System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3199, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3199
- **State**: PUBLISHED
- **Published Date**: October 08, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 03, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The wrap function in bindings/core/v8/custom/V8EventCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 38.0.2125.101, has an erroneous fallback outcome for wrapper-selection failures, which allows remote attackers to cause a denial of service via vectors that trigger stopping a worker process that had been handling an Event object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:1626](http://rhn.redhat.com/errata/RHSA-2014-1626.html)
2. [](https://crbug.com/395411)
3. [70273](http://www.securityfocus.com/bid/70273)
4. [](http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html)
5. [](https://src.chromium.org/viewvc/blink?revision=179340&view=revision)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16491, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16491
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13746, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13746
- **State**: PUBLISHED
- **Published Date**: March 01, 2025 at 04:21 UTC
- **Last Updated**: March 03, 2025 at 20:57 UTC
- **Reserved Date**: January 27, 2025 at 20:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Booking Calendar and Notification plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on the wpcb_all_bookings(), wpcb_update_booking_post(), and wpcb_delete_posts() functions in all versions up to, and including, 4.0.3. This makes it possible for unauthenticated attackers to extract data, create or update bookings, or delete arbitrary posts.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**imznarf - Booking Calendar and Notification**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/422bb9a5-c848-4492-add7-bc65b1111565?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/booking-calendar-and-notification/tags/4.0.3/lib/includes/function.php)
3. [](https://plugins.trac.wordpress.org/browser/booking-calendar-and-notification/trunk/lib/classes/api.php#L270)
4. [](https://plugins.trac.wordpress.org/browser/booking-calendar-and-notification/trunk/lib/classes/api.php#L134)
5. [](https://plugins.trac.wordpress.org/browser/booking-calendar-and-notification/trunk/lib/classes/api.php#L188)
### Credits
- Pham Van Tam
- Hoang Phuc Vo
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0885, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0885
- **State**: PUBLISHED
- **Published Date**: March 26, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in XMB Forum 1.9.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Mood or (2) "Send To" fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12886](http://www.securityfocus.com/bid/12886)
2. [1013515](http://securitytracker.com/id?1013515)
3. [](https://docs.xmbforum2.com/index.php?title=Security_Issue_History)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-9359, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-9359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9359
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 16, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-18899, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-18899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18899
- **State**: PUBLISHED
- **Published Date**: August 19, 2021 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 15:11 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An uncontrolled memory allocation in DataBufdata(subBox.length-sizeof(box)) function of Exiv2 0.27 allows attackers to cause a denial of service (DOS) via a crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Exiv2/exiv2/issues/742)
2. [](https://cwe.mitre.org/data/definitions/789.html)
3. [GLSA-202312-06](https://security.gentoo.org/glsa/202312-06)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2743, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2743
- **State**: PUBLISHED
- **Published Date**: June 27, 2023 at 13:17 UTC
- **Last Updated**: May 05, 2025 at 15:59 UTC
- **Reserved Date**: May 16, 2023 at 19:09 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db)
### Credits
- Alex Sanford
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21366, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21366
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:04 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Access Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Access 2016 (32-bit edition)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Access 2016**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [Microsoft Access Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-6661, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-6661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6661
- **State**: PUBLISHED
- **Published Date**: September 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The netease movie (aka com.netease.movie) application 4.7.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#476721](http://www.kb.cert.org/vuls/id/476721)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-40916, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-40916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40916
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 00:00 UTC
- **Last Updated**: February 07, 2025 at 18:51 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tiny File Manager v2.4.7 and below is vulnerable to session fixation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/prasathmani/tinyfilemanager)
2. [](https://github.com/whitej3rry/CVE-2022-40916/blob/main/PoC.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3701, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3701
- **State**: PUBLISHED
- **Published Date**: July 03, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, and CVE-2015-3702.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-06-30-2](http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html)
2. [75493](http://www.securityfocus.com/bid/75493)
3. [1032760](http://www.securitytracker.com/id/1032760)
4. [](http://support.apple.com/kb/HT204942)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-44157, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-44157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44157
- **State**: PUBLISHED
- **Published Date**: September 27, 2023 at 12:01 UTC
- **Last Updated**: September 23, 2024 at 18:08 UTC
- **Reserved Date**: September 26, 2023 at 13:09 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Acronis - Acronis Cyber Protect 15**
Affected versions:
- unspecified (Status: affected)
### References
1. [SEC-3956](https://security-advisory.acronis.com/advisories/SEC-3956)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37388, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37388
- **State**: PUBLISHED
- **Published Date**: August 06, 2021 at 11:22 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11354, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11354
- **State**: PUBLISHED
- **Published Date**: July 17, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:05 UTC
- **Reserved Date**: July 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Fiyo CMS v2.0.7 has an SQL injection vulnerability in dapur/apps/app_article/sys_article.php via the name parameter in editing or adding a tag name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FiyoCMS/FiyoCMS/issues/4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39467, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39467
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:59 UTC
- **Last Updated**: August 02, 2024 at 18:10 UTC
- **Reserved Date**: August 02, 2023 at 21:37 UTC
- **Assigned By**: zdi
### Vulnerability Description
Triangle MicroWorks SCADA Data Gateway certificate Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of certificate web directory. The issue results from the exposure of sensitive information in the application webroot. An attacker can leverage this vulnerability to disclose sensitive information. Was ZDI-CAN-20798.
