System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1259
- **State**: PUBLISHED
- **Published Date**: January 09, 2020 at 19:47 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 22, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Plixer International Scrutinizer NetFlow & sFlow Analyzer 8.6.2.16204, and possibly other versions before 9.0.1.19899, allow remote attackers to execute arbitrary SQL commands via the (1) addip parameter to cgi-bin/scrut_fa_exclusions.cgi, (2) getPermissionsAndPreferences parameter to cgi-bin/login.cgi, or (3) possibly certain parameters to d4d/alarms.php as demonstrated by the search_str parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/111791/Scrutinizer-8.6.2-Bypass-Cross-Site-Scripting-SQL-Injection.html)
2. [](http://www.exploit-db.com/exploits/18750)
3. [](http://www.securityfocus.com/bid/52989)
4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/74826)
5. [](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/twsl2012-008-multiple-vulnerabilities-in-scrutinizer-netflow-sflow-analyzer/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4734
- **State**: PUBLISHED
- **Published Date**: September 13, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in tiki-g-admin_processes.php in Tikiwiki 1.9.4 allow remote attackers to execute arbitrary SQL commands via the (1) pid and (2) where parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tikiwiki.cvs.sourceforge.net/tikiwiki/tiki/tiki-g-admin_processes.php?view=log)
2. [tikiwiki-processes-sql-injection(28869)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28869)
3. [19947](http://www.securityfocus.com/bid/19947)
4. [1544](http://securityreason.com/securityalert/1544)
5. [](http://www.hackers.ir/advisories/tikiwiki.html)
6. [20060910 Sql injection in Tikiwiki](http://www.securityfocus.com/archive/1/445790/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52277
- **State**: PUBLISHED
- **Published Date**: December 31, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:55 UTC
- **Reserved Date**: December 31, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4339
- **State**: PUBLISHED
- **Published Date**: September 12, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://core.trac.wordpress.org/changeset/25324)
2. [FEDORA-2013-16925](http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116832.html)
3. [](http://core.trac.wordpress.org/changeset/25323)
4. [FEDORA-2013-16855](http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116828.html)
5. [101181](http://www.osvdb.org/101181)
6. [DSA-2757](http://www.debian.org/security/2013/dsa-2757)
7. [20131219 URL Redirector Abuse and XSS vulnerabilities in WordPress](http://seclists.org/fulldisclosure/2013/Dec/174)
8. [](http://codex.wordpress.org/Version_3.6.1)
9. [](http://wordpress.org/news/2013/09/wordpress-3-6-1/)
10. [FEDORA-2013-16895](http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117118.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3231
- **State**: PUBLISHED
- **Published Date**: October 14, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:29 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitrary code via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2011-10-12-4](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html)
2. [](http://support.apple.com/kb/HT5000)
3. [76390](http://osvdb.org/76390)
4. [apple-safari-ssl-code-exec(70568)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70568) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27377
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 10:20 UTC
- **Last Updated**: September 25, 2024 at 11:56 UTC
- **Reserved Date**: March 01, 2023 at 00:29 UTC
- **Assigned By**: TML
### Vulnerability Description
Missing authentication in the StudentPopupDetails_EmergencyContactDetails method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**IDAttend Pty Ltd - IDWeb**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.themissinglink.com.au/security-advisories/cve-2023-27377)
### Credits
- Melodi Dey |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46907
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 14:42 UTC
- **Last Updated**: December 02, 2024 at 15:30 UTC
- **Reserved Date**: September 13, 2024 at 14:50 UTC
- **Assigned By**: ProgressSoftware
### Vulnerability Description
In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Progress Software Corporation - WhatsUp Gold**
Affected versions:
- 2023.1.0 (Status: affected)
### References
1. [](https://www.progress.com/network-monitoring)
2. [](https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024)
3. [](https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html)
### Credits
- Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1099
- **State**: PUBLISHED
- **Published Date**: April 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in the HandleChild function in server.c in Greylisting daemon (GLD) 1.3 and 1.4, when GLD is listening on a network interface, allow remote attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013678](http://securitytracker.com/alerts/2005/Apr/1013678.html)
2. [15492](http://www.osvdb.org/15492)
3. [GLSA-200504-10](http://security.gentoo.org/glsa/glsa-200504-10.xml)
4. [](http://www.gasmi.net/down/gld-history)
5. [gld-serverc-bo(20066)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20066)
6. [14941](http://secunia.com/advisories/14941)
7. [20050412 GLD (Greylisting daemon for Postfix) multiple vulnerabilities.](http://marc.info/?l=bugtraq&m=111339935903880&w=2)
8. [20050413 Gld 1.5 released (security fix)](http://marc.info/?l=bugtraq&m=111342432325670&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1494
- **State**: PUBLISHED
- **Published Date**: April 23, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 23, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39553](http://secunia.com/advisories/39553)
2. [39331](http://www.securityfocus.com/bid/39331)
3. [](http://packetstormsecurity.org/1004-exploits/joomlaawdwall-lfisql.txt)
4. [63943](http://www.osvdb.org/63943)
5. [comawdwall-controller-file-include(57693)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57693)
6. [12113](http://www.exploit-db.com/exploits/12113)
7. [](http://www.awdwall.com/index.php/awdwall-updates-logs-) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4761
- **State**: PUBLISHED
- **Published Date**: April 01, 2006 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: March 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15052](http://www.securityfocus.com/bid/15052)
2. [BEA05-98.00](http://dev2dev.bea.com/pub/advisory/152)
3. [17138](http://secunia.com/advisories/17138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1601
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:00 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in CoolPHP 1.0-stable allows remote attackers to access arbitrary files and execute local PHP scripts via a .. (dot dot) in the op parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12850](http://secunia.com/advisories/12850)
2. [11437](http://www.securityfocus.com/bid/11437)
3. [20041016 Multiple Vulnerabilities in CoolPHP](http://marc.info/?l=bugtraq&m=109810941419669&w=2)
4. [coolphp-dotdot-directory-traversal(17745)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17745)
5. [1011748](http://securitytracker.com/id?1011748) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26306
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 13:07 UTC
- **Reserved Date**: February 16, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/esnet/iperf/releases/tag/3.17)
2. [](https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc)
3. [](https://www.insyde.com/security-pledge/SA-2024005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38318
- **State**: PUBLISHED
- **Published Date**: February 05, 2025 at 22:49 UTC
- **Last Updated**: February 22, 2025 at 20:56 UTC
- **Reserved Date**: June 13, 2024 at 21:43 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Aspera Shares 1.9.0 through 1.10.0 PL6 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**IBM - Aspera Shares**
Affected versions:
- 1.9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7182490) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24390
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 05:59 UTC
- **Last Updated**: February 12, 2025 at 20:01 UTC
- **Reserved Date**: January 21, 2025 at 09:09 UTC
- **Assigned By**: OTRS
### Vulnerability Description
A vulnerability in OTRS Application Server and reverse proxy settings allows session hijacking due to missing attributes for sensitive cookie settings in HTTPS sessions.
