System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1066 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 23:39 UTC - **Last Updated**: March 20, 2025 at 13:24 UTC - **Reserved Date**: February 05, 2025 at 18:14 UTC - **Assigned By**: certcc ### Vulnerability Description OpenPLC_V3 contains an arbitrary file upload vulnerability, which could be leveraged for malvertising or phishing campaigns. ### Affected Products **openPLC - OpenPLC** Affected versions: - V3 (Status: affected) ### References 1. [](https://github.com/thiagoralves/OpenPLC_v3/commit/d1b1a3b7e97f2b3fef0876056cf9d7879991744a) 2. [](https://medium.com/@alimuhammadsecured/cyberforce-2024-how-i-found-my-first-cve-openplcv3-16c058b114b0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5549, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5549 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5549 - **State**: PUBLISHED - **Published Date**: October 18, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 15:31 UTC - **Reserved Date**: October 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Command EXEC in Cisco IOS allows local users to bypass command restrictions and obtain sensitive information via an unspecified "variation of an IOS command" involving "two different methods", aka CSCsk16129. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.irmplc.com/index.php/111-Vendor-Alerts) 2. [45363](http://osvdb.org/45363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0024 - **State**: PUBLISHED - **Published Date**: February 13, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 14:10 UTC - **Reserved Date**: November 27, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16126](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16126) 2. [MS13-009](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-009) 3. [TA13-043B](http://www.us-cert.gov/cas/techalerts/TA13-043B.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1517 - **State**: REJECTED - **Published Date**: January 24, 2020 at 21:14 UTC - **Last Updated**: January 24, 2020 at 21:14 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4106 - **State**: PUBLISHED - **Published Date**: June 26, 2024 at 05:30 UTC - **Last Updated**: August 01, 2024 at 20:33 UTC - **Reserved Date**: April 23, 2024 at 23:06 UTC - **Assigned By**: YokogawaGroup ### Vulnerability Description A vulnerability has been found in FAST/TOOLS and CI Server. The affected products have built-in accounts with no passwords set. Therefore, if the product is operated without a password set by default, an attacker can break into the affected product. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04 CI Server R1.01.00 to R1.03.00 ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-258: Security Weakness ### Affected Products **Yokogawa Electric Corporation - FAST/TOOLS** Affected versions: - R9.01 (Status: affected) **Yokogawa Electric Corporation - CI Server** Affected versions: - R1.01.00 (Status: affected) ### References 1. [](https://web-material3.yokogawa.com/1/36059/files/YSAR-24-0001-E.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0429 - **State**: PUBLISHED - **Published Date**: January 25, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 16:34 UTC - **Reserved Date**: January 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA WebLogic Server and WebLogic Express 9.0 causes new security providers to appear active even if they have not been activated by a server reboot, which could cause an administrator to perform inappropriate, security-relevant actions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-0313](http://www.vupen.com/english/advisories/2006/0313) 2. [22773](http://www.osvdb.org/22773) 3. [weblogic-security-provider-weakness(24298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24298) 4. [1015528](http://securitytracker.com/id?1015528) 5. [18592](http://secunia.com/advisories/18592) 6. [BEA06-116.00](http://dev2dev.bea.com/pub/advisory/173) 7. [16358](http://www.securityfocus.com/bid/16358)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10050 - **State**: PUBLISHED - **Published Date**: September 09, 2020 at 18:08 UTC - **Last Updated**: August 04, 2024 at 10:50 UTC - **Reserved Date**: March 04, 2020 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.10.2). The directory of service executables of the affected application could allow a local attacker to include arbitrary commands that are executed with SYSTEM privileges when the system restarts. ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **Siemens AG - SIMATIC RTLS Locating Manager** Affected versions: - All versions < V2.10.2 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-251935.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1905 - **State**: PUBLISHED - **Published Date**: June 28, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 22:51 UTC - **Reserved Date**: June 28, 2005 at 04:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the web server of Polycom ViaVideo 2.2 and 3.0 allows remote attackers to cause a denial of service (crash) via a long HTTP GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.polycom.com/common/pw_item_show_doc/0%2C1449%2C1442%2C00.pdf) 2. [20021013 Security vulnerabilities in Polycom ViaVideo Web component](http://online.securityfocus.com/archive/1/295146) 3. [viavideo-webserver-get-bo(10359)](http://www.iss.net/security_center/static/10359.php) 4. [5964](http://www.securityfocus.com/bid/5964)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000865 - **State**: PUBLISHED - **Published Date**: December 10, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 12:47 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186) 2. [RHBA-2019:0326](https://access.redhat.com/errata/RHBA-2019:0326) 3. [RHBA-2019:0327](https://access.redhat.com/errata/RHBA-2019:0327)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2019 - **State**: PUBLISHED - **Published Date**: June 02, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20130428 Multiple vulnerabilities in BOINC](http://www.openwall.com/lists/oss-security/2013/04/28/3) 2. [59565](http://www.securityfocus.com/bid/59565) 3. [boinc-cve20132019-bo(83930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83930) 4. [[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC](http://www.openwall.com/lists/oss-security/2013/04/29/11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27388 - **State**: PUBLISHED - **Published Date**: June 15, 2021 at 19:40 UTC - **Last Updated**: August 03, 2024 at 20:48 UTC - **Reserved Date**: February 18, 2021 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description SINAMICS medium voltage routable products are affected by a vulnerability in the Sm@rtServer component for remote access that could allow an unauthenticated attacker to cause a denial-of-service condition, and/or execution of limited configuration modifications and/or execution of limited control commands on the SINAMICS Medium Voltage Products, Remote Access (SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions). ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - SINAMICS Medium Voltage Products, Remote Access** Affected versions: - SINAMICS SL150: All versions, SINAMICS SM150: All versions, SINAMICS SM150i: All versions (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-131-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2414 - **State**: PUBLISHED - **Published Date**: May 16, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:51 UTC - **Reserved Date**: May 15, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-1080](http://www.debian.org/security/2006/dsa-1080) 2. [](http://www.dovecot.org/list/dovecot-news/2006-May/000006.html) 3. [ADV-2006-2013](http://www.vupen.com/english/advisories/2006/2013) 4. [20315](http://secunia.com/advisories/20315) 5. [17961](http://www.securityfocus.com/bid/17961) 6. [913](http://securityreason.com/securityalert/913) 7. [20308](http://secunia.com/advisories/20308) 8. [](http://dovecot.org/list/dovecot-cvs/2006-May/005563.html) 9. [20060512 Dovecot IMAP: Mailbox names list disclosure with mboxes](http://www.securityfocus.com/archive/1/433878/100/0/threaded) 10. [dovecot-imap-list-information-disclosure(26536)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26536)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22470, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22470 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22470 - **State**: PUBLISHED - **Published Date**: October 28, 2021 at 12:31 UTC - **Last Updated**: August 03, 2024 at 18:44 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2681, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2681 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2681 - **State**: PUBLISHED - **Published Date**: September 28, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 19:42 UTC - **Reserved Date**: May 14, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=827558) 2. [55618](http://www.securityfocus.com/bid/55618) 3. [cumin-redhat-weak-security(78771)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78771) 4. [RHSA-2012:1278](http://rhn.redhat.com/errata/RHSA-2012-1278.html) 5. [RHSA-2012:1281](http://rhn.redhat.com/errata/RHSA-2012-1281.html) 6. [50660](http://secunia.com/advisories/50660)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30317 - **State**: PUBLISHED - **Published Date**: August 31, 2022 at 15:22 UTC - **Last Updated**: August 03, 2024 at 06:48 UTC - **Reserved Date**: May 06, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.forescout.com/blog/) 2. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-07)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21057, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21057 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21057 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 21, 2025 at 19:18 UTC - **Reserved Date**: November 03, 2022 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In ProfSixDecomTcpSACKoption of RohcPacketCommon, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244450646References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2023-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-18460, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-18460 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-18460 - **State**: PUBLISHED - **Published Date**: August 12, 2021 at 18:13 UTC - **Last Updated**: August 04, 2024 at 14:00 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Request Forgery (CSRF) vulnerability exists in 711cms v1.0.7 that can add an admin account via admin.php?c=Admin&m=content. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/linchg/711cms/issues/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9938 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 17:25 UTC - **Reserved Date**: June 26, 2017 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability was discovered in Siemens SIMATIC Logon (All versions before V1.6) that could allow specially crafted packets sent to the SIMATIC Logon Remote Access service on port 16389/tcp to cause a Denial-of-Service condition. The service restarts automatically. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **n/a - SIMATIC Logon All versions before V1.6** Affected versions: - SIMATIC Logon All versions before V1.6 (Status: affected) ### References 1. [99539](http://www.securityfocus.com/bid/99539) 2. [](https://www.tenable.com/security/research/tra-2017-34) 3. [](https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-804859.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45217, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45217 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45217 - **State**: PUBLISHED - **Published Date**: December 07, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 18:40 UTC - **Reserved Date**: November 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in Book Store Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Level parameter under the Add New System User module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com/php/15748/book-store-management-system-project-using-php-codeigniter-3-free-source-code.html) 2. [](https://github.com/sudoninja-noob/CVE-2022-45217/blob/main/CVE-2022-45217)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24867 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 00:35 UTC - **Last Updated**: February 11, 2025 at 15:58 UTC - **Reserved Date**: January 27, 2025 at 08:57 UTC - **Assigned By**: sap ### Vulnerability Description SAP BusinessObjects Platform (BI Launchpad) does not sufficiently handle user input, resulting in Cross-Site Scripting (XSS) vulnerability. The application allows an unauthenticated attacker to craft a URL that embeds a malicious script within an unprotected parameter. When a victim clicks the link, the script will be executed in the browser, giving the attacker the ability to access and/or modify information related to the web client with no effect on availability. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SAP_SE - SAP BusinessObjects Platform (BI Launchpad)** Affected versions: - ENTERPRISE 430 (Status: affected) - 2025 (Status: affected) ### References 1. [](https://me.sap.com/notes/3445708) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16868, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16868 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16868 - **State**: PUBLISHED - **Published Date**: November 17, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 17, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In SWFTools 0.9.2, the wav_convert2mono function in lib/wav.c does not properly restrict a multiplication within a malloc call, which allows remote attackers to cause a denial of service (integer overflow and NULL pointer dereference) via a crafted WAV file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/matthiaskramm/swftools/issues/52)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0071, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0071 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0071 - **State**: PUBLISHED - **Published Date**: January 13, 2010 at 01:00 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: December 16, 2009 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Listener component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html) 2. [TA10-012A](http://www.us-cert.gov/cas/techalerts/TA10-012A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5111, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5111 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5111 - **State**: PUBLISHED - **Published Date**: August 23, 2012 at 20:00 UTC - **Last Updated**: August 07, 2024 at 00:23 UTC - **Reserved Date**: August 23, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Kajian Website CMS Balitbang 3.x allow remote attackers to execute arbitrary SQL commands via the hal parameter to (1) the data module in alumni.php; or the (2) lih_buku, (3) artikel, (4) album, or (5) berita module in index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50797](http://www.securityfocus.com/bid/50797) 2. [](http://packetstormsecurity.org/files/view/107254/cmsbalitbang-sql.txt) 3. [balitbang-hal-sql-injection(71466)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71466)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10014, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10014 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10014 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 20, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14855, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14855 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14855 - **State**: PUBLISHED - **Published Date**: December 30, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 19:42 UTC - **Reserved Date**: September 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Red Lion HMI panels allow remote attackers to cause a denial of service (software exception) via an HTTP POST request to a long URI that does not exist, as demonstrated by version HMI 2.41 PLC 2.42. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://misteralfa-hack.blogspot.cl/2017/12/red-lion-guru-mode-cve-2017-14855.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32889 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2441 - **State**: PUBLISHED - **Published Date**: August 03, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:29 UTC - **Reserved Date**: August 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in VBzoom allow remote attackers to inject arbitrary web script and HTML via the (1) UserName parameter to profile.php or (2) UserID parameter to login.