### Weakness Classification (CWE)
- CWE-219: Security Weakness
### Affected Products
**Triangle MicroWorks - SCADA Data Gateway**
Affected versions:
- 5.1.3.20324 (Status: affected)
### References
1. [ZDI-23-1035](https://www.zerodayinitiative.com/advisories/ZDI-23-1035/)
2. [vendor-provided URL](https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20317, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20317
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 15:25 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In SystemUI, there is a possible way to unexpectedly enable the external speaker due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-190199063
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-13)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5086, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5086
- **State**: PUBLISHED
- **Published Date**: October 20, 2023 at 07:29 UTC
- **Last Updated**: February 05, 2025 at 19:03 UTC
- **Reserved Date**: September 20, 2023 at 12:21 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Copy Anything to Clipboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'copy' shortcode in versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**mahesh901122 - Copy Anything to Clipboard**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e834a211-ccc8-4a30-a15d-879ba34184e9?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/copy-the-code/tags/2.6.4/classes/class-copy-the-code-shortcode.php#L83)
3. [](https://plugins.trac.wordpress.org/changeset/2969441/copy-the-code#file1)
### Credits
- Lana Codes
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0283, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0283
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Java Web Server would allow remote users to obtain the source code for CGI programs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19970716 Viewable .jhtml source with JavaWebServer](http://marc.info/?l=bugtraq&m=88256790401004&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32470, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32470
- **State**: PUBLISHED
- **Published Date**: May 07, 2021 at 17:02 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Craft CMS before 3.6.13 has an XSS vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6)
2. [](https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-43639, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-43639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43639
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 17:39 UTC
- **Reserved Date**: October 21, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18628.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 12.0.1.12430 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1659/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22381, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22381
- **State**: PUBLISHED
- **Published Date**: March 02, 2023 at 20:54 UTC
- **Last Updated**: March 05, 2025 at 20:05 UTC
- **Reserved Date**: December 20, 2022 at 16:09 UTC
- **Assigned By**: GitHub_P
### Vulnerability Description
A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**GitHub - Enterprise Server**
Affected versions:
- 3.4.0 (Status: affected)
- 3.5.0 (Status: affected)
- 3.6.0 (Status: affected)
- 3.7.0 (Status: affected)
- 3.8.0 (Status: unaffected)
### References
1. [](https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5)
2. [](https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8)
3. [](https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12)
4. [](https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15)
5. [](https://docs.github.com/en/enterprise-server@3.8/admin/release-notes)
### Credits
- RyotaK
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27479, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27479
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 18:09 UTC
- **Last Updated**: February 25, 2025 at 15:00 UTC
- **Reserved Date**: March 01, 2023 at 19:03 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parameters. A proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content containing `label={{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}`. Then, navigating to `PanelsCode.ApplicationsPanelConfigurationSheet` (i.e., `<xwiki-host>/xwiki/bin/view/PanelsCode/ApplicationsPanelConfigurationSheet` where `<xwiki-host>` is the URL of your XWiki installation) should not execute the Groovy script. If it does, you will see `Hello from groovy!` displayed on the screen. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. For users unable to upgrade the issue can be fixed by editing the `PanelsCode.ApplicationsPanelConfigurationSheet` wiki page and making the same modifications as shown in commit `6de5442f3c`.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 6.3-milestone-2, < 13.10.11 (Status: affected)
- >= 14.0.0, < 14.4.7 (Status: affected)
- >= 14.5.0, < 14.10-rc-1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv)
2. [https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc](https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc)
3. [https://jira.xwiki.org/browse/XWIKI-20294](https://jira.xwiki.org/browse/XWIKI-20294)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10869, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10869
- **State**: PUBLISHED
- **Published Date**: November 23, 2024 at 03:25 UTC
- **Last Updated**: November 23, 2024 at 13:18 UTC
- **Reserved Date**: November 05, 2024 at 15:11 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WordPress Brute Force Protection – Stop Brute Force Attacks plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**guardgiant - WordPress Brute Force Protection – Stop Brute Force Attacks**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0cca8b75-c4f5-47ef-90a1-c1270e2f37c1?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L483)
3. [](https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L491)
### Credits
- Peter Thaleikis
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8125, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8125
- **State**: PUBLISHED
- **Published Date**: February 04, 2025 at 21:27 UTC
- **Last Updated**: February 04, 2025 at 21:35 UTC
- **Reserved Date**: August 23, 2024 at 17:06 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Validation of Specified Type of Input vulnerability in OpenText™ Content Management (Extended ECM) allows Parameter Injection.
A bad actor with the required OpenText Content Management privileges (not root) could expose
the vulnerability to carry out a remote code execution attack on the target system.
This issue affects Content Management (Extended ECM): from 10.0 through 24.4
with WebReports module
installed and enabled.
### Weakness Classification (CWE)
- CWE-1287: Security Weakness
### Affected Products
**OpenText™ - Content Management (Extended ECM)**
Affected versions:
- 10.0 (Status: affected)
### References
1. [](https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0834058)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-29396, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-29396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29396
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Systemic Insecure Permissions in Northstar Technologies Inc NorthStar Club Management 6.3 allows remote unauthenticated users to use various functionalities without authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://Ardent-Security.com)
2. [](https://ardent-security.com/en/advisory/asa-2021-04/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-40675, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-40675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-40675
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 09:42 UTC
- **Last Updated**: June 09, 2025 at 17:54 UTC
- **Reserved Date**: April 16, 2025 at 08:38 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Bagisto - Bagisto**
Affected versions:
- 2.2.2 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-bagisto)
### Credits
- Gonzalo Aguilar García (6h4ack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8454, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8454
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when Windows Audio Service fails to properly handle objects in memory, aka "Windows Audio Service Information Disclosure Vulnerability." This affects Windows 10 Servers, Windows 10, Windows Server 2019.