This issue affects:
* OTRS 7.0.X
* OTRS 8.0.X
* OTRS 2023.X
* OTRS 2024.X
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-614: Security Weakness
### Affected Products
**OTRS AG - OTRS**
Affected versions:
- 7.0.x (Status: affected)
- 8.0.x (Status: affected)
- 2023.x (Status: affected)
- 2024.x (Status: affected)
### References
1. [](https://otrs.com/release-notes/otrs-security-advisory-2025-04/)
### Credits
- Special thanks to Alissa Kim for reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22424
- **State**: PUBLISHED
- **Published Date**: July 20, 2022 at 17:35 UTC
- **Last Updated**: September 16, 2024 at 17:33 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information from the TLS key file due to incorrect file permissions. IBM X-Force ID: 223597.
### Affected Products
**IBM - QRadar SIEM**
Affected versions:
- 7.3.0 (Status: affected)
- 7.4.0 (Status: affected)
- 7.5.0 (Status: affected)
- 7.3.3.FixPack11 (Status: affected)
- 7.4.3.FixPack5 (Status: affected)
- 7.5.0.UpdatePack1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6605433)
2. [ibm-qradar-cve202222424-info-disc (223597)](https://exchange.xforce.ibmcloud.com/vulnerabilities/223597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3697
- **State**: PUBLISHED
- **Published Date**: October 29, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pidgin.im/news/security/?id=89)
2. [openSUSE-SU-2014:1376](http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html)
3. [openSUSE-SU-2014:1397](http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html)
4. [](http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8415
- **State**: REJECTED
- **Published Date**: April 13, 2021 at 20:41 UTC
- **Last Updated**: April 13, 2021 at 20:41 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13048
- **State**: PUBLISHED
- **Published Date**: December 30, 2024 at 20:16 UTC
- **Last Updated**: December 30, 2024 at 23:04 UTC
- **Reserved Date**: December 30, 2024 at 16:46 UTC
- **Assigned By**: zdi
### Vulnerability Description
Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Ashlar-Vellum - Cobalt**
Affected versions:
- 1204.90 (Status: affected)
### References
1. [ZDI-24-1732](https://www.zerodayinitiative.com/advisories/ZDI-24-1732/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30343
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 10:11 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Improper integrity check can lead to race condition between tasks PDCP and RRC? after a valid RRC Command packet has been received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- AR8035, QCA6390, QCA6391, QCA6426, QCA6436, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCS6490, QCX315, SA515M, SD 675, SD 8 Gen1 5G, SD480, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDX65, SDXR2 5G, SM6250, SM6250P, SM6375, SM7250P, SM7315, SM7325P, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9457
- **State**: PUBLISHED
- **Published Date**: March 28, 2017 at 02:46 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 19, 2016 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Revive Adserver before 3.2.3 suffers from Reflected XSS. `www/admin/stats.php` is vulnerable to reflected XSS attacks via multiple parameters that are not properly sanitised or escaped when displayed, such as setPerPage, pageId, bannerid, period_start, period_end, and possibly others.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Revive Adserver All versions before 3.2.3**
Affected versions:
- Revive Adserver All versions before 3.2.3 (Status: affected)
### References
1. [](https://github.com/revive-adserver/revive-adserver/commit/ecbe822b48ef4ff61c2c6357c0c94199a81946f4)
2. [83964](http://www.securityfocus.com/bid/83964)
3. [](https://www.revive-adserver.com/security/revive-sa-2016-001/)
4. [](https://hackerone.com/reports/107879) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0913
- **State**: PUBLISHED
- **Published Date**: March 09, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: September 27, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in ecartis 0.x before 0.129a+1.0.0-snap20020514-1.3 and 1.x before 1.0.0+cvs.20030911-8 allows attackers in the same domain to gain administrator privileges and modify configuration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ecartis-gain-privileges(17809)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17809)
2. [11487](http://www.securityfocus.com/bid/11487)
3. [DSA-572](http://www.debian.org/security/2004/dsa-572)
4. [ESB-2004.0669](http://www.auscert.org.au/render.html?it=4491)
5. [12918](http://secunia.com/advisories/12918/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46664
- **State**: PUBLISHED
- **Published Date**: October 26, 2023 at 20:04 UTC
- **Last Updated**: January 16, 2025 at 21:27 UTC
- **Reserved Date**: October 24, 2023 at 16:27 UTC
- **Assigned By**: icscert
### Vulnerability Description
Sielco PolyEco1000 is vulnerable to an improper access control vulnerability when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Sielco - PolyEco1000**
Affected versions:
- CPU:2.0.6 FPGA:10.19 (Status: affected)
- CPU:1.9.4 FPGA:10.19 (Status: affected)
- CPU:1.9.3 FPGA:10.19 (Status: affected)
- CPU:1.7.0 FPGA:10.16 (Status: affected)
- CPU:2.0.2 FPGA:10.19 (Status: affected)
- CPU:2.0.0 FPGA:10.19 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07)
### Credits
- Gjoko Krstic |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21468
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: December 18, 2024 at 09:50 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- MDM9628 (Status: affected)
- QAM8295P (Status: affected)
- QCA6174A (Status: affected)
- QCA6391 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9377 (Status: affected)
- QCM4490 (Status: affected)
- QCM5430 (Status: affected)
- QCM6490 (Status: affected)
- QCM8550 (Status: affected)
- QCN6024 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9024 (Status: affected)
- QCN9274 (Status: affected)
- QCS410 (Status: affected)
- QCS4490 (Status: affected)
- QCS5430 (Status: affected)
- QCS610 (Status: affected)
- QCS615 (Status: affected)
- QCS6490 (Status: affected)
- QCS7230 (Status: affected)
- QCS8250 (Status: affected)
- QCS8300 (Status: affected)
- QCS8550 (Status: affected)
- QCS9100 (Status: affected)
- QMP1000 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB2 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SA8530P (Status: affected)
- SA8540P (Status: affected)
- SA9000P (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD888 (Status: affected)
- SDX61 (Status: affected)
- SG8275P (Status: affected)
- SM6370 (Status: affected)
- SM6650 (Status: affected)
- SM6650P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SM7635 (Status: affected)
- SM7675 (Status: affected)
- SM7675P (Status: affected)
- SM8550P (Status: affected)
- SM8635 (Status: affected)
- SM8635P (Status: affected)
- SM8650Q (Status: affected)
- SM8735 (Status: affected)
- SM8750 (Status: affected)
- SM8750P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon AR1 Gen 1 Platform (Status: affected)
- Snapdragon AR1 Gen 1 Platform "Luna1" (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X12 LTE Modem (Status: affected)
- Snapdragon X62 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- SXR2330P (Status: affected)
- TalynPlus (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9335 (Status: affected)
- WCD9341 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9378 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN6450 (Status: affected)
- WCN6650 (Status: affected)
