System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9432, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9432 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9432
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Bluetooth, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-80546108
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21542, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21542
- **State**: PUBLISHED
- **Published Date**: January 10, 2023 at 00:00 UTC
- **Last Updated**: January 01, 2025 at 00:35 UTC
- **Reserved Date**: December 01, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Installer Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Installer Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21542)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-18175, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-18175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18175
- **State**: PUBLISHED
- **Published Date**: July 29, 2021 at 16:55 UTC
- **Last Updated**: August 04, 2024 at 14:00 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection vulnerability in Metinfo 6.1.3 via a dosafety_emailadd action in basic.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sword1991912/metinfo/issues/1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46886, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46886
- **State**: PUBLISHED
- **Published Date**: November 29, 2023 at 00:00 UTC
- **Last Updated**: October 10, 2024 at 20:21 UTC
- **Reserved Date**: October 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dreamer CMS before version 4.0.1 is vulnerable to Directory Traversal. Background template management allows arbitrary modification of the template file, allowing system sensitive files to be read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/iteachyou/dreamer_cms/issues/I6NOFN)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2837, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2837
- **State**: PUBLISHED
- **Published Date**: March 03, 2023 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 18:43 UTC
- **Reserved Date**: August 16, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.
### Weakness Classification (CWE)
- CWE-923: Security Weakness
### Affected Products
**n/a - coreDNS**
Affected versions:
- unknown (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2118543)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6915, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6915
- **State**: PUBLISHED
- **Published Date**: September 11, 2015 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: September 11, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Montala Limited ResourceSpace 7.3.7009 and earlier allows remote attackers to execute arbitrary SQL commands via the "user" cookie to plugins/feedback/pages/feedback.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/133297/ResourceSpace-CMS-7.3.7009-SQL-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3875, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3875
- **State**: PUBLISHED
- **Published Date**: November 27, 2019 at 18:35 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: May 27, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The addto parameter to fup in Frams' Fast File EXchange (F*EX, aka fex) before fex-2014053 allows remote attackers to conduct cross-site scripting (XSS) attacks
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html)
2. [](https://security-tracker.debian.org/tracker/CVE-2014-3875)
3. [](http://www.openwall.com/lists/oss-security/2014/06/03/6)
4. [](http://seclists.org/fulldisclosure/2014/Jun/1)
5. [](http://www.securityfocus.com/bid/67783)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0564, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0564
- **State**: PUBLISHED
- **Published Date**: February 10, 2010 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: February 09, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Trend Micro URL Filtering Engine (TMUFE) in OfficeScan 8.0 before SP1 Patch 5 - Build 3510, possibly tmufeng.dll before 3.0.0.1029, allows attackers to cause a denial of service (crash or OfficeScan hang) via unspecified vectors. NOTE: it is likely that this issue also affects tmufeng.dll before 2.0.0.1049 for OfficeScan 10.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [officescan-tmufe-bo(56097)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56097)
2. [38396](http://secunia.com/advisories/38396)
3. [1023553](http://www.securitytracker.com/id?1023553)
4. [](http://www.trendmicro.com/ftp/documentation/readme/OSCE_80_Win_SP1_Patch_5_en_readme.txt)
5. [](http://www.trendmicro.com/ftp/documentation/readme/readme_1224.txt)
6. [38083](http://www.securityfocus.com/bid/38083)
7. [ADV-2010-0295](http://www.vupen.com/english/advisories/2010/0295)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0169, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0169
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 27, 2005 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10501, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10501
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 02:48 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, MDM9206, MDM9607, MDM9635M, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, and SD 835, improper input validation can occur while parsing an image.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear, Small Cell SoC**
Affected versions:
- FSM9055, MDM9206, MDM9607, MDM9635M, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 835 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-25731, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-25731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25731
- **State**: PUBLISHED
- **Published Date**: March 04, 2024 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 20:08 UTC
- **Reserved Date**: February 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/actuator/com.cn.dq.ipc)
2. [](https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-2236, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-2236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2236
- **State**: PUBLISHED
- **Published Date**: July 17, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 23:42 UTC
- **Reserved Date**: July 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Moodle before 1.3.3 has unknown impact and attack vectors, related to language setting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://moodle.org/doc/?file=releaseold.html)
2. [8090](http://www.osvdb.org/8090)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28092
- **State**: PUBLISHED
- **Published Date**: March 12, 2021 at 21:31 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sindresorhus/is-svg/releases)
2. [](https://www.npmjs.com/package/is-svg)
3. [](https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2)
4. [](https://security.netapp.com/advisory/ntap-20210513-0008/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9221, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9221
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 06:50 UTC
- **Last Updated**: October 11, 2024 at 20:37 UTC
- **Reserved Date**: September 26, 2024 at 17:08 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.21.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**leogermani - Tainacan**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/85a8a7df-b472-4a81-b808-a413c158c1cf?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1524)
3. [](https://plugins.trac.wordpress.org/changeset/3165873/)
4. [](https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1298)
### Credits
- Colin Xu
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32866, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32866
- **State**: REJECTED
- **Last Updated**: December 02, 2022 at 00:00 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24888, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24888 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24888
- **State**: PUBLISHED
- **Published Date**: February 13, 2025 at 17:32 UTC
- **Last Updated**: February 13, 2025 at 19:09 UTC
- **Reserved Date**: January 27, 2025 at 15:32 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The SecureDrop Client is a desktop application for journalists to communicate with sources and work with submissions on the SecureDrop Workstation. Prior to version 0.14.1, a malicious SecureDrop Server could obtain code execution on the SecureDrop Client virtual machine (`sd-app`). SecureDrop Server itself has multiple layers of built-in hardening, and is a dedicated physical machine exposed on the internet only via Tor hidden services for the Source and Journalist interfaces, and optionally via remote SSH access over another Tor hidden service. A newsroom's SecureDrop Workstation communicates only with its own dedicated SecureDrop Server.
The SecureDrop Client runs in a dedicated Qubes virtual machine, named `sd-app`, as part of the SecureDrop Workstation. The private OpenPGP key used to decrypt submissions and replies is stored in a separate virtual machine and never accessed directly. The vulnerability lies in the code responsible for downloading replies. The filename of the reply is obtained from the `Content-Disposition` HTTP header and used to write the encrypted reply on disk. Note that filenames are generated and sanitized server-side, and files are downloaded in an encrypted format, so a remote attacker who has not achieved server compromise, such as one posing as a source, could not craft the HTTP response necessary for this attack.
