System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-0449, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-0449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0449
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 16:13 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117965
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-03-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1000166, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1000166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000166
- **State**: REJECTED
- **Published Date**: May 01, 2018 at 12:00 UTC
- **Last Updated**: May 01, 2018 at 11:57 UTC
- **Reserved Date**: April 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-35224, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-35224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35224
- **State**: PUBLISHED
- **Published Date**: May 23, 2024 at 12:53 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 14, 2024 at 15:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OpenProject is the leading open source project management software. OpenProject utilizes `tablesorter` inside of the Cost Report feature. This dependency, when misconfigured, can lead to Stored XSS via `{icon}` substitution in table header values. This attack requires the permissions "Edit work packages" as well as "Add attachments". A project admin could attempt to escalate their privileges by sending this XSS to a System Admin. Otherwise, if a full System Admin is required, then this attack is significantly less impactful. By utilizing a ticket's attachment, you can store javascript in the application itself and bypass the application's CSP policy to achieve Stored XSS. This vulnerability has been patched in version(s) 14.1.0, 14.0.2 and 13.4.2.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**opf - openproject**
Affected versions:
- >= 13.4.0, < 13.4.2 (Status: affected)
- < 14.1.0 (Status: affected)
- >= 14.0.0, < 14.0.2 (Status: affected)
### References
1. [https://github.com/opf/openproject/security/advisories/GHSA-h26c-j8wg-frjc](https://github.com/opf/openproject/security/advisories/GHSA-h26c-j8wg-frjc)
2. [https://community.openproject.org/projects/openproject/work_packages/55198/relations](https://community.openproject.org/projects/openproject/work_packages/55198/relations)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-3958, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-3958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3958
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 04:00 UTC
- **Last Updated**: April 28, 2025 at 21:59 UTC
- **Reserved Date**: April 26, 2025 at 07:03 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in withstars Books-Management-System 1.0. It has been classified as problematic. Affected is an unknown function of the file /book_edit_do.html of the component Book Edit Page. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**withstars - Books-Management-System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306294 | withstars Books-Management-System Book Edit Page book_edit_do.html cross site scripting](https://vuldb.com/?id.306294)
2. [VDB-306294 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306294)
3. [Submit #557146 | https://github.com/withstars/Books-Management-System Books-Management-System 1.0 Stored Cross-Site Scripting](https://vuldb.com/?submit.557146)
4. [](https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/XSS.md)
### Credits
- Caigo (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6838, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6838
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:09 UTC
- **Last Updated**: March 20, 2025 at 14:25 UTC
- **Reserved Date**: July 17, 2024 at 17:37 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment name. This can cause the MLflow UI panel to become unresponsive, leading to a potential denial of service. Additionally, there is no character limit in the `artifact_location` parameter while creating the experiment.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**mlflow - mlflow/mlflow**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/8ad52cb2-2cda-4eb0-aec9-586060ee43e0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-36268, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-36268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36268
- **State**: REJECTED
- **Published Date**: April 30, 2024 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 08:51 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: Document Fdn.
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-1293, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-1293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1293
- **State**: PUBLISHED
- **Published Date**: January 16, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Management Center in Cisco FireSIGHT System Software 6.0.0 and 6.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCux40414.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034689](http://www.securitytracker.com/id/1034689)
2. [20160115 Cisco FireSIGHT Management Center Stored Cross-Site Scripting Vulnerabilities](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160115-FireSIGHT)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-13744, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-13744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13744
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for Crowdnext (CNX), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Crowdnext)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-38587, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-38587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38587
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 22:55 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In cPanel before 96.0.13, scripts/fix-cpanel-perl mishandles the creation of temporary files (SEC-586).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.cpanel.net/changelogs/96-change-log/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-3205, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-3205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3205
- **State**: PUBLISHED
- **Published Date**: June 24, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to gain access via modified user_env, pass_env, power_env, and id_env parameters in a cookie, which comprise a persistent logon that does not vary across sessions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt)
2. [1138](http://securityreason.com/securityalert/1138)
3. [20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)](http://www.securityfocus.com/archive/1/437875/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26599, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26599
- **State**: PUBLISHED
- **Published Date**: March 28, 2022 at 00:41 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: February 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://hackerone.com/reports/1081145)
2. [](http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html)
3. [](http://seclists.org/fulldisclosure/2022/Mar/46)
4. [](http://karmainsecurity.com/KIS-2022-04)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3608, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3608
- **State**: PUBLISHED
- **Published Date**: September 08, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#648646](http://www.kb.cert.org/vuls/id/648646)
2. [](http://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf)
3. [](https://www.usenix.org/system/files/conference/woot13/woot13-bonkoski_0.pdf)
4. [62097](http://www.securityfocus.com/bid/62097)
5. [](http://www.thomas-krenn.com/en/wiki/Supermicro_IPMI_Security_Updates_November_2013)
6. [](https://support.citrix.com/article/CTX216642)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-6365, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-6365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6365
- **State**: PUBLISHED
- **Published Date**: December 15, 2007 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 01:25 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in modules/ecal/display.php in the Event Calendar in bcoos 1.0.10 allows remote attackers to inject arbitrary web script or HTML via the month parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the day and year vectors are covered by CVE-2007-6274.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26945](http://secunia.com/advisories/26945)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-28276, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-28276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28276
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:05 UTC
- **Reserved Date**: March 13, 2023 at 22:23 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Group Policy Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Group Policy Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28276)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49806, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49806
- **State**: PUBLISHED
- **Published Date**: November 29, 2024 at 16:53 UTC
- **Last Updated**: November 29, 2024 at 17:09 UTC
- **Reserved Date**: October 20, 2024 at 13:40 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Access Appliance 10.0.0 through 10.0.8
contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**IBM - Security Verify Access**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7177447)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-11641, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-11641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11641
- **State**: PUBLISHED
- **Published Date**: October 15, 2020 at 14:58 UTC
- **Last Updated**: September 17, 2024 at 04:28 UTC
- **Reserved Date**: April 08, 2020 at 00:00 UTC
- **Assigned By**: ABB
### Vulnerability Description
A local file inclusion vulnerability in B&R SiteManager versions <9.2.620236042 allows authenticated users to read sensitive files from SiteManager instances.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**B&R - SiteManager**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.br-automation.com/downloads_br_productcatalogue/assets/1600003183751-de-original-1.0.pdf)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-273-03)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-31506, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-31506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31506
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 00:54 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726)
2. [](https://github.com/cmusatyalab/opendiamond/commit/398049c187ee644beabab44d6fece82251c1ea56)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-12856, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-12856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12856
- **State**: PUBLISHED
- **Published Date**: October 12, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected)
### References
1. [1041809](http://www.securitytracker.com/id/1041809)
2. [105439](http://www.securityfocus.com/bid/105439)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-23261, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-23261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23261
- **State**: PUBLISHED
- **Published Date**: December 02, 2021 at 15:40 UTC
- **Last Updated**: September 17, 2024 at 01:57 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: crafter
### Vulnerability Description
Authenticated administrators may override the system configuration file and cause a denial of service.