### Affected Products
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for ARM64-based Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for ARM64-based Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- Version 1809 for 32-bit Systems (Status: affected)
- Version 1809 for ARM64-based Systems (Status: affected)
- Version 1809 for x64-based Systems (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- (Server Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8454)
2. [105799](http://www.securityfocus.com/bid/105799)
3. [1042122](http://www.securitytracker.com/id/1042122)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25444, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25444
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 06:35 UTC
- **Last Updated**: August 02, 2024 at 11:18 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin allows Using Malicious Files.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.7.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**JS Help Desk - JS Help Desk – Best Help Desk & Support Plugin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-best-help-desk-support-plugin-plugin-2-7-7-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1797, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1797
- **State**: PUBLISHED
- **Published Date**: June 01, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 01, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The design of Advanced Encryption Standard (AES), aka Rijndael, allows remote attackers to recover AES keys via timing attacks on S-box lookups, which are difficult to perform in constant time in AES implementations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13785](http://www.securityfocus.com/bid/13785)
2. [](http://cr.yp.to/antiforgery/cachetiming-20050414.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12854, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12854
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 09:18 UTC
- **Last Updated**: January 08, 2025 at 13:56 UTC
- **Reserved Date**: December 20, 2024 at 15:57 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Garden Gnome Package plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the functionality that automatically extracts 'ggpkg' files that have been uploaded in all versions up to, and including, 2.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**ggnomes - Garden Gnome Package**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcfc8f1-e962-4ad7-8a9d-89ce5c9022b6?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215986%40garden-gnome-package&new=3215986%40garden-gnome-package&sfp_email=&sfph_mail=)
### Credits
- Lucio Sá
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2813, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2813
- **State**: PUBLISHED
- **Published Date**: April 01, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: April 01, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XML external entity (XXE) vulnerability in SAP Mobile Platform allows remote attackers to send requests to intranet servers via crafted XML, aka SAP Security Note 2125358.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150623 ERPSCAN Research Advisory [ERPSCAN-15-005] SAP Mobile Platform - XXE](http://seclists.org/fulldisclosure/2015/Jun/63)
2. [20150625 [ERPSCAN-15-005] SAP Mobile Platform - XXE](http://www.securityfocus.com/archive/1/535828/100/800/threaded)
3. [73692](http://www.securityfocus.com/bid/73692)
4. [](https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/)
5. [](http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41604, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41604
- **State**: PUBLISHED
- **Published Date**: September 27, 2022 at 02:17 UTC
- **Last Updated**: May 22, 2025 at 13:52 UTC
- **Reserved Date**: September 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.infigo.hr/en/insights/39/elevation-of-privilege-in-zonealarm-extreme-security/)
2. [](https://github.com/Wh04m1001/ZoneAlarmEoP)
3. [](https://www.zonealarm.com/software/extreme-security/release-history)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4462, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4462
- **State**: PUBLISHED
- **Published Date**: February 17, 2011 at 18:31 UTC
- **Last Updated**: August 07, 2024 at 03:43 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:12841](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12841)
2. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
4. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
5. [SUSE-SU-2011:0823](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html)
6. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html)
7. [44954](http://secunia.com/advisories/44954)
8. [RHSA-2011:0880](http://www.redhat.com/support/errata/RHSA-2011-0880.html)
9. [RHSA-2011:0282](http://www.redhat.com/support/errata/RHSA-2011-0282.html)
10. [SSRT100867](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
11. [49198](http://secunia.com/advisories/49198)
12. [SUSE-SA:2011:024](http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html)
13. [HPSBUX02777](http://marc.info/?l=bugtraq&m=133728004526190&w=2)
14. [oval:org.mitre.oval:def:14039](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14039)
15. [SSRT100854](http://marc.info/?l=bugtraq&m=133728004526190&w=2)
16. [HPSBMU02797](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1502, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1502
- **State**: PUBLISHED
- **Published Date**: May 07, 2011 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 16:27 UTC
- **Reserved Date**: March 21, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote authenticated users to read arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://issues.liferay.com/browse/LPS-14927)
2. [[oss-security] 20110408 Re: CVE requests : Liferay 6.0.6](http://openwall.com/lists/oss-security/2011/04/08/5)
3. [[oss-security] 20110411 Re: CVE requests : Liferay 6.0.6](http://openwall.com/lists/oss-security/2011/04/11/9)
4. [[oss-security] 20110329 CVE requests : Liferay 6.0.6](http://openwall.com/lists/oss-security/2011/03/29/1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-37748, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-37748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37748
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 12:55 UTC
- **Last Updated**: May 26, 2025 at 05:20 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group
Currently, mtk_iommu calls during probe iommu_device_register before
the hw_list from driver data is initialized. Since iommu probing issue
fix, it leads to NULL pointer dereference in mtk_iommu_device_group when
hw_list is accessed with list_first_entry (not null safe).
So, change the call order to ensure iommu_device_register is called
after the driver data are initialized.
### Affected Products
**Linux - Linux**
Affected versions:
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
- 9e3a2a64365318a743e3c0b028952d2cdbaf2b0c (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2f75cb27bef43c8692b0f5e471e5632f6a9beb99)
2. [](https://git.kernel.org/stable/c/6abd09bed43b8d83d461e0fb5b9a200a06aa8a27)
3. [](https://git.kernel.org/stable/c/a0842539e8ef9386c070156103aff888e558a60c)
4. [](https://git.kernel.org/stable/c/ce7d3b2f6f393fa35f0ea12861b83a1ca28b295c)
5. [](https://git.kernel.org/stable/c/69f9d2d37d1207c5a73dac52a4ce1361ead707f5)
6. [](https://git.kernel.org/stable/c/38e8844005e6068f336a3ad45451a562a0040ca1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14443, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14443
- **State**: PUBLISHED
- **Published Date**: June 18, 2020 at 17:26 UTC
- **Last Updated**: August 04, 2024 at 12:46 UTC
- **Reserved Date**: June 18, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in accountancy/customer/card.php in Dolibarr 11.0.3 allows remote authenticated users to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Dolibarr/dolibarr/commit/40e16672e3aa4e9208ea7a4829f30507dcdfc4ba)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-1839, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-1839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1839
- **State**: PUBLISHED
- **Published Date**: July 06, 2020 at 18:29 UTC
- **Last Updated**: August 04, 2024 at 06:53 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
HUAWEI Mate 30 with versions earlier than 10.1.0.150(C00E136R5P3) have a race condition vulnerability. There is a timing window exists in which certain pointer members can be modified by another process that is operating concurrently, an attacker should trick the user into running a crafted application with high privilege, successful exploit could cause code execution.