While the filename is later checked to guard against path traversal before being moved into the Client’s data storage directory, the file has already been written to a potentially arbitrary location. In this case, `safe_move()` would detect the path traversal and fail, leaving the original downloaded file in the attacker-chosen directory. Code execution can be gained by writing an autostart file in `/home/user/.config/autostart/`.
Version 0.14.1 fixes the issue. As of time of publication, there is no known evidence of exploitation in the wild. This attack requires a previously compromised SecureDrop Server.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**freedomofpress - securedrop-client**
Affected versions:
- < 0.14.1 (Status: affected)
### References
1. [https://github.com/freedomofpress/securedrop-client/security/advisories/GHSA-6c3p-chq6-q3j2](https://github.com/freedomofpress/securedrop-client/security/advisories/GHSA-6c3p-chq6-q3j2)
2. [https://github.com/freedomofpress/securedrop-client/commit/120bac14649db0bcf5f24f2eb82731c76843b1ba](https://github.com/freedomofpress/securedrop-client/commit/120bac14649db0bcf5f24f2eb82731c76843b1ba)
3. [https://github.com/freedomofpress/securedrop-client/blob/0.14.0/client/securedrop_client/utils.py#L79](https://github.com/freedomofpress/securedrop-client/blob/0.14.0/client/securedrop_client/utils.py#L79)
4. [https://github.com/freedomofpress/securedrop-client/blob/main/client/securedrop_client/api_jobs/downloads.py#L164](https://github.com/freedomofpress/securedrop-client/blob/main/client/securedrop_client/api_jobs/downloads.py#L164)
5. [https://github.com/freedomofpress/securedrop-client/blob/release/0.14.0/client/securedrop_client/sdk/__init__.py#L956-L957](https://github.com/freedomofpress/securedrop-client/blob/release/0.14.0/client/securedrop_client/sdk/__init__.py#L956-L957)
6. [https://www.qubes-os.org/doc/split-gpg](https://www.qubes-os.org/doc/split-gpg)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16887, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16887
- **State**: PUBLISHED
- **Published Date**: January 12, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43460](https://www.exploit-db.com/exploits/43460/)
2. [20180109 FiberHome MIFI LM53Q1 Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2018/Jan/28)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0493, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0493
- **State**: PUBLISHED
- **Published Date**: February 21, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in bizmail.cgi in Biz Mail Form before 2.2 allows remote attackers to bypass the email check and send spam e-mail via CRLF sequences and forged mail headers in the email parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050218 BizMail 2.1 Spam Exploit](http://marc.info/?l=bugtraq&m=110876655521321&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-0606, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-0606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0606
- **State**: PUBLISHED
- **Published Date**: February 10, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Stack-based buffer overflow in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a crafted length value, a different vulnerability than CVE-2011-0563 and CVE-2011-0589.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0492](http://www.vupen.com/english/advisories/2011/0492)
2. [43470](http://secunia.com/advisories/43470)
3. [RHSA-2011:0301](http://www.redhat.com/support/errata/RHSA-2011-0301.html)
4. [46201](http://www.securityfocus.com/bid/46201)
5. [ADV-2011-0337](http://www.vupen.com/english/advisories/2011/0337)
6. [1025033](http://www.securitytracker.com/id?1025033)
7. [oval:org.mitre.oval:def:12550](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12550)
8. [adobe-reader-acrobat-rt3d-bo(65309)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65309)
9. [](http://www.adobe.com/support/security/bulletins/apsb11-03.html)
10. [20110208 ZDI-11-075: Adobe Acrobat Reader rt3d.dll Multimedia Playing Arbitrary Memory Overwite Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/516317/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-44222, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-44222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44222
- **State**: PUBLISHED
- **Published Date**: October 28, 2024 at 21:07 UTC
- **Last Updated**: October 29, 2024 at 18:36 UTC
- **Reserved Date**: August 20, 2024 at 21:45 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121570)
2. [](https://support.apple.com/en-us/121568)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12442, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12442
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 13:55 UTC
- **Last Updated**: May 13, 2025 at 14:28 UTC
- **Reserved Date**: December 10, 2024 at 19:01 UTC
- **Assigned By**: Mandiant
### Vulnerability Description
EnerSys AMPA versions 24.04 through 24.16, inclusive, are vulnerable to command injection leading to privileged remote shell access.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**EnerSys - AMPA**
Affected versions:
- 24.04 (Status: affected)
- 24.17 (Status: unaffected)
### References
1. [](https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0002.md)
2. [](https://www.enersys.com/4996df/globalassets/documents/corporate/cve/enersys_cve-2024-12442-final.pdf)
### Credits
- Nick Guttilla, Mandiant
- Neal Trischitta, Mandiant
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17795, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17795
- **State**: PUBLISHED
- **Published Date**: December 20, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 20, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In IKARUS anti.virus 2.16.20, the driver file (ntguard.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83000088.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rubyfly/IKARUS_POC/tree/master/0x83000088)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-39712, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-39712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39712
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 01:54 UTC
- **Last Updated**: December 01, 2024 at 18:25 UTC
- **Reserved Date**: June 28, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
### Affected Products
**Ivanti - Connect Secure**
Affected versions:
- 22.7R2.1 (Status: affected)
- 9.1R18.7 (Status: affected)
**Ivanti - Policy Secure**
Affected versions:
- 22.7R1.1 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-2405, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-2405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2405
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-7565, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-7565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7565
- **State**: PUBLISHED
- **Published Date**: October 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Rando Noeux (aka com.gmteditions.NoeuxLesMinesDistrib) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#150241](http://www.kb.cert.org/vuls/id/150241)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3447, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3447
- **State**: PUBLISHED
- **Published Date**: June 29, 2023 at 04:28 UTC
- **Last Updated**: November 26, 2024 at 19:32 UTC
- **Reserved Date**: June 28, 2023 at 16:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Injection in versions up to, and including, 4.1.5. This is due to insufficient escaping on the supplied username value. This makes it possible for unauthenticated attackers to extract potentially sensitive information from the LDAP directory.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L`
### Affected Products
**cyberlord92 - Active Directory Integration / LDAP Integration**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7553e8-e43d-4740-b2ee-e3d8dc351e53?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2928150%40ldap-login-for-intranet-sites&new=2928150%40ldap-login-for-intranet-sites&sfp_email=&sfph_mail=)
### Credits
- Luca Greeb
- Andreas Krüger
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-20062, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-20062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20062
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 21:02 UTC
- **Last Updated**: May 14, 2025 at 15:33 UTC
- **Reserved Date**: October 13, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi Software for Windows**
Affected versions:
- before version 23.100 (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4874, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4874
- **State**: PUBLISHED
- **Published Date**: October 07, 2011 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 04:02 UTC