### CVSS Metrics
- **CVSS Base Score**: 4.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-703: Security Weakness
### Affected Products
**Crafter Software - Crafter CMS**
Affected versions:
- 3.1 (Status: affected)
### References
1. [](https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120104)
### Credits
- Kai Zhao (ToTU Security Team)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-29207, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-29207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29207
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 16:40 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 19, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An Improper Certificate Validation could allow a malicious actor with access to an adjacent network to take control of the system.
Affected Products:
UniFi Connect Application (Version 3.7.9 and earlier)
UniFi Connect EV Station (Version 1.1.18 and earlier)
UniFi Connect EV Station Pro (Version 1.1.18 and earlier)
UniFi Connect Display (Version 1.9.324 and earlier)
UniFi Connect Display Cast (Version 1.6.225 and earlier)
Mitigation:
Update UniFi Connect Application to Version 3.10.7 or later.
Update UniFi Connect EV Station to Version 1.2.15 or later.
Update UniFi Connect EV Station Pro to Version 1.2.15 or later.
Update UniFi Connect Display to Version 1.11.348 or later.
Update UniFi Connect Display Cast to Version 1.8.255 or later.
### Affected Products
**Ubiquiti Inc - UniFi Connect Application**
Affected versions:
- 3.10.7 (Status: affected)
**Ubiquiti Inc - UniFi Connect EV Station**
Affected versions:
- 1.2.15 (Status: affected)
**Ubiquiti Inc - UniFi Connect EV Station Pro **
Affected versions:
- 1.2.15 (Status: affected)
**Ubiquiti Inc - UniFi Connect Display**
Affected versions:
- 1.11.348 (Status: affected)
**Ubiquiti Inc - UniFi Connect Display Cast**
Affected versions:
- 1.8.255 (Status: affected)
### References
1. [](https://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-16017, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-16017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16017
- **State**: PUBLISHED
- **Published Date**: September 23, 2020 at 00:26 UTC
- **Last Updated**: November 13, 2024 at 18:04 UTC
- **Reserved Date**: September 06, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Operations, Administration, Maintenance and Provisioning (OAMP) OpsConsole Server for Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to execute Insecure Direct Object Reference actions on specific pages within the OAMP application. The vulnerability is due to insufficient input validation on specific pages of the OAMP application. An attacker could exploit this vulnerability by authenticating to Cisco Unified CVP and sending crafted HTTP requests. A successful exploit could allow an attacker with administrator or read-only privileges to learn information outside of their expected scope. An attacker with administrator privileges could modify certain configuration details of resources outside of their defined scope, which could result in a denial of service (DoS) condition.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Cisco - Cisco Unified Customer Voice Portal (CVP)**
Affected versions:
- n/a (Status: affected)
### References
1. [20200108 Cisco Unified Customer Voice Portal Insecure Direct Object Reference Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-cvp-direct-obj-ref)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-52083, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-52083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52083
- **State**: PUBLISHED
- **Published Date**: December 28, 2023 at 22:11 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 17:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Winter is a free, open-source content management system. Prior to 1.2.4, users with the `media.manage_media` permission can upload files to the Media Manager and rename them after uploading. Previously, media manager files were only sanitized on upload, not on renaming, which could have allowed a stored XSS attack. This issue has been patched in v1.2.4.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wintercms - winter**
Affected versions:
- < 1.2.4 (Status: affected)
### References
1. [https://github.com/wintercms/winter/security/advisories/GHSA-4wvw-75qh-fqjp](https://github.com/wintercms/winter/security/advisories/GHSA-4wvw-75qh-fqjp)
2. [https://github.com/wintercms/winter/commit/2969daeea8dee64d292dbaa3778ea251e2a7e491](https://github.com/wintercms/winter/commit/2969daeea8dee64d292dbaa3778ea251e2a7e491)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1238, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1238
- **State**: PUBLISHED
- **Published Date**: March 15, 2006 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in DSLogin 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands and bypass authentication via the $log_userid variable in (1) index.php and (2) admin/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0953](http://www.vupen.com/english/advisories/2006/0953)
2. [1015754](http://securitytracker.com/id?1015754)
3. [17262](http://www.securityfocus.com/bid/17262)
4. [23896](http://www.osvdb.org/23896)
5. [20060327 [eVuln] DSLogin Authentication Bypass Vulnerability](http://www.securityfocus.com/archive/1/428902/100/0/threaded)
6. [637](http://securityreason.com/securityalert/637)
7. [](http://evuln.com/vulns/100/summary.html)
8. [dslogin-index-sql-injection(25194)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25194)
9. [19201](http://secunia.com/advisories/19201)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-5717, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-5717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5717
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:05 UTC
- **Last Updated**: November 26, 2024 at 15:57 UTC
- **Reserved Date**: June 06, 2024 at 23:09 UTC
- **Assigned By**: zdi
### Vulnerability Description
Logsign Unified SecOps Platform Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24165.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Logsign - Unified SecOps Platform**
Affected versions:
- 6.4.6 (Status: affected)
### References
1. [ZDI-24-617](https://www.zerodayinitiative.com/advisories/ZDI-24-617/)
2. [vendor-provided URL](https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-1635, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-1635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1635
- **State**: PUBLISHED
- **Published Date**: March 06, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 07, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.php.net/?p=php-src.git%3Ba=blob%3Bf=NEWS%3Bh=82afa3a040e639f3595121e45b850d5453906a00%3Bhb=refs/heads/PHP-5.3)
2. [](https://bugs.gentoo.org/show_bug.cgi?id=459904)
3. [MDVSA-2013:114](http://www.mandriva.com/security/advisories?name=MDVSA-2013:114)
4. [APPLE-SA-2013-09-12-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html)
5. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=918196)
7. [DSA-2639](http://www.debian.org/security/2013/dsa-2639)
8. [SUSE-SU-2013:1315](http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html)
9. [SUSE-SU-2013:1285](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html)
10. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0101)
11. [](http://support.apple.com/kb/HT5880)
12. [](http://git.php.net/?p=php-src.git%3Ba=blob%3Bf=NEWS%3Bh=36f6f9a4396d3034cc903a4271e7fdeccc5d3ea6%3Bhb=refs/heads/PHP-5.4)
13. [](http://git.php.net/?p=php-src.git%3Ba=commitdiff%3Bh=702b436ef470cc02f8e2cc21f2fadeee42103c74)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-0306, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-0306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0306
- **State**: PUBLISHED