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14423](http://www.securityfocus.com/bid/14423) 2. [20060306 SQL injection & XSS IN vbzoom v1.11](http://www.securityfocus.com/archive/1/426874/100/0/threaded) 3. [16220](http://secunia.com/advisories/16220) 4. [18662](http://www.osvdb.org/18662) 5. [vbzoom-profile-login-xss(21680)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21680) 6. [18663](http://www.osvdb.org/18663) 7. [20050729 VBZoom Cross Site Scripting Vulnerabilities](http://marc.info/?l=bugtraq&m=112300586019568&w=2) 8. [1014614](http://securitytracker.com/id?1014614)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20026 - **State**: PUBLISHED - **Published Date**: March 04, 2024 at 02:43 UTC - **Last Updated**: December 06, 2024 at 17:32 UTC - **Reserved Date**: November 02, 2023 at 13:35 UTC - **Assigned By**: MediaTek ### Vulnerability Description In da, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541632. ### Affected Products **MediaTek, Inc. - MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512** Affected versions: - Android 12.0, 13.0, 14.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/March-2024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25816, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25816 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25816 - **State**: PUBLISHED - **Published Date**: March 08, 2022 at 13:46 UTC - **Last Updated**: August 03, 2024 at 04:49 UTC - **Reserved Date**: February 23, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Improper authentication in Samsung Lock and mask apps setting prior to SMR Mar-2022 Release 1 allows attacker to change enable/disable without authentication ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - Q(10), R(11), S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40544, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40544 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40544 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 21:27 UTC - **Last Updated**: August 02, 2024 at 18:38 UTC - **Reserved Date**: October 12, 2023 at 20:21 UTC - **Assigned By**: icscert ### Vulnerability Description An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications. ### CVSS Metrics - **CVSS Base Score**: 5.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-319: Security Weakness ### Affected Products **Westermo - Lynx** Affected versions: - L206-F2G1 (Status: affected) - 4.24 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-04) ### Credits - Aarón Flecha Menéndez, Iván Alonso Álvarez and Víctor Bello Cuevas reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10490 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 08:46 UTC - **Last Updated**: December 02, 2024 at 22:11 UTC - **Reserved Date**: October 29, 2024 at 11:13 UTC - **Assigned By**: ABB ### Vulnerability Description An “Authentication Bypass Using an Alternate Path or Channel” vulnerability in the OPC UA Server configuration required for B&R mapp Cockpit before 6.0, B&R mapp View before 6.0, B&R mapp Services before 6.0, B&R mapp Motion before 6.0 and B&R mapp Vision before 6.0 may be used by an unauthenticated network-based attacker to cause information disclosure, unintended change of data, or denial of service conditions. B&R mapp Services is only affected, when mpUserX or mpCodeBox are used in the Automation Studio project. ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **B&R Industrial Automation GmbH - B&R mapp Cockpit** Affected versions: - 5.0;0 (Status: affected) **B&R Industrial Automation GmbH - B&R mapp View** Affected versions: - 5.0 (Status: affected) **B&R Industrial Automation GmbH - B&R mapp Services** Affected versions: - 5.0 (Status: affected) **B&R Industrial Automation GmbH - B&R mapp Motion** Affected versions: - 5.0 (Status: affected) **B&R Industrial Automation GmbH - B&R mapp Vision** Affected versions: - 5.0 (Status: affected) ### References 1. [](https://www.br-automation.com/fileadmin/SA22P014-90c4aa35.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18558 - **State**: PUBLISHED - **Published Date**: May 13, 2019 at 12:49 UTC - **Last Updated**: August 05, 2024 at 11:15 UTC - **Reserved Date**: October 22, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Espressif ESP-IDF 2.x and 3.x before 3.0.6 and 3.1.x before 3.1.1. Insufficient validation of input data in the 2nd stage bootloader allows a physically proximate attacker to bypass secure boot checks and execute arbitrary code, by crafting an application binary that overwrites a bootloader code segment in process_segment in components/bootloader_support/src/esp_image_format.c. The attack is effective when the flash encryption feature is not enabled, or if the attacker finds a different vulnerability that allows them to write this binary to flash memory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/espressif/esp-idf/releases) 2. [](https://www.espressif.com/en/news/Espressif_Product_Security_Advisory_Concerning_Secure_Boot_%28CVE-2018-18558%29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15747, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15747 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15747 - **State**: PUBLISHED - **Published Date**: October 22, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "Data Execution Prevention Violation starting at Unknown Symbol @ 0x0000700b00260112 called from CADIMAGE+0x00000000003d35ad." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15747)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0642, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0642 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0642 - **State**: PUBLISHED - **Published Date**: August 29, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:30 UTC - **Reserved Date**: August 06, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010511 [eyeonsecurity.net] Incredimail allows automatic over writing offiles on your hard disk](http://archives.neohapsis.com/archives/bugtraq/2001-05/0078.html) 2. [incredimail-dot-overwrite-files(6529)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6529)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1168 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:02 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description install.iss installation script for Internet Security Scanner (ISS) for Linux, version 5.3, allows local users to change the permissions of arbitrary files via a symlink attack on a temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19990220 ISS install.iss security hole](http://www.securityfocus.com/archive/1/12640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27748 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 17:23 UTC - **Last Updated**: June 04, 2025 at 17:52 UTC - **Reserved Date**: March 06, 2025 at 04:26 UTC - **Assigned By**: microsoft ### Vulnerability Description Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2024** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2024** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) ### References 1. [Microsoft Office Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27748)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24704, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24704 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24704 - **State**: PUBLISHED - **Published Date**: February 14, 2022 at 21:04 UTC - **Last Updated**: September 16, 2024 at 19:00 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GovTech CSG ### Vulnerability Description The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered. ### Affected Products **https://accel-ppp.org/ - Accel-PPP** Affected versions: - 1.12 (Status: affected) ### References 1. [](https://github.com/accel-ppp/accel-ppp/pull/35) ### Credits - Chloe Ong from Government Technology Agency of Singapore - Eugene Lim from Government Technology Agency of Singapore - Kar Wei Loh from Government Technology Agency of Singapore