- **Reserved Date**: October 07, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in users.php in NinkoBB 1.3 RC5 allow remote attackers to inject arbitrary web script or HTML via the (1) first_name, (2) last_name, (3) msn, or (4) aim parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44462](http://www.securityfocus.com/bid/44462)
2. [](http://packetstormsecurity.org/1010-exploits/ninkobb-xss.txt)
3. [ninkobb-users-xss(62815)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62815)
4. [](http://www.htbridge.ch/advisory/xss_in_ninkobb.html)
5. [20101027 XSS in NinkoBB](http://www.securityfocus.com/archive/1/514527/100/0/threaded)
6. [41933](http://secunia.com/advisories/41933)
7. [15330](http://www.exploit-db.com/exploits/15330)
8. [8430](http://securityreason.com/securityalert/8430)
9. [68897](http://www.osvdb.org/68897)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1914, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1914
- **State**: PUBLISHED
- **Published Date**: February 21, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 19:41 UTC
- **Reserved Date**: May 09, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM OPC Server before 3.01.012, Modbus RTU OPC Server before 3.01.010, and Modbus TCP OPC Server before 3.01.010 allows remote attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-28039, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-28039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28039
- **State**: PUBLISHED
- **Published Date**: October 31, 2020 at 00:58 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: October 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 allows arbitrary file deletion because it does not properly determine whether a meta key is considered protected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/)
2. [](https://wpscan.com/vulnerability/10452)
3. [](https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad)
4. [[debian-lts-announce] 20201103 [SECURITY] [DLA 2429-1] wordpress security update](https://lists.debian.org/debian-lts-announce/2020/11/msg00004.html)
5. [DSA-4784](https://www.debian.org/security/2020/dsa-4784)
6. [FEDORA-2020-15e15c35da](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VAVVYJKA2I6CRQUINECDPBGWMQDEG244/)
7. [FEDORA-2020-a764b11b52](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUXVUAKL2HL4QYJEPHBNVQQWRMFMII2Y/)
8. [FEDORA-2020-b386fac43a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHVNK2WYAM3ZTCXTFSEIT56IKLVJHU3/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0438, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0438
- **State**: PUBLISHED
- **Published Date**: April 16, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201507-19](https://security.gentoo.org/glsa/201507-19)
2. [1032121](http://www.securitytracker.com/id/1032121)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)
4. [SUSE-SU-2015:0946](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-38763, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-38763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38763
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 18:19 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://churchcrm.io/)
2. [](https://demo.churchcrm.io/master)
3. [](https://github.com/ChurchCRM/CRM/wiki)
4. [](https://github.com/0x72303074/CVE-Disclosures)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0035, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0035
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: January 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
resend command in Majordomo allows local users to gain privileges via shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000113 Info on some security holes reported against SCO Unixware.](http://marc.info/?l=bugtraq&m=94780294009285&w=2)
2. [902](http://www.securityfocus.com/bid/902)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-5558, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-5558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5558
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Hard Time (Prison Sim) (aka air.HardTime) application 1.111 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#599745](http://www.kb.cert.org/vuls/id/599745)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10050
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 17:00 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: WebConnect). Supported versions that are affected are 8.10.1 and 8.10.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Suite8, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Suite8**
Affected versions:
- 8.10.1 (Status: affected)
- 8.10.2 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
2. [101363](http://www.securityfocus.com/bid/101363)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45253, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45253
- **State**: PUBLISHED
- **Published Date**: December 01, 2023 at 00:00 UTC
- **Last Updated**: November 26, 2024 at 19:12 UTC
- **Reserved Date**: October 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, allows attackers to manipulate files and escalate privileges via RollingFileAppender.DeleteFile method performed by the log4net library.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-24823, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-24823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24823
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 17:21 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: January 31, 2024 at 16:28 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Graylog is a free and open log management platform. Starting in version 4.3.0 and prior to versions 5.1.11 and 5.2.4, reauthenticating with an existing session cookie would re-use that session id, even if for different user credentials. In this case, the pre-existing session could be used to gain elevated access to an existing Graylog login session, provided the malicious user could successfully inject their session cookie into someone else's browser. The complexity of such an attack is high, because it requires presenting a spoofed login screen and injection of a session cookie into an existing browser, potentially through a cross-site scripting attack. No such attack has been discovered. Graylog 5.1.11 and 5.2.4, and any versions of the 6.0 development branch, contain patches to not re-use sessions under any circumstances. Some workarounds are available. Using short session expiration and explicit log outs of unused sessions can help limiting the attack vector. Unpatched this vulnerability exists, but is relatively hard to exploit. A proxy could be leveraged to clear the `authentication` cookie for the Graylog server URL for the `/api/system/sessions` endpoint, as that is the only one vulnerable.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**Graylog2 - graylog2-server**
Affected versions:
- >= 4.3.0, < 5.1.11 (Status: affected)
- >= 5.2.0, < 5.2.4 (Status: affected)
### References
1. [https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3xf8-g8gr-g7rh](https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3xf8-g8gr-g7rh)
2. [https://github.com/Graylog2/graylog2-server/commit/1596b749db86368ba476662f23a0f0c5ec2b5097](https://github.com/Graylog2/graylog2-server/commit/1596b749db86368ba476662f23a0f0c5ec2b5097)
3. [https://github.com/Graylog2/graylog2-server/commit/b93a66353f35a94a4e8f3f75ac4f5cdc5a2d4a6a](https://github.com/Graylog2/graylog2-server/commit/b93a66353f35a94a4e8f3f75ac4f5cdc5a2d4a6a)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-3929, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-3929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3929
- **State**: PUBLISHED
- **Published Date**: August 20, 2012 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 23:53 UTC
- **Reserved Date**: October 01, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly execute arbitrary code via a crafted DV file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1479-1](http://www.ubuntu.com/usn/USN-1479-1)
2. [](http://git.libav.org/?p=libav.git%3Ba=commitdiff%3Bh=5a396bb3a66a61a68b80f2369d0249729bf85e04)
3. [49089](http://secunia.com/advisories/49089)
4. [](http://ffmpeg.org/)
5. [DSA-2471](http://www.debian.org/security/2012/dsa-2471)
6. [](http://libav.org/)
7. [](http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=635bcfccd439480003b74a665b5aa7c872c1ad6b)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-33774, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-33774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33774
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 17:53 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Event Tracing Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33774)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1187, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1187