- WCN6740 (Status: affected)
- WCN6755 (Status: affected)
- WCN7750 (Status: affected)
- WCN7860 (Status: affected)
- WCN7861 (Status: affected)
- WCN7880 (Status: affected)
- WCN7881 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0070
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 19:59 UTC
- **Last Updated**: March 25, 2025 at 20:45 UTC
- **Reserved Date**: January 05, 2023 at 04:19 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ResponsiveVoice Text To Speech WordPress plugin before 1.7.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - ResponsiveVoice Text To Speech**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/0d8fbd1a-9fac-42ac-94e0-f8921deb1696)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23455
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:05 UTC
- **Last Updated**: January 17, 2025 at 19:27 UTC
- **Reserved Date**: January 16, 2025 at 11:24 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in mastersoftwaresolutions WP VTiger Synchronization allows Stored XSS.This issue affects WP VTiger Synchronization: from n/a through 1.1.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**mastersoftwaresolutions - WP VTiger Synchronization**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/msstiger/vulnerability/wordpress-wp-vtiger-synchronization-plugin-1-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4152
- **State**: PUBLISHED
- **Published Date**: June 18, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 12, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The av-centerd SOAP service in AlienVault OSSIM before 4.8.0 allows remote attackers to execute arbitrary code via a crafted remote_task request, related to injecting an ssh public key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://forums.alienvault.com/discussion/2806)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-14-206/)
3. [59112](http://secunia.com/advisories/59112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1032
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 10, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Kiwix before 0.9.1, when using kiwix-serve, allows remote attackers to inject arbitrary web script or HTML via the pattern parameter to /search.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/p/kiwix/bugs/763/)
2. [20150118 CVE-2015-1032 Kiwix Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/534502/100/0/threaded)
3. [](http://sourceforge.net/p/kiwix/kiwix/ci/d1af5f0375c6db24d4071acf4806735725fd206e)
4. [](http://packetstormsecurity.com/files/130007/Kiwix-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39369
- **State**: PUBLISHED
- **Published Date**: September 03, 2023 at 14:26 UTC
- **Last Updated**: September 27, 2024 at 15:46 UTC
- **Reserved Date**: July 30, 2023 at 10:41 UTC
- **Assigned By**: INCD
### Vulnerability Description
StarTrinity Softswitch version 2023-02-16 - Multiple Reflected XSS (CWE-79)
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**StarTrinity - Softswitch**
Affected versions:
- version 2023-02-16 (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Moshe Mizrahi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20419
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-237290578
### Affected Products
**n/a - Android**
Affected versions:
- Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9939
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 08:18 UTC
- **Last Updated**: January 08, 2025 at 14:06 UTC
- **Reserved Date**: October 14, 2024 at 15:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**nickboss - WordPress File Upload**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5e51f301-026d-4ed7-82f8-96c1623bf95c?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3188857/wp-file-upload)
### Credits
- abrahack |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11075
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 13:13 UTC
- **Last Updated**: November 19, 2024 at 14:13 UTC
- **Reserved Date**: November 11, 2024 at 09:08 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-250: Security Weakness
### Affected Products
**SICK AG - SICK Incoming Goods Suite**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://sick.com/psirt)
2. [](https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF)
3. [](https://www.cisa.gov/resources-tools/resources/ics-recommended-practices)
4. [](https://www.first.org/cvss/calculator/3.1)
5. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.pdf)
6. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.json) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47615
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 19:13 UTC
- **Last Updated**: December 12, 2024 at 14:18 UTC
- **Reserved Date**: September 27, 2024 at 20:37 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**gstreamer - gstreamer**
Affected versions:
- < 1.24.10 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/](https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/)
2. [https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch)
3. [https://gstreamer.freedesktop.org/security/sa-2024-0026.html](https://gstreamer.freedesktop.org/security/sa-2024-0026.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21309
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 16:56 UTC
- **Last Updated**: September 06, 2024 at 20:11 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libcore, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40979
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:32 UTC
- **Last Updated**: May 04, 2025 at 09:19 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix kernel crash during resume
Currently during resume, QMI target memory is not properly handled, resulting
in kernel crash in case DMA remap is not supported:
BUG: Bad page state in process kworker/u16:54 pfn:36e80
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x36e80
page dumped because: nonzero _refcount
Call Trace:
bad_page
free_page_is_bad_report
__free_pages_ok
__free_pages
dma_direct_free
dma_free_attrs
ath12k_qmi_free_target_mem_chunk
ath12k_qmi_msg_mem_request_cb
The reason is:
Once ath12k module is loaded, firmware sends memory request to host. In case
DMA remap not supported, ath12k refuses the first request due to failure in
allocating with large segment size:
ath12k_pci 0000:04:00.0: qmi firmware request memory request
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 7077888
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 8454144
ath12k_pci 0000:04:00.0: qmi dma allocation failed (7077888 B type 1), will try later with small size
ath12k_pci 0000:04:00.0: qmi delays mem_request 2
ath12k_pci 0000:04:00.0: qmi firmware request memory request
Later firmware comes back with more but small segments and allocation
succeeds:
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 262144
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 65536
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
Now ath12k is working. If suspend is triggered, firmware will be reloaded
during resume. As same as before, firmware requests two large segments at
first. In ath12k_qmi_msg_mem_request_cb() segment count and size are
assigned:
ab->qmi.mem_seg_count == 2
ab->qmi.target_mem[0].size == 7077888
ab->qmi.target_mem[1].size == 8454144
Then allocation failed like before and ath12k_qmi_free_target_mem_chunk()
is called to free all allocated segments. Note the first segment is skipped
because its v.addr is cleared due to allocation failure:
chunk->v.addr = dma_alloc_coherent()
Also note that this leaks that segment because it has not been freed.