### Affected Products
**n/a - HUAWEI Mate 30**
Affected versions:
- Versions earlier than 10.1.0.150(C00E136R5P3) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200701-04-smartphone-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4825, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4825
- **State**: PUBLISHED
- **Published Date**: April 01, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 31, 2008 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Multiple buffer overflows in UltraISO 9.3.1.2633, and possibly other versions before 9.3.3.2685, allow user-assisted attackers to execute arbitrary code via a crafted (1) CIF, (2) C2D, or (3) GI file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32415](http://secunia.com/advisories/32415)
2. [](http://www.ezbsystems.com/ultraiso/history.htm)
3. [1021964](http://www.securitytracker.com/id?1021964)
4. [](http://secunia.com/secunia_research/2008-49/)
5. [34325](http://www.securityfocus.com/bid/34325)
6. [ADV-2009-0903](http://www.vupen.com/english/advisories/2009/0903)
7. [20090401 Secunia Research: UltraISO Image Parsing Buffer Overflow Vulnerabilities](http://www.securityfocus.com/archive/1/502323/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1945, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1945
- **State**: PUBLISHED
- **Published Date**: June 05, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in webCal3_detail.asp in WebCal 3.04 allows remote attackers to execute arbitrary SQL commands via the event_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35286](http://secunia.com/advisories/35286)
2. [8857](https://www.exploit-db.com/exploits/8857)
3. [webcal-webcal3detail-sql-injection(50905)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50905)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3167, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3167
- **State**: PUBLISHED
- **Published Date**: June 11, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the Vivotek Motion Jpeg ActiveX control (aka MjpegControl) in MjpegDecoder.dll 2.0.0.13 allows remote attackers to execute arbitrary code via a long PtzUrl property value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vivotek-jpegcontrol-bo(34615)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34615)
2. [39230](http://osvdb.org/39230)
3. [4015](https://www.exploit-db.com/exploits/4015)
4. [24245](http://www.securityfocus.com/bid/24245)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-2059, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-2059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2059
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-6007, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-6007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6007
- **State**: PUBLISHED
- **Published Date**: November 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
save_profile.asp in WebEvents (Online Event Registration Template) 2.0 and earlier allows remote attackers to change the profiles, passwords, and other information for arbitrary users via a modified UserID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1888](http://securityreason.com/securityalert/1888)
2. [20061112 Online Event Registration <= v2.0 (save_profile.asp) Remote User Pass Change Exploit](http://www.securityfocus.com/archive/1/451411/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-2528, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-2528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2528
- **State**: PUBLISHED
- **Published Date**: March 16, 2024 at 19:31 UTC
- **Last Updated**: August 27, 2024 at 20:09 UTC
- **Reserved Date**: March 15, 2024 at 16:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/update-rooms.php. The manipulation of the argument room_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256965 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**MAGESH-K21 - Online-College-Event-Hall-Reservation-System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-256965 | MAGESH-K21 Online-College-Event-Hall-Reservation-System update-rooms.php sql injection](https://vuldb.com/?id.256965)
2. [VDB-256965 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256965)
3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md)
### Credits
- Joshua Lictan
- nochizplz (VulDB User)
- nochizplz (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-7139, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-7139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7139
- **State**: PUBLISHED
- **Published Date**: April 10, 2019 at 17:07 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An unauthenticated user can execute SQL statements that allow arbitrary read access to the underlying database, which causes sensitive data leakage. This issue is fixed in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
### Affected Products
**Magento - Magento Open Source**
Affected versions:
- prior to 1.9.4.1 (Status: affected)
**Magento - Magento Commerce**
Affected versions:
- prior to 1.14.4.1 (Status: affected)
**Magento - Magento**
Affected versions:
- prior to 2.1.17 (Status: affected)
- prior to 2.2.8 (Status: affected)
- prior to 2.3.1 (Status: affected)
### References
1. [](https://www.ambionics.io/blog/magento-sqli)
2. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26063, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26063
- **State**: REJECTED
- **Published Date**: January 19, 2022 at 03:27 UTC
- **Last Updated**: January 19, 2022 at 03:27 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: Joomla
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-49234, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-49234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49234
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:55 UTC
- **Last Updated**: May 04, 2025 at 08:33 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: Avoid cross-chip syncing of VLAN filtering
Changes to VLAN filtering are not applicable to cross-chip
notifications.
On a system like this:
.-----. .-----. .-----.
| sw1 +---+ sw2 +---+ sw3 |
'-1-2-' '-1-2-' '-1-2-'
Before this change, upon sw1p1 leaving a bridge, a call to
dsa_port_vlan_filtering would also be made to sw2p1 and sw3p1.
In this scenario:
.---------. .-----. .-----.
| sw1 +---+ sw2 +---+ sw3 |
'-1-2-3-4-' '-1-2-' '-1-2-'
When sw1p4 would leave a bridge, dsa_port_vlan_filtering would be
called for sw2 and sw3 with a non-existing port - leading to array
out-of-bounds accesses and crashes on mv88e6xxx.