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19960826 [BUG] Vulnerability in PINE](http://marc.info/?l=bugtraq&m=87602167419803&w=2)
2. [pine-tmpfile(416)](https://exchange.xforce.ibmcloud.com/vulnerabilities/416)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4382, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4382
- **State**: PUBLISHED
- **Published Date**: August 16, 2023 at 19:31 UTC
- **Last Updated**: November 21, 2024 at 15:03 UTC
- **Reserved Date**: August 16, 2023 at 13:02 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in tdevs Hyip Rio 2.1. Affected by this issue is some unknown functionality of the file /user/settings of the component Profile Settings. The manipulation of the argument avatar leads to cross site scripting. The attack may be launched remotely. VDB-237314 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**tdevs - Hyip Rio**
Affected versions:
- 2.1 (Status: affected)
### References
1. [](https://vuldb.com/?id.237314)
2. [](https://vuldb.com/?ctiid.237314)
3. [](http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html)
### Credits
- skalvin (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8842, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8842
- **State**: PUBLISHED
- **Published Date**: September 26, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: March 20, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The Philips e-Alert communication channel is not encrypted which could therefore lead to disclosure of personal contact information and application login credentials from within the same subnet.
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**Philips - e-Alert Unit (non-medical device)**
Affected versions:
- R2.1 and prior (Status: affected)
### References
1. [](https://www.usa.philips.com/healthcare/about/customer-support/product-security)
2. [105194](http://www.securityfocus.com/bid/105194)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18460, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18460
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 16:32 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 62.0.17 allows arbitrary code execution during automatic SSL installation (SEC-221).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/62+Change+Log)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-51923, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-51923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51923
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:30 UTC
- **Last Updated**: November 20, 2024 at 14:26 UTC
- **Reserved Date**: November 04, 2024 at 09:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Websand Websand Subscription Form allows Stored XSS.This issue affects Websand Subscription Form: from n/a through 1.0.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Websand - Websand Subscription Form**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/websand-subscription-form/wordpress-websand-subscription-form-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-8008, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-8008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8008
- **State**: PUBLISHED
- **Published Date**: December 29, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 28, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [77379](http://www.securityfocus.com/bid/77379)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1273353)
3. [FEDORA-2015-ec6d598d3d](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html)
4. [FEDORA-2015-97fe05f788](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html)
5. [1034028](http://www.securitytracker.com/id/1034028)
6. [](https://phabricator.wikimedia.org/T103022)
7. [[MediaWiki-announce] 20151016 Extension Security Release: OAuth, Echo, PageTriage](https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html)
8. [FEDORA-2015-24fe8b66c9](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html)
9. [[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11](http://www.openwall.com/lists/oss-security/2015/10/29/14)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-30353, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-30353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30353
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 00:00 UTC
- **Last Updated**: January 27, 2025 at 19:29 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_uRCE.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7530, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7530
- **State**: PUBLISHED
- **Published Date**: July 26, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 16:04 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
In CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1, it was found that privilege check is missing when invoking arbitrary methods via filtering on VMs that MiqExpression will execute that is triggerable by API users. An attacker could use this to execute actions they should not be allowed to (e.g. destroying VMs).
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Red Hat - cfme**
Affected versions:
- 5.7.3 (Status: affected)
- 5.8.1 (Status: affected)
### References
1. [100151](http://www.securityfocus.com/bid/100151)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7530)
3. [RHSA-2017:1758](https://access.redhat.com/errata/RHSA-2017:1758)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-125008, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-125008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-125008
- **State**: PUBLISHED
- **Published Date**: June 18, 2022 at 06:15 UTC
- **Last Updated**: April 15, 2025 at 14:22 UTC
- **Reserved Date**: June 17, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**unspecified - FFmpeg**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=f5d1d1e4667ba346ea7e0f97e6d2756bc9d4abde)
2. [](https://vuldb.com/?id.12582)
### Credits
- Mateusz Jurczyk/Gynvael Coldwind
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-3412, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-3412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3412
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 18:01 UTC
- **Last Updated**: November 13, 2024 at 18:14 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the scheduled meeting template feature of Cisco Webex Meetings could allow an authenticated, remote attacker to create a scheduled meeting template that would belong to another user in their organization. The vulnerability is due to insufficient authorization enforcement for the creation of scheduled meeting templates. An attacker could exploit this vulnerability by sending a crafted request to the Webex Meetings interface to create a scheduled meeting template. A successful exploit could allow the attacker to create a scheduled meeting template that would belong to a user other than themselves.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Cisco - Cisco Webex Meetings**
Affected versions:
- n/a (Status: affected)
### References
1. [20200805 Cisco Webex Meetings Scheduled Meeting Template Creation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-smtcreate-YmuD5Sk)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10187, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10187
- **State**: PUBLISHED
- **Published Date**: April 17, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In radare2 2.5.0, there is a heap-based buffer over-read in the dalvik_op function (libr/anal/p/anal_dalvik.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted DEX file. Note that this issue is different from CVE-2018-8809, which was patched earlier.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/radare/radare2/issues/9913)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2450, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2450
- **State**: PUBLISHED
- **Published Date**: May 09, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
codecs/on2/enc/SoftVPXEncoder.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not validate OMX buffer sizes, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27569635.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-05-01.html)
2. [](https://android.googlesource.com/platform/frameworks/av/+/7fd96ebfc4c9da496c59d7c45e1f62be178e626d)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5863, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5863
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 05:31 UTC
- **Last Updated**: June 10, 2025 at 14:44 UTC
- **Reserved Date**: June 08, 2025 at 13:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
- CWE-119: Security Weakness
### Affected Products
**Tenda - AC5**
Affected versions:
- 15.03.06.47 (Status: affected)
### References
1. [VDB-311622 | Tenda AC5 SetRebootTimer formSetRebootTimer stack-based overflow](https://vuldb.com/?id.311622)
2. [VDB-311622 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.311622)