While freeing the second segment, a size of 8454144 is passed to
dma_free_coherent(). However remember that this segment is allocated at
the first time firmware is loaded, before suspend. So its real size is
524288, much smaller than 8454144. As a result kernel found we are freeing
some memory which is in use and thus cras
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.9.7 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bb50a4e711ff95348ad53641acb1306d89eb4c3a)
2. [](https://git.kernel.org/stable/c/303c017821d88ebad887814114d4e5966d320b28) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0722
- **State**: PUBLISHED
- **Published Date**: March 12, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: March 12, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eXPerience2 allows remote attackers to obtain the full path for the web root via a direct request to modules.php without any parameters, which leaks the path in a PHP error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050307 Multiples Vulnerabilities](http://marc.info/?l=bugtraq&m=111030766324600&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22345
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 17:51 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 08, 2024 at 23:42 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM TXSeries for Multiplatforms 8.2 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 280192.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**IBM - TXSeries for Multiplatforms**
Affected versions:
- 8.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7150667)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/280192) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36396
- **State**: PUBLISHED
- **Published Date**: July 02, 2021 at 17:51 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: June 30, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LavaLite/cms/issues/322) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45149
- **State**: PUBLISHED
- **Published Date**: November 23, 2022 at 00:00 UTC
- **Last Updated**: April 25, 2025 at 19:40 UTC
- **Reserved Date**: November 11, 2022 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**n/a - Moodle**
Affected versions:
- Fixed in moodle 4.0.5, moodle 3.11.11, moodle 3.9.18 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2142772)
2. [](https://moodle.org/mod/forum/discuss.php?d=440769)
3. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862)
4. [FEDORA-2022-f7fdcb1820](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/)
5. [FEDORA-2022-cb7084ae1c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/)
6. [FEDORA-2022-74a9c8e95f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41908
- **State**: PUBLISHED
- **Published Date**: September 05, 2023 at 00:00 UTC
- **Last Updated**: September 30, 2024 at 15:49 UTC
- **Reserved Date**: September 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cerebrate-project/cerebrate/commit/9be81055651649658243b5aa274b175064bfc6db)
2. [](https://github.com/cerebrate-project/cerebrate/compare/v1.14...v1.15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2312
- **State**: PUBLISHED
- **Published Date**: June 16, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in HauntmAx Haunted House Directory Listing CMS allows remote attackers to execute arbitrary SQL commands via the state parameter in a listings action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13784](http://www.exploit-db.com/exploits/13784)
2. [65431](http://osvdb.org/65431)
3. [40162](http://secunia.com/advisories/40162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19914
- **State**: PUBLISHED
- **Published Date**: December 06, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 11:51 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DomainMOD through 4.11.01 has XSS via the assets/add/dns.php Profile Name or notes field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/domainmod/domainmod/issues/87)
2. [46375](https://www.exploit-db.com/exploits/46375/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20378
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 16:41 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Cisco - Cisco IP Phones with Multiplatform Firmware**
Affected versions:
- 11.3.1 MSR2-6 (Status: affected)
- 11.3.1 MSR3-3 (Status: affected)
- 11.3.2 (Status: affected)
- 11.3.3 (Status: affected)
- 11.3.1 MSR4-1 (Status: affected)
- 11.3.4 (Status: affected)
- 11.3.5 (Status: affected)
- 11.3.3 MSR2 (Status: affected)
- 11.3.3 MSR1 (Status: affected)
- 11.3.6 (Status: affected)
- 11-3-1MPPSR4UPG (Status: affected)
- 11.3.7 (Status: affected)
- 11-3-1MSR2UPG (Status: affected)
- 11.3.6SR1 (Status: affected)
- 11.3.7SR1 (Status: affected)
- 11.3.7SR2 (Status: affected)
- 11.0.0 (Status: affected)
- 11.0.1 (Status: affected)
- 11.0.1 MSR1-1 (Status: affected)
- 11.0.2 (Status: affected)
- 11.1.1 (Status: affected)
- 11.1.1 MSR1-1 (Status: affected)
- 11.1.1 MSR2-1 (Status: affected)
- 11.1.2 (Status: affected)
- 11.1.2 MSR1-1 (Status: affected)
- 11.1.2 MSR3-1 (Status: affected)
- 11.2.1 (Status: affected)
- 11.2.2 (Status: affected)
- 11.2.3 (Status: affected)
- 11.2.3 MSR1-1 (Status: affected)
- 11.2.4 (Status: affected)
- 11.3.1 (Status: affected)
- 11.3.1 MSR1-3 (Status: affected)
- 4.5 (Status: affected)
- 4.6 MSR1 (Status: affected)
- 4.7.1 (Status: affected)
- 4.8.1 (Status: affected)
- 4.8.1 SR1 (Status: affected)
- 5.0.1 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.2 (Status: affected)
- 12.0.3 (Status: affected)
- 12.0.3SR1 (Status: affected)
- 12.0.4 (Status: affected)
- 5.1.1 (Status: affected)
- 5.1.2 (Status: affected)
- 5.1(2)SR1 (Status: affected)
**Cisco - Cisco PhoneOS**
Affected versions:
- 1.0.1 (Status: affected)
- 2.1.1 (Status: affected)
- 2.0.1 (Status: affected)
- 2.3.1 (Status: affected)
### References
1. [cisco-sa-ipphone-multi-vulns-cXAhCvS](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47174
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 12:17 UTC
- **Last Updated**: January 08, 2025 at 21:56 UTC
- **Reserved Date**: December 12, 2022 at 11:41 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in WordPress Performance Team Performance Lab plugin <= 2.2.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**WordPress Performance Team - Performance Lab**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/performance-lab/wordpress-performance-lab-plugin-2-2-0-cross-site-request-forgery-csrf?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28323
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 19:32 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows DNS Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28323)
2. [20210419 CVE-2021-28321-CVE-2021-28323: elevation of privileges in Microsoft Diaghub](http://seclists.org/fulldisclosure/2021/Apr/40)
3. [](http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9279
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:46 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the wifi hotspot service, there is a possible denial of service due to a null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-110476382
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2187
- **State**: PUBLISHED
- **Published Date**: July 10, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 19:56 UTC
- **Reserved Date**: July 10, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to "filename validation," has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=275099)
2. [11416](http://www.securityfocus.com/bid/11416) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39408
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:08 UTC
- **Last Updated**: April 25, 2025 at 13:57 UTC
- **Reserved Date**: April 16, 2025 at 06:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EverPress BruteGuard – Brute Force Login Protection allows Reflected XSS. This issue affects BruteGuard – Brute Force Login Protection: from n/a through 0.1.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**EverPress - BruteGuard – Brute Force Login Protection**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/bruteguard/vulnerability/wordpress-bruteguard-brute-force-login-protection-plugin-0-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42944