- **Published Date**: June 12, 2019 at 14:21 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP HANA Extended Application Services (advanced model), version 1, allows authenticated low privileged XS Advanced Platform users such as SpaceAuditors to execute requests to obtain a complete list of SAP HANA user IDs and names.
### Affected Products
**SAP SE - SAP HANA Extended Application Services (advanced model)**
Affected versions:
- < 1.0 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2771128)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-4358, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-4358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4358
- **State**: PUBLISHED
- **Published Date**: August 15, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 15, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoidcom 0.6.7 and earlier allows remote attackers to cause a denial of service (application crash) via a JOIN packet (aka connection packet) containing 0x69 in the ninth byte, which triggers a "double-delete" of trace data, a different vulnerability than CVE-2005-1643.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26451](http://secunia.com/advisories/26451)
2. [20070814 Crash in Zoidcom 0.6.7](http://www.securityfocus.com/archive/1/476523/100/0/threaded)
3. [3014](http://securityreason.com/securityalert/3014)
4. [zoidcom-zcomprocessinput-dos(36018)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36018)
5. [](http://aluigi.altervista.org/adv/zoidboom2-adv.txt)
6. [](http://aluigi.org/poc/zoidboom2.zip)
7. [25326](http://www.securityfocus.com/bid/25326)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43860, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43860
- **State**: PUBLISHED
- **Published Date**: January 12, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 04:10 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**flatpak - flatpak**
Affected versions:
- >= 1.11.0, < 1.12.3 (Status: affected)
- < 1.10.6 (Status: affected)
### References
1. [](https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j)
2. [](https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da)
3. [](https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042)
4. [](https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451)
5. [](https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e)
6. [](https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee)
7. [](https://github.com/flatpak/flatpak/releases/tag/1.10.6)
8. [](https://github.com/flatpak/flatpak/releases/tag/1.12.3)
9. [FEDORA-2022-825ca6bf2b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APFTBYGJJVJPFVHRXUW5PII5XOAFI4KH/)
10. [DSA-5049](https://www.debian.org/security/2022/dsa-5049)
11. [GLSA-202312-12](https://security.gentoo.org/glsa/202312-12)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-0677, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-0677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0677
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 18:23 UTC
- **Last Updated**: May 29, 2025 at 06:08 UTC
- **Reserved Date**: January 23, 2025 at 16:24 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 1:2.06-104.el9_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 10**
**Red Hat - Red Hat Enterprise Linux 7**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat OpenShift Container Platform 4**
### References
1. [RHSA-2025:6990](https://access.redhat.com/errata/RHSA-2025:6990)
2. [](https://access.redhat.com/security/cve/CVE-2025-0677)
3. [RHBZ#2346116](https://bugzilla.redhat.com/show_bug.cgi?id=2346116)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-4755, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-4755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4755
- **State**: PUBLISHED
- **Published Date**: September 06, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:17 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in SciTools Understand before 2.6 build 600 allows local users to gain privileges via a Trojan horse wintab32.dll file in the current working directory, as demonstrated by a directory that contains a .udb file. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47921](http://secunia.com/advisories/47921)
2. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php)
3. [](http://www.scitools.com/support/buildLogs/understand26_build_log.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-5266, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-5266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5266
- **State**: PUBLISHED
- **Published Date**: January 08, 2018 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 05:33 UTC
- **Reserved Date**: January 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30577, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30577
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 13:47 UTC
- **Last Updated**: March 25, 2025 at 18:21 UTC
- **Reserved Date**: March 24, 2025 at 13:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in mendibass Browser Address Bar Color allows Stored XSS. This issue affects Browser Address Bar Color: from n/a through 3.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**mendibass - Browser Address Bar Color**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/browser-address-bar-color/vulnerability/wordpress-browser-address-bar-color-plugin-3-3-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21637
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 05:49 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: December 29, 2023 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Authentik is an open-source Identity Provider. Authentik is a vulnerable to a reflected Cross-Site Scripting vulnerability via JavaScript-URIs in OpenID Connect flows with `response_mode=form_post`. This relatively user could use the described attacks to perform a privilege escalation. This vulnerability has been patched in versions 2023.10.6 and 2023.8.6.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**goauthentik - authentik**
Affected versions:
- <= 2023.10.5 (Status: affected)
- <= 2023.8.5 (Status: affected)
### References
1. [https://github.com/goauthentik/authentik/security/advisories/GHSA-rjpr-7w8c-gv3j](https://github.com/goauthentik/authentik/security/advisories/GHSA-rjpr-7w8c-gv3j)
2. [https://github.com/goauthentik/authentik/releases/tag/version%2F2023.10.6](https://github.com/goauthentik/authentik/releases/tag/version%2F2023.10.6)
3. [https://github.com/goauthentik/authentik/releases/tag/version%2F2023.8.6](https://github.com/goauthentik/authentik/releases/tag/version%2F2023.8.6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3250, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3250
- **State**: PUBLISHED
- **Published Date**: October 17, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Solaris 10 allows local users to cause a denial of service (panic) via unknown vectors related to the "/proc" filesystem, which trigger a null dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101987](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101987-1)
2. [1015062](http://securitytracker.com/id?1015062)
3. [15115](http://www.securityfocus.com/bid/15115)
4. [20069](http://www.osvdb.org/20069)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-8736, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-8736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8736
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An input validation issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. An attacker in a privileged network position may be able to leak sensitive user information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210634)
2. [](https://support.apple.com/en-us/HT210722)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36960, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36960
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 11:23 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows SMB Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36960)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12981, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12981