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1495 - **State**: PUBLISHED - **Published Date**: March 18, 2023 at 23:31 UTC - **Last Updated**: February 26, 2025 at 17:17 UTC - **Reserved Date**: March 18, 2023 at 20:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **n/a - Rebuild** Affected versions: - 3.2.0 (Status: affected) - 3.2.1 (Status: affected) - 3.2.2 (Status: affected) - 3.2.3 (Status: affected) ### References 1. [](https://vuldb.com/?id.223381) 2. [](https://vuldb.com/?ctiid.223381) 3. [](https://github.com/getrebuild/rebuild/issues/594) 4. [](https://github.com/getrebuild/rebuild/commit/c9474f84e5f376dd2ade2078e3039961a9425da7) ### Credits - Mechoy (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36063 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 14:34 UTC - **Last Updated**: September 17, 2024 at 02:37 UTC - **Reserved Date**: June 30, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Connect version 11.2.2 (and earlier) is affected by a Reflected Cross-site Scripting vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Connect** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/connect/apsb21-66.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43508 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 17:35 UTC - **Last Updated**: January 29, 2025 at 23:50 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Graphics Component Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) ### References 1. [Windows Graphics Component Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43508)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12082, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12082 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12082 - **State**: PUBLISHED - **Published Date**: April 24, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 00:06 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability. ### Affected Products **Blender - Blender** Affected versions: - v2.78c (Status: affected) ### References 1. [[debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update](https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html) 2. [DSA-4248](https://www.debian.org/security/2018/dsa-4248) 3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26739, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26739 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26739 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 19:02 UTC - **Last Updated**: August 03, 2024 at 05:11 UTC - **Reserved Date**: March 08, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges. ### Affected Products **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213258) 2. [](https://support.apple.com/en-us/HT213254) 3. [](https://support.apple.com/en-us/HT213257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-42579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-42579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-42579 - **State**: PUBLISHED - **Published Date**: December 05, 2023 at 02:44 UTC - **Last Updated**: August 02, 2024 at 19:23 UTC - **Reserved Date**: September 11, 2023 at 23:55 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Improper usage of insecure protocol (i.e. HTTP) in SogouSDK of Chinese Samsung Keyboard prior to versions 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13 allows adjacent attackers to access keystroke data using Man-in-the-Middle attack. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **Samsung Mobile - Samsung Keyboard** Affected versions: - 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39835 - **State**: PUBLISHED - **Published Date**: September 27, 2022 at 18:21 UTC - **Last Updated**: May 21, 2025 at 15:24 UTC - **Reserved Date**: September 05, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dev.gajim.org/gajim/gajim/-/tags) 2. [](https://dev.gajim.org/gajim/gajim/-/blob/master/ChangeLog)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6350, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6350 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6350 - **State**: PUBLISHED - **Published Date**: November 29, 2023 at 12:02 UTC - **Last Updated**: February 13, 2025 at 17:26 UTC - **Reserved Date**: November 28, 2023 at 02:43 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 119.0.6045.199 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html) 2. [](https://crbug.com/1501766) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/) 5. [](https://www.debian.org/security/2023/dsa-5569) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/) 7. [](https://security.gentoo.org/glsa/202401-34)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25775, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25775 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25775 - **State**: PUBLISHED - **Published Date**: April 25, 2025 at 00:00 UTC - **Last Updated**: April 25, 2025 at 17:49 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Codeastro Bus Ticket Booking System v1.0 is vulnerable to SQL injection via the kodetiket parameter in /BusTicket-CI/tiket/cekorder. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://codeastro.com/bus-ticket-booking-system-in-php-codeigniter-with-source-code/) 2. [](https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7312 - **State**: PUBLISHED - **Published Date**: November 16, 2015 at 11:00 UTC - **Last Updated**: August 06, 2024 at 07:43 UTC - **Reserved Date**: September 22, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3-mmap.patch and aufs4-mmap.patch patches for the Linux kernel 3.x and 4.x allow local users to cause a denial of service (use-after-free and BUG) or possibly gain privileges via a (1) madvise or (2) msync system call, related to mm/madvise.c and mm/msync.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-3364](http://www.debian.org/security/2015/dsa-3364) 2. [[aufs] 20150910 Re: concurrent msync triggers NULL pointer dereference](http://sourceforge.net/p/aufs/mailman/message/34449209/) 3. [[oss-security] 20150922 Re: CVE request: Use-after-free in Linux kernel with aufs mmap patch](http://www.openwall.com/lists/oss-security/2015/09/22/10) 4. [USN-2777-1](http://www.ubuntu.com/usn/USN-2777-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24605 - **State**: PUBLISHED - **Published Date**: May 29, 2023 at 00:00 UTC - **Last Updated**: January 14, 2025 at 17:14 UTC - **Reserved Date**: January 29, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://open-xchange.com) 2. [](http://seclists.org/fulldisclosure/2023/May/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36162 - **State**: PUBLISHED - **Published Date**: January 06, 2021 at 00:52 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Veritas CloudPoint before 8.3.0.1+hotfix. The CloudPoint Windows Agent leverages OpenSSL. This OpenSSL library attempts to load the \usr\local\ssl\openssl.cnf configuration file, which does not exist. By default, on Windows systems users can create directories under <drive>:\. A low privileged user can create a <drive>:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, which may result in arbitrary code execution. This would give the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.veritas.com/content/support/en_US/security/VTS20-011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18459 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 15:24 UTC - **Last Updated**: August 05, 2024 at 01:54 UTC - **Reserved Date**: October 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GitLab Community and Enterprise Edition 11.3 to 12.3 in the protected environments feature. It has Insecure Permissions (issue 3 of 4). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/blog/categories/releases/) 2. [](https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9892 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:24 UTC - **Reserved Date**: June 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpFreeHeap+0x0000000000000393." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.irfanview.com/plugins.htm) 2. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9892)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42478 - **State**: PUBLISHED - **Published Date**: June 13, 2023 at 08:41 UTC - **Last Updated**: October 23, 2024 at 14:27 UTC - **Reserved Date**: October 07, 2022 at 14:05 UTC - **Assigned By**: fortinet ### Vulnerability Description An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:U/RC:C` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **Fortinet - FortiSIEM** Affected versions: - 6.7.0 (Status: affected) - 6.6.0 (Status: affected) - 6.5.0 (Status: affected) - 6.4.0 (Status: affected) - 6.3.0 (Status: affected) - 6.2.0 (Status: affected) - 6.1.0 (Status: affected) - 5.4.0 (Status: affected) - 5.3.0 (Status: affected) - 5.2.5 (Status: affected) - 5.2.1 (Status: affected) - 5.1.