUBLISHED - **Published Date**: August 29, 2024 at 05:30 UTC - **Last Updated**: August 29, 2024 at 14:04 UTC - **Reserved Date**: April 18, 2024 at 00:27 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP To Do plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Comment in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **delower186 - WP To Do** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b36b9b8a-41b0-4b57-92c7-5acebe2b0bae?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225) ### Credits - Benedictus Jovan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33314 - **State**: PUBLISHED - **Published Date**: May 28, 2023 at 17:29 UTC - **Last Updated**: November 08, 2024 at 18:30 UTC - **Reserved Date**: May 22, 2023 at 08:34 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in realmag777 BEAR plugin <= 1.1.3.1 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **realmag777 - BEAR** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woo-bulk-editor/wordpress-bear-plugin-1-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)