- **State**: PUBLISHED
- **Published Date**: August 21, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NexusPHP 1.5.beta5.20120707 has SQL Injection in forummanage.php via the sort parameter in an addforum action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gitsucce/nexusphp/blob/master/nexusphp.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4595, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4595
- **State**: PUBLISHED
- **Published Date**: January 01, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 23:53 UTC
- **Reserved Date**: January 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability (RPATH) in XnView 1.70 and NView 4.51 on Gentoo Linux allows local users to execute arbitrary code via a malicious library in the current working directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.gentoo.org/show_bug.cgi?id=117063)
2. [22093](http://www.osvdb.org/22093)
3. [22094](http://www.osvdb.org/22094)
4. [18235](http://secunia.com/advisories/18235)
5. [xnview-rpath-gain-privileges(23910)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23910)
6. [16087](http://www.securityfocus.com/bid/16087)
7. [18240](http://secunia.com/advisories/18240)
8. [GLSA-200512-18](http://www.gentoo.org/security/en/glsa/glsa-200512-18.xml)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4198, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4198
- **State**: PUBLISHED
- **Published Date**: November 05, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, does not properly handle large text areas, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [FEDORA-2011-0121](http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html)
3. [](http://code.google.com/p/chromium/issues/detail?id=55257)
4. [](http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html)
5. [ADV-2011-0216](http://www.vupen.com/english/advisories/2011/0216)
6. [42109](http://secunia.com/advisories/42109)
7. [43086](http://secunia.com/advisories/43086)
8. [45719](http://www.securityfocus.com/bid/45719)
9. [oval:org.mitre.oval:def:12157](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12157)
10. [RHSA-2011:0177](http://www.redhat.com/support/errata/RHSA-2011-0177.html)
11. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
12. [](https://bugzilla.redhat.com/show_bug.cgi?id=656118)
13. [](https://bugs.webkit.org/show_bug.cgi?id=45611)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20646, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20646
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:12 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628536; Issue ID: ALPS07628536.
### Affected Products
**MediaTek, Inc. - MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/March-2023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4700, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4700
- **State**: PUBLISHED
- **Published Date**: January 25, 2012 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 00:16 UTC
- **Reserved Date**: December 08, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The UberMedia UberSocial (com.twidroid) application 7.x before 7.2.4 for Android does not properly protect data, which allows remote attackers to read or modify Twitter information via a crafted application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2011-4700-vulnerability-in-UberSocial.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39136, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39136
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:47 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V13.3 (All versions >= V13.3.0.7 < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application is vulnerable to fixed-length heap-based buffer while parsing specially crafted TIF files. An attacker could leverage this vulnerability to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V14.1.0.4 (Status: affected)
**Siemens - Teamcenter Visualization V13.2**
Affected versions:
- All versions < V13.2.0.12 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions < V13.3.0.7 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions >= V13.3.0.7 < V13.3.0.8 (Status: affected)
**Siemens - Teamcenter Visualization V14.0**
Affected versions:
- All versions < V14.0.0.3 (Status: affected)
**Siemens - Teamcenter Visualization V14.1**
Affected versions:
- All versions < V14.1.0.4 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-120378.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1660, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1660
- **State**: PUBLISHED
- **Published Date**: April 30, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in help-details.php in CLScript Classifieds Script allows remote attackers to execute arbitrary SQL commands via the hpId parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12423](http://www.exploit-db.com/exploits/12423)
2. [39737](http://www.securityfocus.com/bid/39737)
3. [ADV-2010-1010](http://www.vupen.com/english/advisories/2010/1010)
4. [](http://packetstormsecurity.org/1004-exploits/clscriptclassfieds-sql.txt)
5. [39612](http://secunia.com/advisories/39612)
6. [classifiedsscript-helpdetails-sql-injection(58181)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58181)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21954, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21954
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: February 13, 2025 at 16:40 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u361 (Status: affected)
- Oracle Java SE:8u361-perf (Status: affected)
- Oracle Java SE:11.0.18 (Status: affected)
- Oracle Java SE:17.0.6 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.9 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.5 (Status: affected)
- Oracle GraalVM Enterprise Edition:22.3.1 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html)
2. [](https://www.couchbase.com/alerts/)
3. [](https://security.netapp.com/advisory/ntap-20230427-0008/)
4. [](https://www.debian.org/security/2023/dsa-5430)
5. [](https://www.debian.org/security/2023/dsa-5478)
6. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html)
7. [](https://security.netapp.com/advisory/ntap-20240621-0006/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46490, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46490
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 20:22 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Cacti/cacti/security/advisories/GHSA-f4r3-53jr-654c)
2. [](https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-40324, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-40324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40324
- **State**: PUBLISHED
- **Published Date**: July 25, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/aleksey-vi/CVE-2024-40324)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27128, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27128
- **State**: PUBLISHED
- **Published Date**: April 10, 2022 at 20:24 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An incorrect access control issue at /admin/run_ajax.php in zbzcms v1.0 allows attackers to arbitrarily add administrator accounts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wu610777031/My_CMSHunter/blob/main/zbzcms%20v1.0%20vulnerabilities.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13693, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13693
- **State**: PUBLISHED
- **Published Date**: August 25, 2017 at 07:00 UTC
- **Last Updated**: December 18, 2024 at 17:51 UTC
- **Reserved Date**: August 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchwork.kernel.org/patch/9919053/)
2. [](https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732)
3. [100502](http://www.securityfocus.com/bid/100502)
4. [](https://github.com/acpica/acpica/pull/295)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2421, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2421