### Affected Products
**Linux - Linux**
Affected versions:
- d371b7c92d190448f3ccbf082c90bf929285f648 (Status: affected)
- d371b7c92d190448f3ccbf082c90bf929285f648 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.2 (Status: affected)
- 0 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e1f2a4dd8d433eec393d09273a78a3d3551339cf)
2. [](https://git.kernel.org/stable/c/108dc8741c203e9d6ce4e973367f1bac20c7192b)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-11228, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-11228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11228
- **State**: PUBLISHED
- **Published Date**: April 13, 2019 at 15:07 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3)
2. [](https://github.com/go-gitea/gitea/releases/tag/v1.7.6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-34704, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-34704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34704
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 19:34 UTC
- **Reserved Date**: June 27, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Defender Credential Guard Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [Windows Defender Credential Guard Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18876, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18876
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 16:50 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2 when local storage for files is used. A System Admin can test for the existence of an arbitrary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mattermost.com/security-updates/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-13386, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-13386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13386
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 12:29 UTC
- **Last Updated**: August 04, 2024 at 12:18 UTC
- **Reserved Date**: May 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SmartDraw 2020 27.0.0.0, the installer gives inherited write permissions to the Authenticated Users group on the SmartDraw 2020 installation folder. Additionally, when the product is installed, two scheduled tasks are created on the machine, SDMsgUpdate (Local) and SDMsgUpdate (TE). The scheduled tasks run in the context of the user who installed the product. Both scheduled tasks attempt to run the same binary, C:\SmartDraw 2020\Messages\SDNotify.exe. The folder Messages doesn't exist by default and (by extension) neither does SDNotify.exe. Due to the weak folder permissions, these can be created by any user. A malicious actor can therefore create a malicious SDNotify.exe binary, and have it automatically run, whenever the user who installed the product logs on to the machine. The malicious SDNotify.exe could, for example, create a new local administrator account on the machine.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://improsec.com/tech-blog/how-not-do-handle-responsible-disclosure-smartdraw-2020)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7926, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7926
- **State**: PUBLISHED
- **Published Date**: August 25, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Cross-Site Request Forgery issue was discovered in OSIsoft PI Web API versions prior to 2017 (1.9.0). The vulnerability allows cross-site request forgery (CSRF) attacks to occur when an otherwise-unauthorized cross-site request is sent from a browser the server has previously authenticated.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - OSIsoft PI Web API 2017**
Affected versions:
- OSIsoft PI Web API 2017 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-164-03)
2. [99058](http://www.securityfocus.com/bid/99058)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-6818, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-6818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6818
- **State**: PUBLISHED
- **Published Date**: June 01, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:42 UTC
- **Reserved Date**: June 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mole Group Real Estate Script 1.1 and earlier stores passwords in cleartext, which allows context-dependent attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [realestatescript-password-plaintext(43645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43645)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3804, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3804 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3804
- **State**: PUBLISHED
- **Published Date**: March 25, 2020 at 17:28 UTC
- **Last Updated**: August 04, 2024 at 07:44 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- , 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb20-13.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2846, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2846
- **State**: PUBLISHED
- **Published Date**: March 16, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: March 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Siemens SIMATIC S7-1200 CPU devices before 4.0 allow remote attackers to bypass a "user program block" protection mechanism via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-833048.pdf)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-075-01)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-833048.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-3978, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-3978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3978
- **State**: PUBLISHED
- **Published Date**: November 19, 2009 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 01:31 UTC
- **Reserved Date**: November 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The nsGIFDecoder2::GifWrite function in decoders/gif/nsGIFDecoder2.cpp in libpr0n in Mozilla Firefox before 3.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an animated GIF file with a large image size, a different vulnerability than CVE-2009-3373.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hg.mozilla.org/releases/mozilla-1.9.1/rev/edf189567edc)
2. [](http://www.mozilla.com/en-US/firefox/3.5.5/releasenotes/)
3. [](http://www.h-online.com/open/news/item/Mozilla-fixes-critical-bugs-with-Firefox-3-5-5-852070.html)
4. [](https://wiki.mozilla.org/Releases/Firefox_3.5.5/Test_Plan)
5. [](https://bugzilla.mozilla.org/show_bug.cgi?id=525326)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-48245, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-48245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48245
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 27, 2025 at 14:31 UTC
- **Reserved Date**: May 19, 2025 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fullworks Quick Contact Form allows Reflected XSS. This issue affects Quick Contact Form : from n/a through 8.2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**fullworks - Quick Contact Form**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/quick-contact-form/vulnerability/wordpress-quick-contact-form-plugin-8-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1557, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1557
- **State**: PUBLISHED
- **Published Date**: March 12, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html)
2. [](http://kb.parallels.com/en/113321)
3. [79769](http://www.osvdb.org/79769)
4. [[oss-security] 20120308 CVE-request: Parallels Plesk Panel admin/plib/api-rpc/Agent.php Unspecified SQL Injection](http://www.openwall.com/lists/oss-security/2012/03/08/3)
5. [](http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216)
6. [plesk-unspec-unauth-access(73628)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73628)
7. [48262](http://secunia.com/advisories/48262)
8. [52267](http://www.securityfocus.com/bid/52267)
9. [](http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216)
10. [](http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html)
11. [1026760](http://www.securitytracker.com/id?1026760)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0515, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0515
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 18:56 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 12, 2024 at 19:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.87. This is due to missing or incorrect nonce validation on the remove_from_compare function. This makes it possible for unauthenticated attackers to remove items from user compare lists via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**wproyal - Royal Elementor Addons and Templates**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a4178271-c09e-4094-a616-5a00d28f39a3?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88)
### Credits
- Francesco Carlucci
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4437, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4437
- **State**: PUBLISHED
- **Published Date**: November 05, 2013 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 04:04 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20131018 Re: CVE request for saltstack minion identity usurpation](http://www.openwall.com/lists/oss-security/2013/10/18/3)
2. [](http://docs.saltstack.com/topics/releases/0.17.1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-5104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-5104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5104
- **State**: REJECTED
- **Published Date**: March 19, 2020 at 14:53 UTC
- **Last Updated**: March 19, 2020 at 14:53 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29835, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29835 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29835
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 19:43 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 27, 2022 at 00:00 UTC
- **Assigned By**: WDC PSIRT
### Vulnerability Description
WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-328: Security Weakness
### Affected Products
**Western Digital - WD Discovery**
Affected versions:
- WD Discovery Desktop App (Status: affected)
**Western Digital - WD Discovery**
Affected versions:
- WD Discovery Desktop App (Status: affected)
### References
1. [](https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-52579, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-52579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52579
- **State**: REJECTED
- **Published Date**: March 02, 2024 at 21:59 UTC
- **Last Updated**: March 04, 2024 at 16:02 UTC
- **Reserved Date**: March 02, 2024 at 21:55 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-42288, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-42288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42288
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 00:47 UTC
- **Last Updated**: August 04, 2024 at 03:30 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hello Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42288)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9594, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9594 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9594
- **State**: PUBLISHED
- **Published Date**: January 15, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: January 15, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the SAP NetWeaver Dispatcher in SAP Kernel 7.00 32-bit and 7.40 64-bit allows remote authenticated users to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the ABAP VM, aka SAP Note 2059734.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62150](http://secunia.com/advisories/62150)
2. [](https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/)
3. [](https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-47570, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-47570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47570
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:12 UTC
- **Last Updated**: May 04, 2025 at 07:13 UTC
- **Reserved Date**: May 24, 2024 at 15:11 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
staging: r8188eu: fix a memory leak in rtw_wx_read32()
Free "ptmp" before returning -EINVAL.