3. [Submit #591981 | Tenda AC5 V1.0 V15.03.06.47 Buffer Overflow](https://vuldb.com/?submit.591981)
4. [](https://lavender-bicycle-a5a.notion.site/Tenda-AC5-formSetRebootTimer-20a53a41781f80a6b9a8f6e5915cf256?source=copy_link)
5. [](https://www.tenda.com.cn/)
### Credits
- yhryhryhr_miemie (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1941, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1941
- **State**: PUBLISHED
- **Published Date**: June 05, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 19:17 UTC
- **Reserved Date**: March 30, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2012:088](http://www.mandriva.com/security/advisories?name=MDVSA-2012:088)
2. [RHSA-2012:0710](http://rhn.redhat.com/errata/RHSA-2012-0710.html)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=750066)
4. [oval:org.mitre.oval:def:16985](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16985)
5. [](http://www.mozilla.org/security/announce/2012/mfsa2012-40.html)
6. [SUSE-SU-2012:0746](http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html)
7. [openSUSE-SU-2012:0760](http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html)
8. [RHSA-2012:0715](http://rhn.redhat.com/errata/RHSA-2012-0715.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8690, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8690
- **State**: PUBLISHED
- **Published Date**: February 19, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: November 09, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Exponent CMS before 2.1.4 patch 6, 2.2.x before 2.2.3 patch 9, and 2.3.x before 2.3.1 patch 4 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO, the (2) src parameter in a none action to index.php, or the (3) "First Name" or (4) "Last Name" field to users/edituser.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/130382/Exponent-CMS-2.3.1-Cross-Site-Scripting.html)
2. [1031775](http://www.securitytracker.com/id/1031775)
3. [118263](http://osvdb.org/show/osvdb/118263)
4. [118345](http://osvdb.org/show/osvdb/118345)
5. [](http://www.exponentcms.org/news/show/title/corrected-security-patches-released-for-v2-1-4-v2-2-3-and-v2-3-0)
6. [36059](http://www.exploit-db.com/exploits/36059)
7. [](http://exponentcms.lighthouseapp.com/projects/61783/tickets/1230-universal-cross-site-scripting-in-exponent-cms-231-and-prior)
8. [exponentcms-cve20148690-xss(100877)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100877)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0903, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0903
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 05:32 UTC
- **Last Updated**: August 01, 2024 at 18:18 UTC
- **Reserved Date**: January 25, 2024 at 19:49 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_submitted' 'link' value in all versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in the feedback submission page that will execute when a user clicks the link, while also pressing the command key.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**smub - User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a649fbea-65cf-45c9-b853-2733f27518af?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038797%40userfeedback-lite&new=3038797%40userfeedback-lite&sfp_email=&sfph_mail=)
### Credits
- Grzegorz Niedziela
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4821, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4821
- **State**: PUBLISHED
- **Published Date**: September 23, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 16:39 UTC
- **Reserved Date**: July 12, 2013 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP System Management Homepage (SMH) before 7.2.1 allows remote authenticated users to cause a denial of service via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#895524](http://www.kb.cert.org/vuls/id/895524)
2. [SSRT101254](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862)
3. [HPSBMU02900](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-29423, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-29423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29423
- **State**: PUBLISHED
- **Published Date**: May 06, 2022 at 17:40 UTC
- **Last Updated**: February 20, 2025 at 20:23 UTC
- **Reserved Date**: April 18, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Pro Features Lock Bypass vulnerability in Countdown & Clock plugin <= 2.3.2 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Adam Skaat - Countdown & Clock (WordPress plugin)**
Affected versions:
- <= 2.3.2 (Status: affected)
### References
1. [](https://wordpress.org/plugins/countdown-builder/#developers)
2. [](https://patchstack.com/database/vulnerability/countdown-builder/wordpress-countdown-clock-plugin-2-3-0-pro-features-lock-bypass-vulnerability)
### Credits
- Vulnerability discovered by Ex.Mi (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-39379, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-39379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39379
- **State**: PUBLISHED
- **Published Date**: September 01, 2021 at 12:41 UTC
- **Last Updated**: August 04, 2024 at 02:06 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://opensis.com/)
2. [](https://github.com/OS4ED/openSIS-Classic)
3. [](https://github.com/security-n/CVE-2021-39379)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-4433, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-4433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4433
- **State**: PUBLISHED
- **Published Date**: October 03, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in search.php in the RMSOFT MiniShop module 1.0 for Xoops might allow remote attackers to execute arbitrary SQL commands via the itemsxpag parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [minishop-search-sql-injection(45714)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45714)
2. [](http://lostmon.blogspot.com/2008/08/rmsoft-minishop-module-multiple.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14855, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14855
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:10 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in takeover of Oracle Universal Work Queue. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Universal Work Queue**
Affected versions:
- 12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0060, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0060
- **State**: PUBLISHED
- **Published Date**: February 01, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:43 UTC
- **Reserved Date**: January 31, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerabilities in the logging routines for MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in Kerberos principal names.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt)
2. [CLSA-2003:639](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639)
3. [6712](http://www.securityfocus.com/bid/6712)
4. [VU#787523](http://www.kb.cert.org/vuls/id/787523)
5. [kerberos-kdc-format-string(11189)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11189)
6. [4879](http://www.osvdb.org/4879)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1553, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1553
- **State**: PUBLISHED
- **Published Date**: May 06, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Admin Console in Sun GlassFish Enterprise Server 2.1 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) applications/applications.jsf, (2) configuration/configuration.jsf, (3) customMBeans/customMBeans.jsf, (4) resourceNode/resources.jsf, (5) sysnet/registration.jsf, or (6) webService/webServicesGeneral.jsf; or the name parameter to (7) configuration/auditModuleEdit.jsf, (8) configuration/httpListenerEdit.jsf, or (9) resourceNode/jdbcResourceEdit.jsf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090505 [DSECRG-09-034] Sun Glassfish Enterprise Server - Multiple Linked XSS vulnerabilies](http://www.securityfocus.com/archive/1/503236/100/0/threaded)
2. [258528](http://sunsolve.sun.com/search/document.do?assetkey=1-26-258528-1)
3. [[dev] 20090319 [DSECRG] Sun Glassfish Multiple Security Vulnerabilities](http://www.nabble.com/-DSECRG--Sun-Glassfish-Multiple-Security-Vulnerabilities-p22595435.html)
4. [54254](http://osvdb.org/54254)
5. [[cvs] 20090322 CVS update [SJSAS91_FCS_BRANCH]: /glassfish/admin-gui/src/docroot/configuration/](https://glassfish.dev.java.net/servlets/ReadMsg?list=cvs&msgNo=29675)
6. [54256](http://osvdb.org/54256)
7. [[dev] 20090411 Re: [DSECRG] Sun Glassfish Multiple Security Vulnerabilities](http://www.nabble.com/Re:--DSECRG--Sun-Glassfish-Multiple-Security-Vulnerabilities-p23002524.html)
8. [54250](http://osvdb.org/54250)
9. [54253](http://osvdb.org/54253)
10. [54257](http://osvdb.org/54257)
11. [[cvs] 20090320 CVS update [SJSAS91_FCS_BRANCH]: /glassfish/admin-gui/src/docroot/](https://glassfish.dev.java.net/servlets/ReadMsg?list=cvs&msgNo=29669)