- **State**: PUBLISHED
- **Published Date**: October 25, 2022 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 13:40 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: DIVD
### Vulnerability Description
Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Socket.io - Socket.io-Parser**
Affected versions:
- 4.x (Status: affected)
### References
1. [](https://csirt.divd.nl/CVE-2022-2421)
2. [](https://csirt.divd.nl/DIVD-2022-00045)
### Credits
- Thomas Rinsma (Codean)
- Victor Pasman (DIVD)
- Frank Breedijk (DIVD)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24164, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24164
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 13:19 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122373)
2. [](https://support.apple.com/en-us/122374)
3. [](https://support.apple.com/en-us/122375)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3463, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3463
- **State**: REJECTED
- **Published Date**: May 30, 2014 at 10:00 UTC
- **Last Updated**: May 30, 2014 at 08:57 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0972, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0972
- **State**: PUBLISHED
- **Published Date**: March 16, 2010 at 18:26 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38925](http://secunia.com/advisories/38925)
2. [11738](http://www.exploit-db.com/exploits/11738)
3. [gcalendar-index-file-include(56863)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56863)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10917, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10917
- **State**: PUBLISHED
- **Published Date**: August 22, 2019 at 12:18 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The search-everything plugin before 8.1.6 for WordPress has SQL injection related to empty search strings, a different vulnerability than CVE-2014-2316.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/search-everything/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0779
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Denial of service in HP-UX SharedX recserv program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX9810-086](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9810-086)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-26159, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-26159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26159
- **State**: PUBLISHED
- **Published Date**: April 22, 2025 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 20:43 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nasirkhan/laravel-starter)
2. [](https://godbadtry.github.io/posts/CVE-2025-26159/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1053, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1053
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdLogin.pm in AdCycle 1.15 and earlier allows remote attackers to bypass authentication and gain privileges by injecting SQL code in the $password argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010713 AdCycle SQL Command Insertion Vulnerability - qDefense Advisory Number QDAV-2001-7-2](http://archives.neohapsis.com/archives/bugtraq/2001-07/0249.html)
2. [](http://www.adcycle.com/cgi-bin/download.cgi?type=UNIX&version=1.17)
3. [3032](http://www.securityfocus.com/bid/3032)
4. [adcycle-insert-sql-command(6837)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6837)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14156, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14156
- **State**: PUBLISHED
- **Published Date**: September 05, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://marc.info/?l=linux-kernel&m=150453196710422&w=2)
2. [USN-3583-2](https://usn.ubuntu.com/3583-2/)
3. [DSA-3981](http://www.debian.org/security/2017/dsa-3981)
4. [](https://github.com/torvalds/linux/pull/441)
5. [USN-3583-1](https://usn.ubuntu.com/3583-1/)
6. [100634](http://www.securityfocus.com/bid/100634)
7. [](https://marc.info/?l=linux-kernel&m=150401461613306&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-19349, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-19349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19349
- **State**: PUBLISHED
- **Published Date**: November 17, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SeaCMS v6.64, there is SQL injection via the admin_makehtml.php topic parameter because of mishandling in include/mkhtml.func.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Xmansec/seacms_vul/blob/master/SQL/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11281, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11281
- **State**: PUBLISHED
- **Published Date**: December 25, 2024 at 06:42 UTC
- **Last Updated**: December 26, 2024 at 19:56 UTC
- **Reserved Date**: November 15, 2024 at 19:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Webkul - WooCommerce Point of Sale**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0671b1-1414-4315-8a2d-bd1aabe091a4?source=cve)
2. [](https://codecanyon.net/item/wordpress-woocommerce-pos-system-point-of-sale/21254976)
### Credits
- Tonn
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41355, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41355
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 05:55 UTC
- **Last Updated**: October 14, 2024 at 04:02 UTC
- **Reserved Date**: August 29, 2023 at 00:14 UTC
- **Assigned By**: twcert
### Vulnerability Description
Chunghwa Telecom NOKIA G-040W-Q Firewall function has a vulnerability of input validation for ICMP redirect messages. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted package to modify the network routing table, resulting in a denial of service or sensitive information leaking.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-940: Code Injection
### Affected Products
**Chunghwa Telecom - NOKIA G-040W-Q**
Affected versions:
- G040WQR201207 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7505-a0c94-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20925
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: March 13, 2025 at 18:40 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u391 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.12 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.8 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-23969, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-23969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23969
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 14:17 UTC
- **Reserved Date**: January 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://groups.google.com/forum/#%21forum/django-announce)
2. [](https://docs.djangoproject.com/en/4.1/releases/security/)
3. [](https://www.djangoproject.com/weblog/2023/feb/01/security-releases/)
4. [[debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update](https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html)
5. [](https://security.netapp.com/advisory/ntap-20230302-0007/)
6. [FEDORA-2023-8fed428c5e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/)
7. [FEDORA-2023-a53ab7c969](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37672, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37672
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 22:20 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples. We have patched the issue in GitHub commit a4e138660270e7599793fa438cd7b2fc2ce215a6. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7)
2. [](https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-42319, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-42319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42319
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 09:09 UTC
- **Last Updated**: May 04, 2025 at 09:26 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()
When mtk-cmdq unbinds, a WARN_ON message with condition
pm_runtime_get_sync() < 0 occurs.