- **State**: PUBLISHED
- **Published Date**: August 15, 2024 at 00:00 UTC
- **Last Updated**: August 15, 2024 at 18:03 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromNatlimit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1201/fromNatlimit.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4033
- **State**: PUBLISHED
- **Published Date**: August 01, 2023 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 14:13 UTC
- **Reserved Date**: August 01, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**mlflow - mlflow/mlflow**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321)
2. [](https://github.com/mlflow/mlflow/commit/6dde93758d42455cb90ef324407919ed67668b9b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27416
- **State**: PUBLISHED
- **Published Date**: March 01, 2025 at 00:10 UTC
- **Last Updated**: March 04, 2025 at 19:18 UTC
- **Reserved Date**: February 24, 2025 at 15:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Scratch-Coding-Hut - Scratch-Coding-Hut.github.io**
Affected versions:
- <= 2025-02-28 (Status: affected)
### References
1. [https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/security/advisories/GHSA-xx32-r9wr-whff](https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/security/advisories/GHSA-xx32-r9wr-whff)
2. [https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/3](https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1236
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Anywhere Mail Server 2.3.1 stores passwords in plaintext in the msgboxes.dbf file, which could allow local users to gain privileges by extracting the passwords from msgboxes.dbf.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [iams-passwords-plaintext(3285)](https://exchange.xforce.ibmcloud.com/vulnerabilities/3285)
2. [19991001 Vulnerabilities in the Internet Anywhere Mail Server](http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9910&L=ntbugtraq&F=&S=&P=662)
3. [731](http://www.securityfocus.com/bid/731) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0111
- **State**: PUBLISHED
- **Published Date**: April 17, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Syncope 1.0.0 before 1.0.9 and 1.1.0 before 1.1.7 allows remote administrators to execute arbitrary Java code via vectors related to Apache Commons JEXL expressions, "derived schema definition," "user / role templates," and "account links of resource mappings."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[www-announce] 20140415 [SECURITY] CVE-2014-0111 Apache Syncope](http://mail-archives.us.apache.org/mod_mbox/www-announce/201404.mbox/%3C534CE273.9020601%40apache.org%3E)
2. [](http://syncope.apache.org/security.html)
3. [20140415 [SECURITY] CVE-2014-0111 Apache Syncope](http://www.securityfocus.com/archive/1/531841/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15419
- **State**: PUBLISHED
- **Published Date**: August 28, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.
### Affected Products
**n/a - Google Chrome prior to 63.0.3239.84 unknown**
Affected versions:
- Google Chrome prior to 63.0.3239.84 unknown (Status: affected)
### References
1. [](https://crbug.com/780312)
2. [RHSA-2017:3401](https://access.redhat.com/errata/RHSA-2017:3401)
3. [GLSA-201801-03](https://security.gentoo.org/glsa/201801-03)
4. [](https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html)
5. [DSA-4064](https://www.debian.org/security/2017/dsa-4064) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1153
- **State**: PUBLISHED
- **Published Date**: April 25, 2022 at 15:51 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: March 29, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The LayerSlider WordPress plugin before 7.1.2 does not sanitise and escape Project's slug before outputting it back in various place, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - LayerSlider**
Affected versions:
- 7.1.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4)
### Credits
- Taurus Omar |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5071
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 17:06 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 25, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AR System Mid Tier in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary files via the __report parameter of the BIRT viewer servlet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/133688/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html)
2. [](https://communities.bmc.com/docs/DOC-77816) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18606
- **State**: PUBLISHED
- **Published Date**: October 23, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 11:15 UTC
- **Reserved Date**: October 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [105754](http://www.securityfocus.com/bid/105754)
2. [](https://security.netapp.com/advisory/ntap-20190307-0003/)
3. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45a0eaf77022963d639d6d19871dbab7b79703fc)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=23806)
5. [openSUSE-SU-2019:2415](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html)
6. [openSUSE-SU-2019:2432](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html)
7. [USN-4336-1](https://usn.ubuntu.com/4336-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43656
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 07:56 UTC
- **Last Updated**: March 11, 2025 at 13:07 UTC
- **Reserved Date**: August 14, 2024 at 09:27 UTC
- **Assigned By**: DIVD
### Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root
This issue affects Iocharger firmware for AC model chargers before version 24120701.
Likelihood: Moderate – It might be difficult for an attacker to identify the file structure of the <redated> directory, and then modify the backup to add a new CGI script in the correct directory. Furthermore, the attacker will need an account to restore the settings backup, or convince a user with such access to upload a modified backup file.
Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and deletefiles and services.
CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H), and compromised devices can be used to pivot into networks that should potentially not be accessible (SC:L/SI:L/SA:H). Becuase this is an EV charger handing significant power, there is a potential safety impact (S:P). This attack can be automated (AU:Y).
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
- CWE-434: Security Weakness
### Affected Products
**Iocharger - Iocharger firmware for AC models**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://csirt.divd.nl/DIVD-2024-00035/)
2. [](https://csirt.divd.nl/CVE-2024-43656/)
3. [](https://iocharger.com)
### Credits
- Wilco van Beijnum
- Harm van den Brink (DIVD)
- Frank Breedijk (DIVD) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0384
- **State**: PUBLISHED
- **Published Date**: June 15, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: June 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NetStructure 7110 and 7180 have undocumented accounts (servnow, root, and wizard) whose passwords are easily guessable from the NetStructure's MAC address, which could allow remote attackers to gain root access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1183](http://www.securityfocus.com/bid/1183)
2. [20000508 NetStructure 7180 remote backdoor vulnerability](http://www.lopht.com/advisories/ipivot7110.html)
3. [1182](http://www.securityfocus.com/bid/1182)
4. [20000508 NetStructure 7110 console backdoor](http://www.l0pht.com/advisories/ipivot7180.html)
5. [](http://216.188.41.136/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0789
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:15 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8574
- **State**: PUBLISHED
- **Published Date**: July 11, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Graphics in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Microsoft Graphics Component Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8573 and CVE-2017-8556.