12. [glassfish-jsa-admininterface-xss(50453)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50453)
13. [JVNDB-2009-000027](http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000027.html)
14. [ADV-2009-1255](http://www.vupen.com/english/advisories/2009/1255)
15. [[cvs] 20090320 CVS update [SJSAS91_FCS_BRANCH]: /glassfish/admin-gui/src/java/com/sun/enterprise/tools/admingui/handlers/CommonHandlers.java](https://glassfish.dev.java.net/servlets/ReadMsg?list=cvs&msgNo=29668)
16. [54252](http://osvdb.org/54252)
17. [54255](http://osvdb.org/54255)
18. [](http://dsecrg.com/pages/vul/show.php?id=134)
19. [54249](http://osvdb.org/54249)
20. [JVN#73653977](http://jvn.jp/en/jp/JVN73653977/index.html)
21. [54251](http://osvdb.org/54251)
22. [34824](http://www.securityfocus.com/bid/34824)
23. [34914](http://www.securityfocus.com/bid/34914)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-37496, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-37496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37496
- **State**: PUBLISHED
- **Published Date**: August 01, 2023 at 00:41 UTC
- **Last Updated**: September 27, 2024 at 21:58 UTC
- **Reserved Date**: July 06, 2023 at 16:11 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL Verse is susceptible to a Stored Cross Site Scripting (XSS) vulnerability. An attacker could execute script in a victim's web browser to perform operations as the victim and/or steal the victim's cookies, session tokens, or other sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L`
### Affected Products
**HCL Software - HCL Verse**
Affected versions:
- < 3.1 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0105904)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-44649, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-44649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44649
- **State**: PUBLISHED
- **Published Date**: January 12, 2022 at 12:57 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: December 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/)
2. [](https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-31322, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-31322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31322
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 20:09 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: March 29, 2024 at 20:12 UTC
- **Assigned By**: google_android
### Vulnerability Description
In updateServicesLocked of AccessibilityManagerService.java, there is a possible way for an app to be hidden from the Setting while retaining Accessibility Service due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/c1bc907a649addd5b97d489fd39afb956164a46c)
2. [](https://source.android.com/security/bulletin/2024-06-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50952, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50952
- **State**: PUBLISHED
- **Published Date**: June 30, 2024 at 18:06 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 16, 2023 at 19:35 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM InfoSphere Information Server 11.7 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 275774.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**IBM - InfoSphere Information Server**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7158437)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/275774)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5395, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5395
- **State**: PUBLISHED
- **Published Date**: September 26, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 01:00 UTC
- **Reserved Date**: June 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger)
2. [92577](http://www.securityfocus.com/bid/92577)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-17642, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-17642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17642
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the colSpan property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6479.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.2.0.9297 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1225/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-51640, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-51640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51640
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:05 UTC
- **Last Updated**: November 25, 2024 at 16:41 UTC
- **Reserved Date**: December 20, 2023 at 21:52 UTC
- **Assigned By**: zdi
### Vulnerability Description
Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the extarctZippedFile [sic] method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22504.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Allegra - Allegra**
Affected versions:
- 7.5.0 build 29 (Status: affected)
### References
1. [ZDI-24-107](https://www.zerodayinitiative.com/advisories/ZDI-24-107/)
2. [vendor-provided URL](https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-2263, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-2263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2263
- **State**: PUBLISHED
- **Published Date**: October 31, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 13:33 UTC
- **Reserved Date**: April 25, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://service.real.com/realplayer/security/10252007_player/en/)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-07-061.html)
3. [38344](http://osvdb.org/38344)
4. [realplayer-swf-bo(37436)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37436)
5. [oval:org.mitre.oval:def:11432](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11432)
6. [20071031 ZDI-07-061: RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/483110/100/0/threaded)
7. [1018866](http://www.securitytracker.com/id?1018866)
8. [20071030 RealPlayer Updates of October 25, 2007](http://www.attrition.org/pipermail/vim/2007-October/001841.html)
9. [ADV-2007-3628](http://www.vupen.com/english/advisories/2007/3628)
10. [26284](http://www.securityfocus.com/bid/26284)
11. [27361](http://secunia.com/advisories/27361)
12. [26214](http://www.securityfocus.com/bid/26214)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-15747, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-15747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15747
- **State**: REJECTED
- **Published Date**: March 17, 2021 at 12:26 UTC
- **Last Updated**: March 17, 2021 at 12:26 UTC
- **Reserved Date**: July 14, 2020 at 00:00 UTC
- **Assigned By**: Bitdefender
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16950, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16950
- **State**: PUBLISHED
- **Published Date**: September 12, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Inteno DG400 WU7U_ELION3.11.6-170614_1328 devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses, as demonstrated by macof.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://twitter.com/cyberarchconsul/status/1039682695826169857)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-35400, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-35400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35400
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:20 UTC
- **Reserved Date**: August 04, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-48130, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-48130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48130
- **State**: PUBLISHED
- **Published Date**: February 02, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 19:01 UTC
- **Reserved Date**: December 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-27367, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-27367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27367
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 20:47 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bolt/core/releases/tag/4.1.13)
2. [](https://github.com/bolt/core/pull/2371)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-12082, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-12082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12082
- **State**: PUBLISHED
- **Published Date**: September 17, 2021 at 17:45 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 23, 2020 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
A stored cross-site scripting issue impacts certain areas of the Web UI for Code Insight v7.x releases up to and including 2020 R1 (7.11.0-64).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.flexera.com/t5/Code-Insight-Knowledge-Base/CVE-2020-12082-Remediated-in-Code-Insight/ta-p/169353)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-31389, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-31389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31389