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-22-258](https://fortiguard.com/psirt/FG-IR-22-258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2373 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Buddy icon file for AOL Instant Messenger (AIM) 4.3 through 5.5 is created in a predictable location, which may allow remote attackers to use a shell: URI to exploit other vulnerabilities that involve predictable locations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040219 Aol Instant Messenger/Microsoft Internet Explorer remote code execution](http://www.securityfocus.com/archive/1/354448) 2. [9698](http://www.securityfocus.com/bid/9698) 3. [aim-buddy-predictable-location(15310)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15310)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25674, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25674 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25674 - **State**: PUBLISHED - **Published Date**: February 09, 2024 at 00:00 UTC - **Last Updated**: August 26, 2024 at 19:07 UTC - **Reserved Date**: February 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in MISP before 2.4.184. Organisation logo upload is insecure because of a lack of checks for the file extension and MIME type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MISP/MISP/commit/312d2d5422235235ddd211dcb6bb5bb09c07791f) 2. [](https://github.com/MISP/MISP/compare/v2.4.183...v2.4.184)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32923, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32923 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32923 - **State**: PUBLISHED - **Published Date**: June 03, 2021 at 10:38 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hashicorp.com/blog/category/vault/) 2. [](https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603) 3. [GLSA-202207-01](https://security.gentoo.org/glsa/202207-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47380 - **State**: PUBLISHED - **Published Date**: May 15, 2023 at 09:40 UTC - **Last Updated**: March 05, 2025 at 19:00 UTC - **Reserved Date**: December 14, 2022 at 06:03 UTC - **Assigned By**: CERTVDE ### Vulnerability Description An authenticated remote attacker may use a stack based  out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **CODESYS - CODESYS Control RTE (SL)** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control RTE (for Beckhoff CX) SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control Win (SL)** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control Runtime System Toolkit** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Safety SIL2 Runtime Toolkit** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Safety SIL2 PSP** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS HMI (SL)** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Development System V3** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for BeagleBone SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for emPC-A/iMX6 SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for IOT2000 SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for Linux SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for PFC100 SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for PFC200 SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for PLCnext SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for Raspberry Pi SL** Affected versions: - V0.0.0.0 (Status: affected) **CODESYS - CODESYS Control for WAGO Touch Panels 600 SL** Affected versions: - V0.0.0.0 (Status: affected) ### References 1. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=) ### Credits - Vladimir Tokarev, Microsoft
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9364 - **State**: PUBLISHED - **Published Date**: October 18, 2024 at 04:32 UTC - **Last Updated**: October 18, 2024 at 16:36 UTC - **Reserved Date**: September 30, 2024 at 19:50 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SendGrid for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wp_mailplus_clear_logs' function in all versions up to, and including, 1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's log files. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **smackcoders - SendGrid for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bb7d99a7-1e7d-43e1-839c-286b454c8276?source=cve) 2. [](https://plugins.svn.wordpress.org/wp-sendgrid-mailer/tags/1.4/wp-sendgrid-mailer.php) 3. [](https://plugins.trac.wordpress.org/browser/wp-sendgrid-mailer/trunk/wp-sendgrid-mailer.php#L167) ### Credits - Nir KUM
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45316, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45316 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45316 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 08:23 UTC - **Last Updated**: May 24, 2025 at 10:26 UTC - **Reserved Date**: December 05, 2023 at 08:22 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/<telem_run_id> as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to a CSRF attack. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 8.1.6 (Status: unaffected) - 9.0.4 (Status: unaffected) - 9.1.3 (Status: unaffected) - 9.2.2 (Status: unaffected) - 7.8.15 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - DoyenSec
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24966, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24966 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24966 - **State**: PUBLISHED - **Published Date**: February 14, 2024 at 16:30 UTC - **Last Updated**: August 01, 2024 at 23:36 UTC - **Reserved Date**: February 01, 2024 at 22:13 UTC - **Assigned By**: f5 ### Vulnerability Description When LDAP remote authentication is configured on F5OS, a remote user without an assigned role will be incorrectly authorized.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **F5 - F5OS - Appliance** Affected versions: - 1.2.0 (Status: affected) **F5 - F5OS - Chassis** Affected versions: - 1.3.0 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000133111) ### Credits - F5
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0170 - **State**: PUBLISHED - **Published Date**: April 10, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: March 22, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1011](http://www.securityfocus.com/bid/1011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38626, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38626 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38626 - **State**: PUBLISHED - **Published Date**: January 23, 2024 at 20:34 UTC - **Last Updated**: August 02, 2024 at 17:46 UTC - **Reserved Date**: July 20, 2023 at 19:46 UTC - **Assigned By**: trendmicro ### Vulnerability Description A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-38625. ### Affected Products **Trend Micro, Inc. - Trend Micro Apex Central** Affected versions: - 2019 (Status: affected) ### References 1. [](https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-23-1000/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10115 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 19:02 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 6u151 (Status: affected) - 7u141 (Status: affected) - 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 (Status: affected) ### References 1. [RHSA-2017:1791](https://access.redhat.com/errata/RHSA-2017:1791) 2. [RHSA-2017:1790](https://access.redhat.com/errata/RHSA-2017:1790) 3. [](https://security.netapp.com/advisory/ntap-20170720-0001/) 4. [RHSA-2017:1789](https://access.redhat.com/errata/RHSA-2017:1789) 5. [](https://cert.vde.com/en-us/advisories/vde-2017-002) 6. [99774](http://www.securityfocus.com/bid/99774) 7. [RHSA-2017:2424](https://access.redhat.com/errata/RHSA-2017:2424) 8. [1038931](http://www.securitytracker.com/id/1038931) 9. [RHSA-2017:1792](https://access.redhat.com/errata/RHSA-2017:1792) 10. [GLSA-201709-22](https://security.gentoo.org/glsa/201709-22) 11. [DSA-3919](http://www.debian.org/security/2017/dsa-3919) 12. [RHSA-2017:2481](https://access.redhat.com/errata/RHSA-2017:2481) 13. [RHSA-2017:2530](https://access.redhat.com/errata/RHSA-2017:2530) 14. [RHSA-2017:3453](https://access.redhat.com/errata/RHSA-2017:3453) 15. [RHSA-2017:2469](https://access.redhat.com/errata/RHSA-2017:2469) 16. [DSA-3954](http://www.debian.org/security/2017/dsa-3954) 17. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21156 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 22:04 UTC - **Last Updated**: May 05, 2025 at 16:37 UTC - **Reserved Date**: December 09, 2021 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Access of uninitialized pointer in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access. ### Affected Products **n/a - Intel(R) Trace Analyzer and Collector** Affected versions: - before version 2021.5 (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5285 - **State**: PUBLISHED - **Published Date**: October 29, 2015 at 20:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description CRLF injection vulnerability in Kallithea before 0.