According to the call tracei below:
cmdq_mbox_shutdown
mbox_free_channel
mbox_controller_unregister
__devm_mbox_controller_unregister
...
The root cause can be deduced to be calling pm_runtime_get_sync() after
calling pm_runtime_disable() as observed below:
1. CMDQ driver uses devm_mbox_controller_register() in cmdq_probe()
to bind the cmdq device to the mbox_controller, so
devm_mbox_controller_unregister() will automatically unregister
the device bound to the mailbox controller when the device-managed
resource is removed. That means devm_mbox_controller_unregister()
and cmdq_mbox_shoutdown() will be called after cmdq_remove().
2. CMDQ driver also uses devm_pm_runtime_enable() in cmdq_probe() after
devm_mbox_controller_register(), so that devm_pm_runtime_disable()
will be called after cmdq_remove(), but before
devm_mbox_controller_unregister().
To fix this problem, cmdq_probe() needs to move
devm_mbox_controller_register() after devm_pm_runtime_enable() to make
devm_pm_runtime_disable() be called after
devm_mbox_controller_unregister().
### Affected Products
**Linux - Linux**
Affected versions:
- 623a6143a845bd485b00ba684f0ccef11835edab (Status: affected)
- 623a6143a845bd485b00ba684f0ccef11835edab (Status: affected)
- 623a6143a845bd485b00ba684f0ccef11835edab (Status: affected)
- 623a6143a845bd485b00ba684f0ccef11835edab (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1403991a40b94438a2acc749bf05c117abdb34f9)
2. [](https://git.kernel.org/stable/c/d00df6700ad10974a7e20646956f4ff22cdbe0ec)
3. [](https://git.kernel.org/stable/c/11fa625b45faf0649118b9deaf2d31c86ac41911)
4. [](https://git.kernel.org/stable/c/a8bd68e4329f9a0ad1b878733e0f80be6a971649)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0284, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0284
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 12:03 UTC
- **Last Updated**: March 27, 2025 at 20:22 UTC
- **Reserved Date**: January 13, 2023 at 09:42 UTC
- **Assigned By**: Tribe29
### Vulnerability Description
Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Tribe29 - Checkmk**
Affected versions:
- 2.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 1.6.0 (Status: affected)
### References
1. [](https://checkmk.com/werk/15181)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9824, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9824
- **State**: PUBLISHED
- **Published Date**: June 03, 2019 at 20:50 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00400.html)
2. [RHSA-2019:1650](https://access.redhat.com/errata/RHSA-2019:1650)
3. [FEDORA-2019-52a8f5468e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVDHJB2QKXNDU7OFXIHIL5O5VN5QCSZL/)
4. [RHSA-2019:2078](https://access.redhat.com/errata/RHSA-2019:2078)
5. [RHSA-2019:2425](https://access.redhat.com/errata/RHSA-2019:2425)
6. [RHSA-2019:2553](https://access.redhat.com/errata/RHSA-2019:2553)
7. [RHSA-2019:3345](https://access.redhat.com/errata/RHSA-2019:3345)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25115, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25115
- **State**: PUBLISHED
- **Published Date**: March 02, 2022 at 22:39 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A remote code execution (RCE) vulnerability in the Avatar parameter under /admin/?page=user/manage_user of Home Owners Collection Management System v1.0 allows attackers to execute arbitrary code via a crafted PNG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0873, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0873
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1660](http://www.securityfocus.com/bid/1660)
2. [aix-clear-netstat(5214)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5214)
3. [20000903 aix allows clearing the interface stats](http://archives.neohapsis.com/archives/bugtraq/2000-08/0454.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-22819, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-22819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22819
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 15:39 UTC
- **Last Updated**: January 10, 2025 at 20:45 UTC
- **Reserved Date**: January 07, 2025 at 21:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 4wpbari Qr Code and Barcode Scanner Reader allows Stored XSS.This issue affects Qr Code and Barcode Scanner Reader: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**4wpbari - Qr Code and Barcode Scanner Reader**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/qr-code-and-barcode-scanner-reader/vulnerability/wordpress-qr-code-and-barcode-scanner-reader-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10816, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10816
- **State**: PUBLISHED
- **Published Date**: August 04, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
SQL injection vulnerability in the MaLion for Windows and Mac 5.0.0 to 5.2.1 allows remote attackers to execute arbitrary SQL commands via Relay Service Server.