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 13:36 UTC
- **Last Updated**: April 04, 2025 at 14:31 UTC
- **Reserved Date**: March 28, 2025 at 10:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sequel.Io Sequel allows Reflected XSS.This issue affects Sequel: from n/a through 1.0.11.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sequel.io - Sequel**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sequel/vulnerability/wordpress-sequel-plugin-1-0-11-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- luc (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4498, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4498
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12111, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12111
- **State**: PUBLISHED
- **Published Date**: May 15, 2019 at 22:23 UTC
- **Last Updated**: August 04, 2024 at 23:10 UTC
- **Reserved Date**: May 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vdoo.com/blog/security-issues-discovered-in-miniupnp)
2. [](https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f)
3. [[debian-lts-announce] 20190530 [SECURITY] [DLA 1811-1] miniupnpd security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html)
4. [USN-4542-1](https://usn.ubuntu.com/4542-1/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-50631, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-50631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50631
- **State**: PUBLISHED
- **Published Date**: March 19, 2025 at 05:50 UTC
- **Last Updated**: March 19, 2025 at 14:37 UTC
- **Reserved Date**: October 28, 2024 at 02:41 UTC
- **Assigned By**: synology
### Vulnerability Description
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Synology - Synology Drive Server**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
### References
1. [Synology-SA-24:21 Synology Drive Server (PWN2OWN 2024)](https://www.synology.com/en-global/security/advisory/Synology_SA_24_21)
### Credits
- Pumpkin Chang (@u1f383) and Orange Tsai (@orange_8361) from DEVCORE Research Team
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9982, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9982
- **State**: REJECTED
- **Published Date**: August 30, 2019 at 14:54 UTC
- **Last Updated**: August 30, 2019 at 14:54 UTC
- **Reserved Date**: May 30, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0653, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0653
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1360, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1360
- **State**: PUBLISHED
- **Published Date**: April 25, 2019 at 17:08 UTC
- **Last Updated**: October 25, 2024 at 14:30 UTC
- **Reserved Date**: December 11, 2017 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A cleartext transmission of sensitive information vulnerability in Fortinet FortiManager 5.2.0 through 5.2.7, 5.4.0 and 5.4.1 may allow an unauthenticated attacker in a man in the middle position to retrieve the admin password via intercepting REST API JSON responses.
### Affected Products
**Fortinet, Inc. - Fortinet FortiManager**
Affected versions:
- 5.2.0 to 5.2.7 (Status: affected)
- 5.4.0 (Status: affected)
- 5.4.1 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-18-051)
2. [108079](http://www.securityfocus.com/bid/108079)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-4771, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-4771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4771
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 11:31 UTC
- **Last Updated**: May 16, 2025 at 12:46 UTC
- **Reserved Date**: May 15, 2025 at 12:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in PHPGurukul Online Course Registration 3.1. Affected is an unknown function of the file /admin/course.php. The manipulation of the argument coursecode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Online Course Registration**
Affected versions:
- 3.1 (Status: affected)
### References
1. [VDB-309072 | PHPGurukul Online Course Registration course.php sql injection](https://vuldb.com/?id.309072)
2. [VDB-309072 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309072)
3. [Submit #572135 | PHPGurukul Online Course Registration V3.1 SQL Injection](https://vuldb.com/?submit.572135)
4. [](https://github.com/FLYFISH567/CVE/issues/4)
5. [](https://phpgurukul.com/)
### Credits
- FLYFISH567 (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-49141, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-49141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-49141
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 21:11 UTC
- **Last Updated**: June 10, 2025 at 15:29 UTC
- **Reserved Date**: June 02, 2025 at 10:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**haxtheweb - issues**
Affected versions:
- < 11.0.3 (Status: affected)
### References
1. [https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw](https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw)
2. [https://github.com/haxtheweb/haxcms-nodejs/commit/5131fea6b6be611db76a618f89bd2e164752e9b3](https://github.com/haxtheweb/haxcms-nodejs/commit/5131fea6b6be611db76a618f89bd2e164752e9b3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4302, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4302
- **State**: PUBLISHED
- **Published Date**: August 19, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The web interface in Cisco FireSIGHT Management Center 5.3.1.4 allows remote attackers to delete arbitrary system policies via modified parameters in a POST request, aka Bug ID CSCuu25390.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033279](http://www.securitytracker.com/id/1033279)
2. [76345](http://www.securityfocus.com/bid/76345)
3. [20150813 Cisco FireSIGHT Management Center System Policy Deletion Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40432)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0220, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0220
- **State**: PUBLISHED
- **Published Date**: February 01, 2022 at 12:21 UTC
- **Last Updated**: August 02, 2024 at 23:18 UTC
- **Reserved Date**: January 13, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The check_privacy_settings AJAX action of the WordPress GDPR WordPress plugin before 1.9.27, available to both unauthenticated and authenticated users, responds with JSON data without an "application/json" content-type. Since an HTML payload isn't properly escaped, it may be interpreted by a web browser led to this endpoint. Javascript code may be executed on a victim's browser. Due to v1.9.26 adding a CSRF check, the XSS is only exploitable against unauthenticated users (as they all share the same nonce)
### Weakness Classification (CWE)
- CWE-116 Improper Encoding or Escaping of Output: Security Weakness
### Affected Products
**Unknown - WordPress GDPR**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059)
### Credits
- Ace Candelario (@0xspade)
- Victor Paynat-Sautivet (3DS Outscale SOC)
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-1262, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-1262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1262
- **State**: PUBLISHED
- **Published Date**: February 27, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages that trigger memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6150)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0145, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0145
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sendmail WIZ command enabled, allowing root access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CA-1990-11](http://www.cert.org/advisories/CA-1990-11.html)
2. [19950206 sendmail wizard thing...](http://www2.dataguard.no/bugtraq/1995_1/0332.html)
3. [CA-1993-14](http://www.cert.org/advisories/CA-1993-14.html)
4. [Improving the Security of Your Site by Breaking Into it](http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html)
5. [[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit](http://www.openwall.com/lists/oss-security/2019/06/05/4)
6. [[oss-security] 20190606 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit](http://www.openwall.com/lists/oss-security/2019/06/06/1)
7. [20190611 The Return of the WIZard: RCE in Exim (CVE-2019-10149)](http://seclists.org/fulldisclosure/2019/Jun/16)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5340, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5340
- **State**: PUBLISHED
- **Published Date**: November 20, 2023 at 18:55 UTC
- **Last Updated**: November 21, 2024 at 19:11 UTC
- **Reserved Date**: October 02, 2023 at 15:44 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Five Star Restaurant Menu and Food Ordering WordPress plugin before 2.4.11 unserializes user input via an AJAX action available to unauthenticated users, allowing them to perform PHP Object Injection when a suitable gadget is present on the blog.