### Affected Products
**Linux - Linux**
Affected versions:
- 2b42bd58b32155a1be4dd78991845dec05aaef9e (Status: affected)
- 2b42bd58b32155a1be4dd78991845dec05aaef9e (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.6 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c8d3775745adacf9784a7a80a82d047051752573)
2. [](https://git.kernel.org/stable/c/be4ea8f383551b9dae11b8dfff1f38b3b5436e9a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-20927, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-20927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20927
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 15:19 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 70.0.23 allows jailshell escape because of incorrect crontab parsing (SEC-382).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/70+Change+Log)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3754, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3754
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9)
2. [](http://source.android.com/security/bulletin/2016-07-01.html)
3. [](https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-2716, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-2716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2716
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 15:50 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 12.3.0-12.4.0 and 14.0.0-14.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - Banking Corporate Lending**
Affected versions:
- 12.3.0-12.4.0 (Status: affected)
- 14.0.0-14.3.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-6634, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-6634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6634
- **State**: PUBLISHED
- **Published Date**: May 22, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Device Manager web interface of Cisco Industrial Ethernet 1000 Series Switches 1.3 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of an affected system. The vulnerability is due to insufficient CSRF protection by the Device Manager web interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link or visit an attacker-controlled website. A successful exploit could allow the attacker to submit arbitrary requests to an affected device via the Device Manager web interface and with the privileges of the user. Cisco Bug IDs: CSCvc88811.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - Cisco Industrial Ethernet 1000 Series Switches**
Affected versions:
- Cisco Industrial Ethernet 1000 Series Switches (Status: affected)
### References
1. [98524](http://www.securityfocus.com/bid/98524)
2. [1038517](http://www.securitytracker.com/id/1038517)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ie1000csrf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-22889, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-22889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22889
- **State**: PUBLISHED
- **Published Date**: March 25, 2021 at 19:40 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Revive Adserver before v5.2.0 is vulnerable to a reflected XSS vulnerability in the `statsBreakdown` parameter of stats.php (and possibly other scripts) due to single quotes not being escaped. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and pressing a certain key combination to execute injected JavaScript code.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - https://github.com/revive-adserver/revive-adserver**
Affected versions:
- Fixed in v5.2.0 (Status: affected)
### References
1. [](https://www.revive-adserver.com/security/revive-sa-2021-003/)
2. [](https://hackerone.com/reports/1097217)
3. [](https://github.com/revive-adserver/revive-adserver/commit/2f868414)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-36792, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-36792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36792
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 16:58 UTC
- **Last Updated**: January 01, 2025 at 02:04 UTC
- **Reserved Date**: June 27, 2023 at 15:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Visual Studio Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Microsoft - Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)**
Affected versions:
- 15.9.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.2**
Affected versions:
- 17.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)**
Affected versions:
- 16.11.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.4**
Affected versions:
- 17.4.0 (Status: affected)
**Microsoft - .NET 6.0**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - .NET 7.0**
Affected versions:
- 7.0.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.6**
Affected versions:
- 17.6.0 (Status: affected)
**Microsoft - PowerShell 7.2**
Affected versions:
- 7.2.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.7**
Affected versions:
- 17.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8**
Affected versions:
- 4.8.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 3.0.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8.1**
Affected versions:
- 4.8.1 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 and 4.6.2**
Affected versions:
- 4.7.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 2.0 Service Pack 2**
Affected versions:
- 2.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.0 Service Pack 2**
Affected versions:
- 3.0.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5**
Affected versions:
- 3.5.0 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5.1**
Affected versions:
- 3.5.0 (Status: affected)
### References
1. [Visual Studio Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-1364, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-1364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1364
- **State**: PUBLISHED
- **Published Date**: October 17, 2007 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aprelium Technologies Abyss Web Server 1.1.2, and possibly other versions before 1.1.4, allows remote attackers to cause a denial of service (crash) via an HTTP GET message with empty (1) Connection or (2) Range fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7287](http://www.securityfocus.com/bid/7287)
2. [20030405 Abyss X1 1.1.2 remote crash](http://archives.neohapsis.com/archives/bugtraq/2003-04/0095.html)
3. [abyss-http-get-dos(11718)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11718)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0657, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0657
- **State**: PUBLISHED
- **Published Date**: February 20, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf)
2. [20081208 [SVRT-07-08] Vulnerability in Face Recognition Authentication Mechanism of Lenovo-Asus-Toshiba Laptops](http://www.securityfocus.com/archive/1/498997)
3. [toshibaface-notebook-unauth-access(48963)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48963)
4. [32700](http://www.securityfocus.com/bid/32700)
5. [](http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen)