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the came_from parameter to _admin/login. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38424](https://www.exploit-db.com/exploits/38424/) 2. [](http://packetstormsecurity.com/files/133897/Kallithea-0.2.9-HTTP-Response-Splitting.html) 3. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5267.php) 4. [](https://kallithea-scm.org/security/cve-2015-5285.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33631, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33631 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33631 - **State**: PUBLISHED - **Published Date**: January 18, 2024 at 15:05 UTC - **Last Updated**: February 13, 2025 at 16:28 UTC - **Reserved Date**: May 28, 2021 at 14:26 UTC - **Assigned By**: openEuler ### Vulnerability Description Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **openEuler - kernel** Affected versions: - 4.19.90 (Status: affected) - 5.10.0-60.18.0 (Status: affected) ### References 1. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030) 2. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031) 3. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032) 4. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033) 5. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034) 6. [](https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035) 7. [](https://gitee.com/src-openeuler/kernel/pulls/1389) 8. [](https://gitee.com/src-openeuler/kernel/pulls/1396) 9. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8) 10. [](http://www.openwall.com/lists/oss-security/2024/01/30/3) 11. [](http://www.openwall.com/lists/oss-security/2024/01/30/4) 12. [](http://www.openwall.com/lists/oss-security/2024/01/30/5) 13. [](http://www.openwall.com/lists/oss-security/2024/01/30/9) 14. [](http://www.openwall.com/lists/oss-security/2024/01/30/10) 15. [](http://www.openwall.com/lists/oss-security/2024/01/31/3) 16. [](http://www.openwall.com/lists/oss-security/2024/01/31/2) 17. [](http://www.openwall.com/lists/oss-security/2024/02/02/6) 18. [](http://www.openwall.com/lists/oss-security/2024/02/02/9) 19. [](http://www.openwall.com/lists/oss-security/2024/02/03/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39657 - **State**: PUBLISHED - **Published Date**: August 26, 2024 at 20:54 UTC - **Last Updated**: August 27, 2024 at 13:57 UTC - **Reserved Date**: June 26, 2024 at 21:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Sender Sender – Newsletter, SMS and Email Marketing Automation for WooCommerce.This issue affects Sender – Newsletter, SMS and Email Marketing Automation for WooCommerce: from n/a through 2.6.18. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Sender - Sender – Newsletter, SMS and Email Marketing Automation for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/sender-net-automated-emails/wordpress-sender-newsletter-sms-and-email-marketing-automation-for-woocommerce-plugin-2-6-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8118 - **State**: REJECTED - **Published Date**: March 01, 2021 at 23:07 UTC - **Last Updated**: March 01, 2021 at 23:07 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12507, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12507 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12507 - **State**: PUBLISHED - **Published Date**: December 24, 2024 at 04:22 UTC - **Last Updated**: December 25, 2024 at 02:43 UTC - **Reserved Date**: December 11, 2024 at 13:19 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Optio Dentistry plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'optio-lightbox' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **optio - Optio Dentistry** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4241118f-9bcb-4dec-abd2-7172db2cf445?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/optio-dentistry/tags/2.1/optio-dentistry.php#L18) 3. [](https://plugins.trac.wordpress.org/browser/optio-dentistry/tags/2.1/optio-dentistry.php#L92) 4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208800%40optio-dentistry&new=3208800%40optio-dentistry&sfp_email=&sfph_mail=) ### Credits - muhammad yudha
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4931, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4931 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4931 - **State**: PUBLISHED - **Published Date**: October 09, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 20:07 UTC - **Reserved Date**: October 09, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in maincore.php in PHP-Fusion allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder_level parameter. NOTE: this issue has been disputed by a reliable third party ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42456](http://www.securityfocus.com/bid/42456) 2. [14647](http://www.exploit-db.com/exploits/14647) 3. [[vim] 20100816 PHP-Fusion Local File Inclusion Vulnerability](http://attrition.org/pipermail/vim/2010-August/002391.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8780 - **State**: PUBLISHED - **Published Date**: May 04, 2017 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:55 UTC - **Reserved Date**: May 04, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GeniXCMS 1.0.2 has XSS triggered by a comment that is mishandled during a publish operation by an administrator, as demonstrated by a malformed P element. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/semplon/GeniXCMS/issues/74)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1851 - **State**: PUBLISHED - **Published Date**: May 13, 2011 at 17:00 UTC - **Last Updated**: September 17, 2024 at 01:26 UTC - **Reserved Date**: May 03, 2011 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Stack-based buffer overflow in tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long mode field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-11-163/) 2. [HPSBGN02680](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750) 3. [1025519](http://securitytracker.com/id?1025519) 4. [SSRT100361](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02822750) 5. [47789](http://www.securityfocus.com/bid/47789)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2540 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26693, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26693 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26693 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 18:36 UTC - **Last Updated**: August 03, 2024 at 05:11 UTC - **Reserved Date**: March 08, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4. A plug-in may be able to inherit the application's permissions and access user data. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3502 - **State**: PUBLISHED - **Published Date**: July 04, 2023 at 14:00 UTC - **Last Updated**: August 02, 2024 at 06:55 UTC - **Reserved Date**: July 04, 2023 at 13:26 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in SourceCodester Shopping Website 1.0. Affected is an unknown function of the file search-result.php. The manipulation of the argument product leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232950 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Shopping Website** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.232950) 2. [](https://vuldb.com/?ctiid.232950) 3. [](https://github.com/MoeMion233/VulHub/blob/main/Shopping%20Website%20(E-Commerce)%20search-result.php%20has%20Sqlinjection.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7420 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Just Bureaucracy (aka com.magzter.justbureaucracy) application 3.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#353433](http://www.kb.cert.org/vuls/id/353433) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12128 - **State**: PUBLISHED - **Published Date**: May 14, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 20:59 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability. ### Affected Products **Talos - Moxa** Affected versions: - Moxa EDR-810 V4.1 build 17030317 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0480)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3839 - **State**: PUBLISHED - **Published Date**: July 03, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: July 03, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in application/core/MY_Model.php in MyClientBase 0.12 allow remote attackers to execute arbitrary SQL commands via the (1) invoice_number or (2) tags parameter to index.php/invoice_search. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [48961](http://secunia.com/advisories/48961) 2. [](https://bitbucket.org/jesseterry/myclientbase/changeset/789099396f05) 3. [18814](http://www.exploit-db.com/exploits/18814) 4. [53311](http://www.securityfocus.com/bid/53311) 5. [](http://myclientbase.com/) 6. [myclientbase-index-sql-injection(75298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75298)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14883 - **State**: PUBLISHED - **Published Date**: March 18, 2020 at 12:16 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in Moodle 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token. ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **[UNKNOWN] - moodle** Affected versions: - 3.7.3 (Status: affected) - 3.6.7 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14883) 2. [](https://moodle.org/mod/forum/discuss.php?d=393586#p1586750)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31267 - **State**: PUBLISHED - **Published Date**: June 09, 2024 at 11:14 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 16:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in WP Desk Flexible Checkout Fields for WooCommerce.This issue affects Flexible Checkout Fields for WooCommerce: from n/a through 4.1.2. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **WP Desk - Flexible Checkout Fields for WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/flexible-checkout-fields/wordpress-flexible-checkout-fields-for-woocommerce-plugin-4-1-2-broken-access-control-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6959 - **State**: PUBLISHED - **Published Date**: December 14, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 17:53 UTC - **Reserved Date**: December 05, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Open redirect vulnerability in Cisco WebEx Sales Center allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCul25557. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131212 Cisco WebEx Sales Center Open Redirect Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6959) 2. [100901](http://osvdb.org/100901) 3. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=32155) 4. [cisco-webex-cve20136959-open-redirect(89698)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89698) 5. [1029493](http://www.securitytracker.com/id/1029493)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4576 - **State**: PUBLISHED - **Published Date**: October 15, 2008 at 19:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32998](http://secunia.com/advisories/32998) 2. [SUSE-SA:2008:052](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html) 3. [[oss-security] 20081008 CVE request: kernel: sctp: Fix oops when INIT-ACK indicates that peer doesn't support AUTH](http://permalink.gmane.org/gmane.comp.security.oss.general/1039) 4. [RHSA-2009:0009](http://www.redhat.com/support/errata/RHSA-2009-0009.html) 5. [SUSE-SA:2008:053](http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html) 6. [FEDORA-2008-8929](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00693.html) 7. [31634](http://www.securityfocus.com/bid/31634) 8. [33586](http://secunia.com/advisories/33586) 9. [DSA-1687](http://www.debian.org/security/2008/dsa-1687) 10. [oval:org.mitre.oval:def:9822](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9822) 11. [32918](http://secunia.com/advisories/32918) 12. [USN-679-1](http://www.ubuntu.com/usn/usn-679-1) 13. [linux-kernel-sctp-initack-dos(45773)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45773) 14. [32759](http://secunia.com/advisories/32759) 15. [33180](http://secunia.com/advisories/33180) 16. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.18) 17. [[linux-kernel] 20081006 [patch 58/71] sctp: Fix oops when INIT-ACK indicates that peer doesnt support AUTH](http://www.gossamer-threads.com/lists/linux/kernel/981012?page=last) 18. [32370](http://secunia.com/advisories/32370) 19. [RHSA-2008:1017](http://www.redhat.com/support/errata/RHSA-2008-1017.html) 20. [](http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.27-rc6-git6.log) 21. [32386](http://secunia.com/advisories/32386) 22. [FEDORA-2008-8980](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00689.html) 23. [SUSE-SR:2008:025](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html) 24. [DSA-1681](http://www.debian.org/security/2008/dsa-1681) 25. [33182](http://secunia.com/advisories/33182)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5448, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5448 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5448 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 15:04 UTC - **Reserved Date**: January 13, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53. ### Affected Products **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [RHSA-2017:1106](https://access.redhat.com/errata/RHSA-2017:1106) 2. [](https://www.mozilla.org/security/advisories/mfsa2017-12/) 3. [](https://www.mozilla.org/security/advisories/mfsa2017-11/) 4. [](https://www.mozilla.org/security/advisories/mfsa2017-10/) 5. [97940](http://www.securityfocus.com/bid/97940) 6. [DSA-3831](https://www.debian.org/security/2017/dsa-3831) 7. [1038320](http://www.securitytracker.com/id/1038320) 8. [RHSA-2017:1104](https://access.redhat.com/errata/RHSA-2017:1104) 9. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1346648)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0125 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: March 12, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the web interface for SOHO Routefinder 550 before firmware 4.63 allows remote attackers to cause a denial of service (reboot) and execute arbitrary code via a long GET /OPTIONS value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.krusesecurity.dk/advisories/routefind550bof.txt) 2. [routefinder-vpn-options-bo(11514)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11514) 3. [7067](http://www.securityfocus.com/bid/7067) 4. [](ftp://ftp.multitech.com/Routers/RF550VPN.TXT)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1416 - **State**: PUBLISHED - **Published Date**: April 30, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: April 24, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by leveraging an invalid DSA key. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[help-gnutls] 20090420 Encryption using DSA keys](http://lists.gnu.org/archive/html/help-gnutls/2009-04/msg00018.html) 2. [[gnutls-devel] 20090430 All DSA keys generated using GnuTLS 2.6.x are corrupt [GNUTLS-SA-2009-2] [CVE-2009-1416]](http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3516) 3. [1022158](http://www.securitytracker.com/id?1022158) 4. [ADV-2009-1218](http://www.vupen.com/english/advisories/2009/1218) 5. [34783](http://www.securityfocus.com/bid/34783) 6. [GLSA-200905-04](http://security.gentoo.org/glsa/glsa-200905-04.xml) 7. [34842](http://secunia.com/advisories/34842) 8. [35211](http://secunia.com/advisories/35211) 9. [MDVSA-2009:116](http://www.mandriva.com/security/advisories?name=MDVSA-2009:116)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0528 - **State**: PUBLISHED - **Published Date**: January 21, 2016 at 02:00 UTC - **Last Updated**: August 05, 2024 at 22:22 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to User GUI, a different vulnerability than CVE-2016-0527, CVE-2016-0529, and CVE-2016-0530. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html) 2. [1034726](http://www.securitytracker.com/id/1034726)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4292 - **State**: PUBLISHED - **Published Date**: March 02, 2020 at 14:00 UTC - **Last Updated**: September 17, 2024 at 01:31 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 uses a cross-domain policy file that includes domains that should not be trusted which could disclose sensitive information. IBM X-Force ID: 176335. ### Affected Products **IBM - Security Information Queue** Affected versions: - 1.0.0 (Status: affected) - 1.0.1 (Status: affected) - 1.0.2 (Status: affected) - 1.0.3 (Status: affected) - 1.0.4 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/5390193) 2. [ibm-isiq-cve20204292-info-disc (176335)](https://exchange.xforce.ibmcloud.com/vulnerabilities/176335)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17707 - **State**: PUBLISHED - **Published Date**: January 24, 2019 at 04:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 28, 2018 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Epic Games Launcher versions prior to 8.2.2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handler for the com.epicgames.launcher protocol. A crafted URI with the com.epicgames.launcher protocol can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-7241. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Epic Games - Epic Games Launcher** Affected versions: - versions prior to 8.2.2 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1359/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51866 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 14:36 UTC - **Reserved Date**: November 04, 2024 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Riponshah Social button allows Stored XSS.This issue affects Social button: from n/a through 1.3. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Mr. Riponshah - Social button** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/social-button/wordpress-social-button-plugin-1-3-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18525 - **State**: PUBLISHED - **Published Date**: August 21, 2019 at 18:16 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 15, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The megamenu plugin before 2.4 for WordPress has XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/megamenu/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30216, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30216 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30216 - **State**: PUBLISHED - **Published Date**: May 04, 2023 at 00:00 UTC - **Last Updated**: January 29, 2025 at 19:34 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions in the updateUserInfo function of newbee-mall before commit 1f2c2dfy allows attackers to obtain user account information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/newbee-ltd/newbee-mall/issues/76)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1804, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1804 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1804 - **State**: PUBLISHED - **Published Date**: May 14, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 21, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The OPC server in Progea Movicon before 11.3 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-01.pdf) 2. [49092](http://secunia.com/advisories/49092) 3. [81814](http://osvdb.org/81814) 4. [53484](http://www.securityfocus.com/bid/53484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4964 - **State**: PUBLISHED - **Published Date**: August 20, 2013 at 22:00 UTC - **Last Updated**: September 17, 2024 at 01:50 UTC - **Reserved Date**: July 29, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://puppetlabs.com/security/cve/cve-2013-4964/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29566 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 18:47 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir generation because the hash computation fails to include all of the public values from the Zero Knowledge proof statement as well as all of the public values computed in the proof, aka the Frozen Heart issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/) 2. [](https://eprint.iacr.org/2017/1066)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3557, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3557 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3557 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 18:41 UTC - **Last Updated**: November 13, 2024 at 17:45 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the host input API daemon of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted data stream to the host input daemon of the affected device. A successful exploit could allow the attacker to cause the host input daemon to restart. The attacker could use repeated attacks to cause the daemon to continuously reload, creating a DoS condition for the API. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **Cisco - Cisco Firepower Management Center** Affected versions: - n/a (Status: affected) ### References 1. [20201021 Cisco Firepower Management Center Software Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-dos-3WymYWKh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7475, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7475 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7475 - **State**: PUBLISHED - **Published Date**: May 19, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. ### Affected Products **Red Hat, Inc. - Cairo** Affected versions: - 1.15.4 (Status: affected) ### References 1. [](https://bugs.freedesktop.org/show_bug.cgi?id=100763) 2. [[oss-security] 20170428 CVE-2017-7475 Cairo-1.15.4 Denial-of-Service Attack due to Logical Problem in Program](http://seclists.org/oss-sec/2017/q2/151) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475) 4. [[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar](https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27289 - **State**: PUBLISHED - **Published Date**: January 11, 2021 at 15:27 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 19, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code. ### Weakness Classification (CWE) - CWE-822: Security Weakness ### Affected Products **n/a - Delta Electronics** Affected versions: - CNCSoft-B Versions 1.0.0.2 and prior (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-040/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2515 - **State**: PUBLISHED - **Published Date**: April 13, 2016 at 16:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 20, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa) 2. [](https://github.com/hueniverse/hawk/issues/168) 3. [](https://nodesecurity.io/advisories/77) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1309721) 5. [[oss-security] 20160219 CVE for nodejs hawk](http://www.openwall.com/lists/oss-security/2016/02/20/1) 6. [[oss-security] 20160220 Re: CVE for nodejs hawk](http://www.openwall.com/lists/oss-security/2016/02/20/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0583 - **State**: PUBLISHED - **Published Date**: February 08, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 16:41 UTC - **Reserved Date**: February 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in mailarticle.php in Clever Copy 3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-0462](http://www.vupen.com/english/advisories/2006/0462) 2. [](http://retrogod.altervista.org/Clever_Copy_V3_sql_xpl.html) 3. [18749](http://secunia.com/advisories/18749) 4. [22984](http://www.osvdb.org/22984) 5. [1015590](http://securitytracker.com/id?1015590) 6. [clevercopy-mailarticle-sql-injection(24545)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24545)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14828, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14828 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14828 - **State**: PUBLISHED - **Published Date**: October 23, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:30 UTC - **Reserved Date**: August 01, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Advantech - Advantech WebAccess** Affected versions: - WebAccess Versions 8.3.1 and prior (Status: affected) ### References 1. [1041939](http://www.securitytracker.com/id/1041939) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-296-01%2C) 3. [105728](http://www.securityfocus.com/bid/105728)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32280, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32280 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32280 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 19:54 UTC - **Last Updated**: February 20, 2025 at 20:18 UTC - **Reserved Date**: June 08, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authenticated (contributor or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Xakuro's XO Slider plugin <= 3.3.2 at WordPress. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Xakuro - XO Slider (WordPress plugin)** Affected versions: - <= 3.3.2 (Status: affected) ### References 1. [](https://wordpress.org/plugins/xo-liteslider/#developers) 2. [](https://patchstack.com/database/vulnerability/xo-liteslider/wordpress-xo-slider-plugin-3-3-2-authenticated-stored-cross-site-scripting-xss-vulnerability) ### Credits - Vulnerability discovered by Ngo Van Thien (Patchstack Alliance)