### Affected Products
**Microsoft Corporation - Microsoft Windows 10 1607, 1703, and Windows Server 2016**
Affected versions:
- Graphics (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8574)
2. [1038856](http://www.securitytracker.com/id/1038856)
3. [99438](http://www.securityfocus.com/bid/99438) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34300
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 11:03 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 08, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Tiff_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds write past the end of an allocated buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13194)
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V13.2 (Status: affected)
**Siemens - Teamcenter Visualization**
Affected versions:
- All versions < V13.2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-846/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28388, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28388 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28388
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 10, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-342: Security Weakness
### Affected Products
**Siemens - APOGEE PXC Compact (BACnet)**
Affected versions:
- All versions < V3.5.5 (Status: affected)
**Siemens - APOGEE PXC Compact (P2 Ethernet)**
Affected versions:
- All versions < V2.8.20 (Status: affected)
**Siemens - APOGEE PXC Modular (BACnet)**
Affected versions:
- All versions < V3.5.5 (Status: affected)
**Siemens - APOGEE PXC Modular (P2 Ethernet)**
Affected versions:
- All versions < V2.8.20 (Status: affected)
**Siemens - Nucleus NET**
Affected versions:
- All versions < V5.2 (Status: affected)
**Siemens - Nucleus ReadyStart V3**
Affected versions:
- All versions < V2012.12 (Status: affected)
**Siemens - Nucleus Source Code**
Affected versions:
- All versions (Status: affected)
**Siemens - PLUSCONTROL 1st Gen**
Affected versions:
- All versions (Status: affected)
**Siemens - TALON TC Compact (BACnet)**
Affected versions:
- All versions < V3.5.5 (Status: affected)
**Siemens - TALON TC Modular (BACnet)**
Affected versions:
- All versions < V3.5.5 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf)
3. [](https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26467
- **State**: PUBLISHED
- **Published Date**: September 06, 2022 at 17:19 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 04, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In rpmb, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07167738; Issue ID: ALPS07167738.
### Affected Products
**MediaTek, Inc. - MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8183, MT8321, MT8365, MT8385, MT8666, MT8675, MT8765, MT8768, MT8786, MT8788, MT8797**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/September-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17424
- **State**: PUBLISHED
- **Published Date**: February 08, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 05, 2017 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUScheduleSet Get method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4235.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Quest - Quest NetVault Backup**
Affected versions:
- 11.3.0.12 (Status: affected)
### References
1. [](https://zerodayinitiative.com/advisories/ZDI-17-977) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44193
- **State**: PUBLISHED
- **Published Date**: October 02, 2024 at 14:24 UTC
- **Last Updated**: March 13, 2025 at 15:46 UTC
- **Reserved Date**: August 20, 2024 at 21:42 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue is fixed in iTunes 12.13.3 for Windows. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1830
- **State**: PUBLISHED
- **Published Date**: June 02, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DbgMsg.sys driver in Compuware SoftICE DriverStudio 3.1 and 3.2 allows remote attackers to cause a denial of service (application crash) via an invalid Debug Message pointer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15522](http://secunia.com/advisories/15522)
2. [20050529 Compuware Softice (DbgMsg driver) Local Denial Of Service](http://marc.info/?l=bugtraq&m=111746654827861&w=2)
3. [](http://pb.specialised.info/all/adv/sice-adv.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42627, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42627 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42627
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 12:08 UTC
- **Last Updated**: August 02, 2024 at 19:23 UTC
- **Reserved Date**: September 12, 2023 at 05:35 UTC
- **Assigned By**: Liferay
### Vulnerability Description
Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Liferay - DXP**
Affected versions:
- 7.3.10 (Status: affected)
- 7.4.13 (Status: affected)
**Liferay - Portal**
Affected versions:
- 7.3.5 (Status: affected)
### References
1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627)
2. [](https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/)
### Credits
- Michael Oelke |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1106
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 21:32 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**NVIDIA - Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1**
Affected versions:
- All Jetson Linux versions prior to r32.6.1 (Status: affected)
**NVIDIA - Shield TV**
Affected versions:
- All versions prior to SE 9.0 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5216)
2. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5259) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5024
- **State**: PUBLISHED
- **Published Date**: January 03, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 24, 2016 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
Virtual servers in F5 BIG-IP systems 11.6.1 before 11.6.1 HF1 and 12.1.x before 12.1.2, when configured to parse RADIUS messages via an iRule, allow remote attackers to cause a denial of service (Traffic Management Microkernel restart) via crafted network traffic.
### Affected Products
**F5 Networks - F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM**
Affected versions:
- 11.6.1 before 11.6.1 HF1 and 12.1.x before 12.1.2 (Status: affected)
### References
1. [](https://support.f5.com/csp/#/article/K92859602)
2. [95228](http://www.securityfocus.com/bid/95228)
3. [1037510](http://www.securitytracker.com/id/1037510) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0549
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerabilities in Anthill allow remote attackers to execute script as other Anthill users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020406 Anthill login and JavaScript vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2002-04/0089.html)
2. [anthill-bug-tracking-css(8770)](http://www.iss.net/security_center/static/8770.php)
3. [4442](http://www.securityfocus.com/bid/4442) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4066
- **State**: PUBLISHED
- **Published Date**: June 22, 2020 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 07:52 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In Limdu before 0.95, the trainBatch function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This has been patched in 0.95.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**erelsgl - Limdu**
Affected versions:
- < 0.95 (Status: affected)
### References
1. [](https://github.com/erelsgl/limdu/security/advisories/GHSA-77qv-gh6f-pgh4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0144
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 15:43 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
### Affected Products
**Microsoft Corporation - Windows SMB**
Affected versions:
- The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 (Status: affected)
### References
1. [42031](https://www.exploit-db.com/exploits/42031/)
2. [42030](https://www.exploit-db.com/exploits/42030/)
3. [41891](https://www.exploit-db.com/exploits/41891/)
4. [1037991](http://www.securitytracker.com/id/1037991)
5. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144)
6. [](https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf)
7. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02)
8. [41987](https://www.exploit-db.com/exploits/41987/)
9. [96704](http://www.securityfocus.com/bid/96704)