### Affected Products
**Intercom, Inc. - MaLion for Windows and Mac**
Affected versions:
- 5.0.0 to 5.2.1 (Status: affected)
### References
1. [](http://www.intercom.co.jp/information/2017/0801.html)
2. [](https://jvn.jp/en/vu/JVNVU91587298/index.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-21855, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-21855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21855
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Exchange Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Exchange Server 2013 Cumulative Update 23**
Affected versions:
- 15.00.0 (Status: affected)
**Microsoft - Microsoft Exchange Server 2016 Cumulative Update 21**
Affected versions:
- 15.01.0 (Status: affected)
**Microsoft - Microsoft Exchange Server 2019 Cumulative Update 10**
Affected versions:
- 15.02.0 (Status: affected)
**Microsoft - Microsoft Exchange Server 2016 Cumulative Update 22**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft Exchange Server 2019 Cumulative Update 11**
Affected versions:
- 15.02.0 (Status: affected)
### References
1. [Microsoft Exchange Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21855)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8575, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8575
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 16:31 UTC
- **Last Updated**: September 09, 2024 at 13:47 UTC
- **Reserved Date**: September 07, 2024 at 17:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified as critical. This issue affects the function setWiFiScheduleCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**TOTOLINK - AC1200 T8**
Affected versions:
- 4.1.5cu.861_B20230220 (Status: affected)
### References
1. [VDB-276809 | TOTOLINK AC1200 T8 cstecgi.cgi setWiFiScheduleCfg buffer overflow](https://vuldb.com/?id.276809)
2. [VDB-276809 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.276809)
3. [Submit #401263 | TOTOLINK AC1200 T8 V4.1.5cu.861_B20230220 Buffer Overflow](https://vuldb.com/?submit.401263)
4. [](https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setWiFiScheduleCfg.md)
5. [](https://www.totolink.net/)
### Credits
- noahze (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8004, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8004
- **State**: PUBLISHED
- **Published Date**: August 29, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 18:29 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
### Affected Products
**Apache Software Foundation - Apache Traffic Server**
Affected versions:
- 6.0.0 to 6.2.2 (Status: affected)
- 7.0.0 to 7.1.3 (Status: affected)
### References
1. [](https://github.com/apache/trafficserver/pull/3201)
2. [](https://github.com/apache/trafficserver/pull/3251)
3. [](https://github.com/apache/trafficserver/pull/3192)
4. [105192](http://www.securityfocus.com/bid/105192)
5. [DSA-4282](https://www.debian.org/security/2018/dsa-4282)
6. [[trafficserver-users] 20180828 [ANNOUNCE] Apache Traffic Server vulnerability with multiple HTTP smuggling and cache poisoning attacks - CVE-2018-8004](https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5%40%3Cusers.trafficserver.apache.org%3E)
7. [](https://github.com/apache/trafficserver/pull/3231)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46591, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46591
- **State**: PUBLISHED
- **Published Date**: December 30, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 15:10 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reject_url parameter in the reject (sub_41BD60) function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://brief-nymphea-813.notion.site/Vul2-TEW755-bof-reject-0ed4829f416d4d2b86a3bce6792cab95)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23868, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23868
- **State**: PUBLISHED
- **Published Date**: March 30, 2022 at 10:14 UTC
- **Last Updated**: August 03, 2024 at 03:51 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RuoYi v4.7.2 contains a CSV injection vulnerability through ruoyi-admin when a victim opens .xlsx log file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/y_project/RuoYi/issues/I4RBBD)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25014, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25014
- **State**: PUBLISHED
- **Published Date**: February 02, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 17:37 UTC
- **Reserved Date**: February 01, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the femanager extension before 5.5.3, 6.x before 6.3.4, and 7.x before 7.1.0 for TYPO3. Missing access checks in the InvitationController allow an unauthenticated user to delete all frontend users.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:L/C:L/I:H/PR:N/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://typo3.org/help/security-advisories)
2. [](https://typo3.org/security/advisory/typo3-ext-sa-2023-001)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-9859, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-9859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9859
- **State**: PUBLISHED
- **Published Date**: June 05, 2020 at 14:40 UTC
- **Last Updated**: January 29, 2025 at 17:39 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211214)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4032, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4032
- **State**: PUBLISHED
- **Published Date**: November 01, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 21, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in HP Insight Control Performance Management before 6.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-2832](http://www.vupen.com/english/advisories/2010/2832)
2. [1024672](http://www.securitytracker.com/id?1024672)
3. [SSRT100317](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02563642)
4. [hp-performance-unspec-csrf(62885)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62885)
5. [HPSBMA02602](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02563642)
6. [44584](http://www.securityfocus.com/bid/44584)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-26058, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-26058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26058
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:52 UTC
- **Last Updated**: October 07, 2024 at 13:35 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1152, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1152
- **State**: REJECTED
- **Published Date**: July 27, 2011 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:37 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-19248, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-19248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19248
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 13:52 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Electronic Arts Origin through 10.5.x allows Elevation of Privilege (issue 2 of 2).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41254, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41254
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 15:46 UTC
- **Last Updated**: May 28, 2025 at 14:11 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
### Affected Products
**Jenkins project - Jenkins CONS3RT Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.0.0 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751)
2. [[oss-security] 20220921 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/09/21/5)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45576, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45576
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while prociesing command buffer buffer in OPE module.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- SDM429W (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13316, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13316
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 08:21 UTC
- **Last Updated**: February 18, 2025 at 14:34 UTC
- **Reserved Date**: January 09, 2025 at 22:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the apmswn_create_discount() function in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to create coupons.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**akashmalik - Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/95103830-9009-48df-ab15-476402b59e3f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/scratch-win-giveaways-for-website-facebook/tags/2.7.0/socialscratchwin.php#L492)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3239997%40scratch-win-giveaways-for-website-facebook&new=3239997%40scratch-win-giveaways-for-website-facebook&sfp_email=&sfph_mail=)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3212730%40scratch-win-giveaways-for-website-facebook&new=3212730%40scratch-win-giveaways-for-website-facebook&sfp_email=&sfph_mail=)
### Credits
- Peter Thaleikis
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38046, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38046
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:53 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: June 11, 2024 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
PowerShell Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
### References
1. [PowerShell Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-6231, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-6231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6231
- **State**: PUBLISHED
- **Published Date**: September 11, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the CWT Frontend Edit (cwt_feedit) extension before 1.2.5 for TYPO3 allows remote authenticated users to execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69562](http://www.securityfocus.com/bid/69562)
2. [60888](http://secunia.com/advisories/60888)
3. [](http://typo3.org/extensions/repository/view/cwt_feedit)
4. [cwtfeedit-unspecified-code-exec(95700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95700)
5. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13739, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13739
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [100607](http://www.securityfocus.com/bid/100607)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1484299)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2313, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2313 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2313
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 23:26 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: April 26, 2023 at 18:49 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 112.0.5615.49 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1335974)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21736, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21736
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:12 UTC
- **Last Updated**: May 04, 2025 at 07:20 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix possible int overflows in nilfs_fiemap()
Since nilfs_bmap_lookup_contig() in nilfs_fiemap() calculates its result
by being prepared to go through potentially maxblocks == INT_MAX blocks,
the value in n may experience an overflow caused by left shift of blkbits.