6. [](http://security.bkis.vn/?p=292)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-1769, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-1769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1769
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 13, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
QuickTime in Apple OS X before 10.11.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Photoshop file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-03-21-5](http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html)
2. [](https://support.apple.com/HT206167)
3. [39635](https://www.exploit-db.com/exploits/39635/)
4. [1035363](http://www.securitytracker.com/id/1035363)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5737, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5737
- **State**: PUBLISHED
- **Published Date**: December 26, 2008 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Nodstrum MySQL Calendar 1.1 and 1.2 allows remote attackers to execute arbitrary SQL commands via the username parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4815](http://securityreason.com/securityalert/4815)
2. [33266](http://secunia.com/advisories/33266)
3. [7551](https://www.exploit-db.com/exploits/7551)
4. [32978](http://www.securityfocus.com/bid/32978)
5. [50892](http://osvdb.org/50892)
6. [mysqlcalendar-index-sql-injection(47544)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47544)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-4609, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-4609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4609
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16546, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16546
- **State**: PUBLISHED
- **Published Date**: September 05, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:58 UTC
- **Reserved Date**: September 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Amcrest networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation, as demonstrated by Amcrest_IPC-HX1X3X-LEXUS_Eng_N_AMCREST_V2.420.AC01.3.R.20180206.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://seclists.org/bugtraq/2018/Sep/6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-35816, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-35816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35816
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 20:10 UTC
- **Last Updated**: January 02, 2025 at 19:34 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Site Recovery Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Site Recovery VMWare to Azure**
Affected versions:
- 9.0 (Status: affected)
### References
1. [Azure Site Recovery Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35816)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-4091, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-4091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4091
- **State**: PUBLISHED
- **Published Date**: May 11, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:17 UTC
- **Reserved Date**: April 27, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4092.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035828](http://www.securitytracker.com/id/1035828)
2. [90508](http://www.securityfocus.com/bid/90508)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-14.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-34255, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-34255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34255
- **State**: REJECTED
- **Last Updated**: June 05, 2023 at 00:00 UTC
- **Reserved Date**: May 31, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-2390, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-2390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2390
- **State**: PUBLISHED
- **Published Date**: July 09, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the BookFlip (com_bookflip) component 2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the book_id parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35519](http://www.securityfocus.com/bid/35519)
2. [9040](http://www.exploit-db.com/exploits/9040)
3. [35608](http://secunia.com/advisories/35608)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-11779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-11779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11779
- **State**: PUBLISHED
- **Published Date**: July 25, 2019 at 23:23 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Apache - Storm**
Affected versions:
- 1.1.0 to 1.2.2 (Status: affected)
### References
1. [[storm-user] 20190724 [CVE-2018-11779] Apache Storm UI Java deserialization vulnerability](https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98%40%3Cuser.storm.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-49765, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-49765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49765
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 18:29 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in Blaz K. Rate my Post – WP Rating System.This issue affects Rate my Post – WP Rating System: from n/a through 3.4.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Blaz K. - Rate my Post – WP Rating System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Revan Arifio (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-2508, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-2508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2508
- **State**: PUBLISHED
- **Published Date**: May 29, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: May 29, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in news.php in Tr Script News 2.1 allows remote attackers to inject arbitrary web script or HTML via the "nb" parameter in voir mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29388](http://www.securityfocus.com/bid/29388)
2. [](http://www.z0rlu.ownspace.org/index.php?/archives/91-TR-News-v2.1-xss.html)
3. [trscriptnews-news-xss(42648)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42648)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-14081, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-14081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14081
- **State**: PUBLISHED
- **Published Date**: October 09, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices. Device passwords, such as the admin password and the WPA key, are stored in cleartext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.nivel4.com/investigaciones/nuevas-vulnerabilidades-en-router-d-link-permiten-tomar-control-remoto-del-dispositivo/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7514, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7514
- **State**: PUBLISHED
- **Published Date**: July 23, 2020 at 20:46 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in Easergy Builder (Version 1.4.7.2 and older) which could allow an attacker access to the authorization credentials for a device and gain full access.