10. [](https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf)
11. [](http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html)
12. [](http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2966
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 01, 2024 at 16:27 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.17 and prior (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
2. [](https://security.netapp.com/advisory/ntap-20191017-0002/)
3. [FEDORA-2019-c1fab3f139](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/)
4. [FEDORA-2019-d40df38271](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/)
5. [FEDORA-2019-48a0a07033](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/)
6. [USN-4195-1](https://usn.ubuntu.com/4195-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3858
- **State**: PUBLISHED
- **Published Date**: August 08, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Informix Dynamic Server (IDS) before 9.40.xC8 and 10.00 before 10.00.xC4 stores passwords in plaintext in shared memory, which allows local users to obtain passwords by reading the memory (product defects 171893, 171894, 173772).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-1.ibm.com/support/docview.wss?uid=swg21242921)
2. [20060814 Informix - Discovery, Attack and Defense](http://www.securityfocus.com/archive/1/443133/100/0/threaded)
3. [20060814 Multiple Password Exposures Flaws](http://www.securityfocus.com/archive/1/443195/100/0/threaded)
4. [informix-plaintext-password(28132)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28132)
5. [](http://www.databasesecurity.com/informix/DatabaseHackersHandbook-AttackingInformix.pdf)
6. [21301](http://secunia.com/advisories/21301)
7. [19264](http://www.securityfocus.com/bid/19264)
8. [27691](http://www.osvdb.org/27691)
9. [ADV-2006-3077](http://www.vupen.com/english/advisories/2006/3077) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7806
- **State**: PUBLISHED
- **Published Date**: November 30, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
Data Center Operation allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
### Affected Products
**Schneider Electric SE - Data Center Operation all versions**
Affected versions:
- Data Center Operation all versions (Status: affected)
### References
1. [](https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41200
- **State**: PUBLISHED
- **Published Date**: November 05, 2021 at 20:00 UTC
- **Last Updated**: November 13, 2024 at 21:44 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-617: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.6.0, < 2.6.1 (Status: affected)
- >= 2.5.0, < 2.5.2 (Status: affected)
- < 2.4.4 (Status: affected)
### References
1. [https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f)
2. [https://github.com/tensorflow/tensorflow/issues/46909](https://github.com/tensorflow/tensorflow/issues/46909)
3. [https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31093
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 07:45 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 28, 2024 at 06:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Kaloyan K. Tsvetkov Broken Images allows Cross-Site Scripting (XSS).This issue affects Broken Images: from n/a through 0.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Kaloyan K. Tsvetkov - Broken Images**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-broken-images/wordpress-broken-images-plugin-0-2-csrf-to-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4782
- **State**: PUBLISHED
- **Published Date**: October 29, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: October 29, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in public/code/cp_polls_results.php in All In One Control Panel (AIOCP) 1.4 allows remote attackers to execute arbitrary SQL commands via the poll_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6854](https://www.exploit-db.com/exploits/6854)
2. [32431](http://secunia.com/advisories/32431)
3. [4518](http://securityreason.com/securityalert/4518) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25040
- **State**: PUBLISHED
- **Published Date**: September 16, 2020 at 17:47 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: August 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/sylabs)
2. [](https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762)
3. [openSUSE-SU-2020:1497](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html)
4. [openSUSE-SU-2020:1529](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29792
- **State**: PUBLISHED
- **Published Date**: May 13, 2022 at 15:04 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 25, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/5/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21801
- **State**: PUBLISHED
- **Published Date**: July 16, 2021 at 10:37 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Advantech**
Affected versions:
- Advantech R-SeeNet 2.4.12 (20.10.2020) (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8521
- **State**: PUBLISHED
- **Published Date**: October 29, 2014 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: October 29, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in McAfee Network Data Loss Prevention (NDLP) before 9.3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10236
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
POSCMS 3.2.18 allows remote attackers to execute arbitrary PHP code via the diy\dayrui\controllers\admin\Syscontroller.php 'add' function because an attacker can control the value of $data['name'] with no restrictions, and this value is written to the FCPATH.$file file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/myndtt/vulnerability/blob/master/poscms/3-2-18.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7681
- **State**: PUBLISHED
- **Published Date**: July 14, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: April 11, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache OpenMeetings 1.0.0 is vulnerable to SQL injection. This allows authenticated users to modify the structure of the existing query and leak the structure of other queries being made by the application in the back-end.
### Affected Products
**Apache Software Foundation - Apache OpenMeetings**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [[user] 20170713 CVE-2017-7681 - Apache OpenMeetings - SQL injection in web services](http://markmail.org/message/j774dp5ro5xmkmg6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-22785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-22785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-22785
- **State**: PUBLISHED
- **Published Date**: April 28, 2021 at 20:22 UTC
- **Last Updated**: August 04, 2024 at 14:51 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Etherpad < 1.8.3 is affected by a missing lock check which could cause a denial of service. Aggressively targeting random pad import endpoints with empty data would flatten all pads due to lack of rate limiting and missing ownership check.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ether/etherpad-lite/pull/3833) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7019
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, and CVE-2016-7018.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html)
3. [93496](http://www.securityfocus.com/bid/93496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3047
- **State**: PUBLISHED
- **Published Date**: July 07, 2008 at 18:20 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: July 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incomplete blacklist vulnerability in the KB Unpack (kb_unpack) extension 0.1.0 and earlier for TYPO3 has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-20080701-1/)
2. [kbunpack-blacklist-weak-security(43481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43481)
3. [30053](http://www.securityfocus.com/bid/30053)
4. [30885](http://secunia.com/advisories/30885) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2179
- **State**: PUBLISHED
- **Published Date**: June 09, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:48 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.2 and earlier allows remote code execution via unspecified vectors, a different vulnerability than CVE-2017-2181 and CVE-2017-2182.