While it is extremely unlikely to occur, play it safe and cast right hand
expression to wider type to mitigate the issue.
Found by Linux Verification Center (linuxtesting.org) with static analysis
tool SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
- 622daaff0a8975fb5c5b95f24f3234550ba32e92 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.38 (Status: affected)
- 0 (Status: unaffected)
- 5.4.291 (Status: unaffected)
- 5.10.235 (Status: unaffected)
- 5.15.179 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.78 (Status: unaffected)
- 6.12.14 (Status: unaffected)
- 6.13.3 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7649937987fed51ed09985da4019d50189fc534e)
2. [](https://git.kernel.org/stable/c/58b1c6881081f5ddfb9a14dc241a74732c0f855c)
3. [](https://git.kernel.org/stable/c/8f41df5fd4c11d26e929a85f7239799641f92da7)
4. [](https://git.kernel.org/stable/c/f3d80f34f58445355fa27b9579a449fb186aa64e)
5. [](https://git.kernel.org/stable/c/f2bd0f1ab47822fe5bd699c8458b896c4b2edea1)
6. [](https://git.kernel.org/stable/c/b9495a9109abc31d3170f7aad7d48aa64610a1a2)
7. [](https://git.kernel.org/stable/c/250423300b4b0335918be187ef3cade248c06e6a)
8. [](https://git.kernel.org/stable/c/6438ef381c183444f7f9d1de18f22661cba1e946)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27082, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27082
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 23:25 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda M3 1.10 V1.0.0.12(4856) was discovered to contain a command injection vulnerability via the component /goform/SetInternetLanInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GD008/vuln/blob/main/tenda_M3_SetInternetLanInfo/M3_SetInternetLanInfo.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3351, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3351
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the Log Watcher module before 6.x-1.2 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable, (2) disable, or (3) delete a report via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2403463)
2. [71957](http://www.securityfocus.com/bid/71957)
3. [](https://www.drupal.org/node/2402767)
4. [[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015](http://www.openwall.com/lists/oss-security/2015/01/29/6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9191, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9191
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: September 16, 2024 at 21:58 UTC
- **Reserved Date**: May 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the rle_fread function in input-tga.c:252:15.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11704, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11704
- **State**: PUBLISHED
- **Published Date**: July 28, 2017 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 27, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer over-read was found in the function decompileIF in util/decompile.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libming/libming/issues/76)
2. [](http://somevulnsofadlab.blogspot.jp/2017/07/libmingheap-buffer-overflow-in.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32020, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32020
- **State**: PUBLISHED
- **Published Date**: May 03, 2021 at 21:12 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/c7a9a01c94987082b223d3e59969ede64363da63)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4494, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4494
- **State**: PUBLISHED
- **Published Date**: August 08, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox OS before 2.2 does not require the wifi-manage privilege for reading a Wi-Fi system message, which allows attackers to obtain potentially sensitive information via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mozilla.org/security/announce/2015/mfsa2015-76.html)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1138808)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20747, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20747
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 14:20 UTC
- **Last Updated**: November 06, 2024 at 16:24 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-202: Improper Input Validation
### Affected Products
**Cisco - Cisco SD-WAN vManage**
Affected versions:
- n/a (Status: affected)
### References
1. [20220413 Cisco SD-WAN vManage Software Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-infodis-73sHJNEq)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-31407, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-31407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31407
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:37 UTC
- **Last Updated**: January 28, 2025 at 19:06 UTC
- **Reserved Date**: April 27, 2023 at 18:29 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SAP_SE - SAP Business Planning and Consolidation**
Affected versions:
- 740 (Status: affected)
- 750 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/3312892)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12957, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12957
- **State**: PUBLISHED
- **Published Date**: June 24, 2019 at 23:27 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forum.xpdfreader.com/viewtopic.php?f=3&t=41813)
2. [FEDORA-2019-a457286734](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWEWFUVITPA3Y6F4A5SJSROKYT7PRH7Q/)
3. [FEDORA-2019-01da705767](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNIJWRYTCLGV35WGIHYTMMOPEEOOTIPT/)
4. [FEDORA-2019-759ba8202b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJJD7X3ES7ZHJUY2R3DAVCJPV23R64VK/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-23360, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-23360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23360
- **State**: PUBLISHED
- **Published Date**: January 27, 2021 at 15:29 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
oscommerce v2.3.4.1 has a functional problem in user registration and password rechecking, where a non-identical password can bypass the checks in /catalog/admin/administrators.php and /catalog/password_reset.php
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/osCommerce/oscommerce2/issues/658)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3304, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3304
- **State**: PUBLISHED
- **Published Date**: August 09, 2016 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92302](http://www.securityfocus.com/bid/92302)
2. [40257](https://www.exploit-db.com/exploits/40257/)
3. [MS16-097](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-097)
4. [1036564](http://www.securitytracker.com/id/1036564)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.