### Weakness Classification (CWE)
- CWE-502 Deserialization of Untrusted Data: Deserialization of Untrusted Data
### Affected Products
**Unknown - Five Star Restaurant Menu and Food Ordering**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/91a5847a-62e7-4b98-a554-5eecb6a06e5b)
### Credits
- Krzysztof Zając (CERT PL)
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-26765, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-26765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26765
- **State**: PUBLISHED
- **Published Date**: February 16, 2025 at 22:17 UTC
- **Last Updated**: February 18, 2025 at 19:34 UTC
- **Reserved Date**: February 14, 2025 at 06:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**enituretechnology - Distance Based Shipping Calculator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/distance-based-shipping-calculator/vulnerability/wordpress-distance-based-shipping-calculator-plugin-2-0-22-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-19575, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-19575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19575
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 15:52 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GitLab CE/EE, versions 10.1 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an insecure direct object reference issue that allows a user to make comments on a locked issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/52523)
2. [](https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/)
3. [109121](http://www.securityfocus.com/bid/109121)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-44291, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-44291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44291
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 08:13 UTC
- **Last Updated**: August 02, 2024 at 19:59 UTC
- **Reserved Date**: September 28, 2023 at 09:32 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell DM5500 5.14.0.0 contains an OS command injection vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - Dell PowerProtect Data Manager DM5500 Appliance**
Affected versions:
- DM5500 5.14 and below (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11092
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 01:16 UTC
- **Reserved Date**: July 07, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the KGSL driver function kgsl_ioctl_gpu_command, a Use After Free condition can potentially occur.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [101774](http://www.securityfocus.com/bid/101774)
2. [](https://source.android.com/security/bulletin/2017-11-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25729, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25729
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 06:58 UTC
- **Last Updated**: August 03, 2024 at 04:49 UTC
- **Reserved Date**: February 22, 2022 at 11:38 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption in modem due to improper length check while copying into memory
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8031 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- MDM9205 (Status: affected)
- MDM9206 (Status: affected)
- QCA4004 (Status: affected)
- QCA4020 (Status: affected)
- QCA4024 (Status: affected)
- QCS405 (Status: affected)
- QTS110 (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- WCD9306 (Status: affected)
- WCD9335 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3980 (Status: affected)
- WCN3998 (Status: affected)
- WCN3999 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WCN7850 (Status: affected)
- WCN7851 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-35073, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-35073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35073
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 09:50 UTC
- **Last Updated**: August 04, 2024 at 00:33 UTC
- **Reserved Date**: June 21, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible assertion due to improper validation of rank restriction field in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- AR8035, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCS6490, SA515M, SD 8 Gen1 5G, SD480, SD690 5G, SD695, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDX65, SDXR2 5G, SM7250P, SM7315, SM7325P, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9607, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9607
- **State**: PUBLISHED
- **Published Date**: September 20, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 17:11 UTC
- **Reserved Date**: June 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BL1 FWU SMC handling code in ARM Trusted Firmware before 1.4 might allow attackers to write arbitrary data to secure memory, bypass the bl1_plat_mem_check protection mechanism, cause a denial of service, or possibly have unspecified other impact via a crafted AArch32 image, which triggers an integer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ARM-software/arm-trusted-firmware/blob/v1.4/docs/change-log.rst#new-features)
2. [](https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-40518, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-40518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40518
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SeaCMS 12.9 has a remote code execution vulnerability. The vulnerability is caused by admin_weixin.php directly splicing and writing the user input data into weixin.php without processing it, which allows authenticated attackers to exploit the vulnerability to execute arbitrary commands and obtain system permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/fushuling/cve/blob/master/SeaCMS%2012.9%20admin_weixin.php%20code%20injection.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2485, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2485
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 00:00 UTC
- **Last Updated**: January 07, 2025 at 15:44 UTC
- **Reserved Date**: May 02, 2023 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from another project that those other users are Owners of.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-266: Security Weakness
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=14.1, <15.10.8 (Status: affected)
- >=15.11, <15.11.7 (Status: affected)
- >=16.0, <16.0.2 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/407830)
2. [](https://hackerone.com/reports/1934811)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2485.json)
### Credits
- Thanks [theluci](https://hackerone.com/theluci) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16757, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16757
- **State**: PUBLISHED
- **Published Date**: November 09, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hola VPN 1.34 has weak permissions (Everyone:F) under %PROGRAMFILES%, which allows local users to gain privileges via a Trojan horse 7za.exe or hola.exe file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101787](http://www.securityfocus.com/bid/101787)
2. [](https://www.vulnerability-lab.com/get_content.php?id=2062)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.