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**n/a - Easergy Builder (Version 1.4.7.2 and older)**
Affected versions:
- Easergy Builder (Version 1.4.7.2 and older) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-161-05)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3436, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3436
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:14 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - One-to-One Fulfillment**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95569](http://www.securityfocus.com/bid/95569)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-2474, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-2474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2474
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:49 UTC
- **Last Updated**: September 25, 2024 at 19:39 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Web Analytics product of Oracle E-Business Suite (component: Admin). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Web Analytics. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Web Analytics accessible data as well as unauthorized access to critical data or complete access to all Oracle Web Analytics accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Web Analytics**
Affected versions:
- 12.1.1-12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6556, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6556
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 18:35 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: August 03, 2016 at 00:00 UTC
- **Assigned By**: rapid7
### Vulnerability Description
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This issue was fixed in version 18.0.2, released on September 20, 2016.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OpenNMS - OpenNMS**
Affected versions:
- 18.0.1 (Status: affected)
### References
1. [](https://www.rapid7.com/blog/post/2016/11/15/r7-2016-24-opennms-stored-xss-via-snmp-cve-2016-6555-cve-2016-6556/)
2. [](https://github.com/OpenNMS/opennms/pull/1019)
### Credits
- This issue was discovered by Matthew Kienow and disclosure was coordinated by Rapid7.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5847, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5847
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 05, 2012 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1965, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1965
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 01:00 UTC
- **Last Updated**: March 05, 2025 at 14:49 UTC
- **Reserved Date**: March 04, 2025 at 16:33 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in projectworlds Online Hotel Booking 1.0. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument emailusername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**projectworlds - Online Hotel Booking**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-298566 | projectworlds Online Hotel Booking login.php sql injection](https://vuldb.com/?id.298566)
2. [VDB-298566 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298566)
3. [Submit #511473 | Projectworlds Online Hotel Booking In PHP v1.0 SQL Injection](https://vuldb.com/?submit.511473)
4. [](https://github.com/ubfbuz3/cve/issues/4)
### Credits
- lql120 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-42772, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-42772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42772
- **State**: PUBLISHED
- **Published Date**: November 03, 2021 at 19:13 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote GetDumpFile command that could allow a user to attempt various attacks. In non-secure mode, the user is unauthenticated
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.broadcom.com/doc/elx_HBAManager-Lin-RN12811-101.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-37219, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-37219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37219
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 09:23 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PBN Hosting SL Page Builder Sandwich – Front-End Page Builder allows Stored XSS.This issue affects Page Builder Sandwich – Front-End Page Builder: from n/a through 5.1.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PBN Hosting SL - Page Builder Sandwich – Front-End Page Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/page-builder-sandwich/wordpress-page-builder-sandwich-plugin-5-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Savphill (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0927, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0927
- **State**: PUBLISHED
- **Published Date**: April 10, 2013 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome OS before 26.0.1410.57 relies on a Pango pango-utils.c read_config implementation that loads the contents of the .pangorc file in the user's home directory, and the file referenced by the PANGO_RC_FILE environment variable, which allows attackers to bypass intended access restrictions via crafted configuration data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2013/04/chrome-os-stable-channel-update.html)
2. [](https://code.google.com/p/chromium/issues/detail?id=189250)
3. [](http://git.chromium.org/gitweb/?p=chromiumos/overlays/chromiumos-overlay.git%3Ba=commit%3Bh=fb5a664def6cd34bf7295489ea73e1d989bdd6d0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4805, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4805
- **State**: PUBLISHED
- **Published Date**: May 12, 2024 at 23:00 UTC
- **Last Updated**: August 01, 2024 at 20:55 UTC
- **Reserved Date**: May 12, 2024 at 05:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Kashipara College Management System 1.0. This affects an unknown part of the file edit_faculty.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263925 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Kashipara - College Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263925 | Kashipara College Management System edit_faculty.php sql injection](https://vuldb.com/?id.263925)
2. [VDB-263925 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263925)
3. [Submit #332556 | Kashipara College Management System ≤1.0 SQL Injection](https://vuldb.com/?submit.332556)
4. [](https://github.com/E1CHO/cve_hub/blob/main/College%20Management%20System/College%20Management%20System%20-%20vuln%208.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5529, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5529
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 08:35 UTC
- **Last Updated**: October 15, 2024 at 18:35 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
### Affected Products
**HtmlUnit Project - HtmlUnit**
Affected versions:
- prior to 2.37.0 (Status: affected)
### References
1. [](https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0)
2. [](https://jvn.jp/en/jp/JVN34535327/)
3. [[camel-commits] 20200520 [camel] branch camel-2.25.x updated: Updating htmlunit due to CVE-2020-5529](https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563%40%3Ccommits.camel.apache.org%3E)
4. [[debian-lts-announce] 20200815 [SECURITY] [DLA 2326-1] htmlunit security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html)
5. [USN-4584-1](https://usn.ubuntu.com/4584-1/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10953, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10953
- **State**: PUBLISHED
- **Published Date**: March 27, 2020 at 18:52 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In GitLab EE 11.7 through 12.9, the NPM feature is vulnerable to a path traversal issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/releases/categories/releases/)
2. [](https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-1006, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-1006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1006
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 27, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in BBC Education Text to Speech Internet Enhancer (Betsie) 1.5.11 and earlier allows remote attackers to execute arbitrary web script via parserl.pl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.bbc.co.uk/education/betsie/parser.pl.txt)
2. [20020701 PTL-2002-03 Betsie XSS Vuln](http://archives.neohapsis.com/archives/bugtraq/2002-07/0002.html)
3. [betsie-parserl-xss(9468)](http://www.iss.net/security_center/static/9468.php)
4. [5135](http://www.securityfocus.com/bid/5135)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0535, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0535
- **State**: PUBLISHED
- **Published Date**: May 22, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 31, 2008 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device instability) via "SSH credentials that attempt to change the authentication method," aka Bug ID CSCsm14239.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30316](http://secunia.com/advisories/30316)
2. [ADV-2008-1774](http://www.vupen.com/english/advisories/2008/1774/references)
3. [30590](http://secunia.com/advisories/30590)
4. [29609](http://www.securityfocus.com/bid/29609)
5. [VU#626979](http://www.kb.cert.org/vuls/id/626979)
6. [](http://www.icon-labs.com/news/read.asp?newsID=77)
7. [20080521 Cisco Service Control Engine Denial of Service Vulnerabilities](http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml)
8. [1020074](http://securitytracker.com/id?1020074)
9. [29316](http://www.securityfocus.com/bid/29316)
10. [cisco-sce-ssh-credentials-dos(42567)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42567)
11. [ADV-2008-1604](http://www.vupen.com/english/advisories/2008/1604/references)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-48714, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-48714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48714
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 00:00 UTC
- **Last Updated**: October 16, 2024 at 17:02 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sezangel/IOT-vul/tree/main/TPlink/TL-WDR7660/2)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.