### Affected Products
**INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN (IPA) - Hands-on Vulnerability Learning Tool "AppGoat" for Web Application**
Affected versions:
- V3.0.2 and earlier (Status: affected)
### References
1. [JVN#80238098](http://jvn.jp/en/jp/JVN80238098/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1865
- **State**: PUBLISHED
- **Published Date**: April 21, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Argument injection vulnerability in Beagle before 0.2.5 allows attackers to execute arbitrary commands via crafted filenames that inject command line arguments when Beagle launches external helper applications while indexing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17611](http://www.securityfocus.com/bid/17611)
2. [FEDORA-2006-440](http://lists.seifried.org/pipermail/security/2006-April/013163.html)
3. [beagle-indexing-command-execution(26104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26104)
4. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189282)
5. [](http://scary.beasts.org/security/CESA-2006-002.html)
6. [19778](http://secunia.com/advisories/19778)
7. [19781](http://secunia.com/advisories/19781)
8. [24938](http://www.osvdb.org/24938)
9. [19897](http://secunia.com/advisories/19897)
10. [SUSE-SR:2006:009](http://www.novell.com/linux/security/advisories/2006_04_28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4905
- **State**: PUBLISHED
- **Published Date**: September 17, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in mod/contak.php in AuraCMS 2.1 allows remote attackers to upload and execute arbitrary PHP files via the image parameter, which places a file under files/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [auracms-index-file-upload(36539)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36539)
2. [4390](https://www.exploit-db.com/exploits/4390)
3. [40505](http://osvdb.org/40505)
4. [](http://www.auracms.org/?pilih=news&aksi=lihat&id=117)
5. [26747](http://secunia.com/advisories/26747)
6. [25621](http://www.securityfocus.com/bid/25621) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20680
- **State**: PUBLISHED
- **Published Date**: January 09, 2019 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Frog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/philippe/FrogCMS/issues/22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28748
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 07:10 UTC
- **Last Updated**: August 02, 2024 at 00:56 UTC
- **Reserved Date**: March 08, 2024 at 08:39 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
A remote attacker with high privileges may use a reading file function to inject OS commands.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**ifm - Smart PLC AC14xx Firmware**
Affected versions:
- 0 (Status: affected)
**ifm - Smart PLC AC4xxS Firmware**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2024-012)
### Credits
- Logan Carpenter
- Dragos |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32074
- **State**: PUBLISHED
- **Published Date**: July 13, 2022 at 15:35 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owasp.org/www-community/attacks/xss/)
2. [](https://github.com/osTicket/osTicket-plugins)
3. [](https://github.com/osTicket/osTicket-plugins/commit/a7842d494889fd5533d13deb3c6a7789768795ae) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20713
- **State**: PUBLISHED
- **Published Date**: May 24, 2021 at 03:20 UTC
- **Last Updated**: August 03, 2024 at 17:53 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Privilege escalation vulnerability in QND Advance/Premium/Standard Ver.11.0.4i and earlier allows an attacker who can log in to the PC where the product's Windows client is installed to gain administrative privileges via unspecified vectors. As a result, sensitive information may be altered/obtained or unintended operations may be performed.
### Affected Products
**QualitySoft Corporation - QND Advance/Premium/Standard**
Affected versions:
- Ver.11.0.4i and earlier (Status: affected)
### References
1. [](https://www.qualitysoft.com/product/qnd_vulnerabilities_2021/)
2. [](https://jvn.jp/en/jp/JVN74686032/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5482
- **State**: PUBLISHED
- **Published Date**: September 13, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:31 UTC
- **Reserved Date**: August 22, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Prime LAN Management Solution (LMS) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCug77823.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130912 Cisco Prime LAN Management Solution Cross-Frame Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5482) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28880
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 16:46 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: F-SecureUS
### Vulnerability Description
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**F-Secure - All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection**
Affected versions:
- All Version (Status: affected)
### References
1. [](https://www.withsecure.com/en/expertise/people)
2. [](https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17558
- **State**: PUBLISHED
- **Published Date**: December 30, 2019 at 16:36 UTC
- **Last Updated**: February 06, 2025 at 21:14 UTC
- **Reserved Date**: October 14, 2019 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
### Affected Products
**n/a - Apache Solr**
Affected versions:
- Apache Solr 5.0.0 to Apache Solr 8.3.1 (Status: affected)
### References
1. [[lucene-issues] 20200107 [jira] [Commented] (SOLR-13971) CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a%40%3Cissues.lucene.apache.org%3E)
2. [[lucene-issues] 20200108 [jira] [Commented] (SOLR-13971) CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f%40%3Cissues.lucene.apache.org%3E)
3. [[lucene-issues] 20200108 [jira] [Updated] (SOLR-14025) CVE-2019-17558: Velocity response writer RCE vulnerability persists after 8.3.1](https://lists.apache.org/thread.html/ra29fa6ede5184385bf2c63e8ec054990a7d4622bba1d244bee70d82d%40%3Cissues.lucene.apache.org%3E)
4. [[lucene-issues] 20200108 [GitHub] [lucene-solr] Sachpat opened a new pull request #1156: SOLR-13971](https://lists.apache.org/thread.html/r36e35fd76239a381643555966fb3e72139e018d52d76544fb42f96d8%40%3Cissues.lucene.apache.org%3E)
5. [[lucene-issues] 20200108 [GitHub] [lucene-solr] Sachpat commented on a change in pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r5074d814d3a8c75df4b20e66bfd268ee0a73ddea7e85070cec3ae78d%40%3Cissues.lucene.apache.org%3E)
6. [[lucene-issues] 20200108 [GitHub] [lucene-solr] artem-smotrakov commented on a change in pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/rf6d7ffae2b940114324e036b6394beadf27696d051ae0c4a5edf07af%40%3Cissues.lucene.apache.org%3E)
7. [[lucene-issues] 20200108 [GitHub] [lucene-solr] Sachpat commented on issue #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r58c58fe51c87bc30ee13bb8b4c83587f023edb349018705208e65b37%40%3Cissues.lucene.apache.org%3E)
8. [[lucene-issues] 20200113 [GitHub] [lucene-solr] Sachpat closed pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r25f1bd4545617f5b86dde27b4c30fec73117af65598a30e20209739a%40%3Cissues.lucene.apache.org%3E)
9. [[lucene-issues] 20200113 [jira] [Commented] (SOLR-14025) CVE-2019-17558: Velocity response writer RCE vulnerability persists after 8.3.1](https://lists.apache.org/thread.html/r12ab2cb15a34e49b4fecb5b2bdd7e10f3e8b7bf1f4f47fcde34d3a7c%40%3Cissues.lucene.apache.org%3E)
10. [[lucene-issues] 20200113 [GitHub] [lucene-solr] chatman commented on issue #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r99c3f7ec3a079e2abbd540ecdb55a0e2a0f349ca7084273a12e87aeb%40%3Cissues.lucene.apache.org%3E)
11. [[lucene-issues] 20200113 [GitHub] [lucene-solr] Sachpat commented on issue #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r0b7b9d4113e6ec1ae1d3d0898c645f758511107ea44f0f3a1210c5d5%40%3Cissues.lucene.apache.org%3E)
12. [[lucene-dev] 20200213 Re: 7.7.3 bugfix release](https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51%40%3Cdev.lucene.apache.org%3E)
13. [[lucene-dev] 20200214 Re: 7.7.3 bugfix release](https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66%40%3Cdev.lucene.apache.org%3E)
14. [[lucene-issues] 20200219 [jira] [Updated] (SOLR-14025) CVE-2019-17558: Velocity response writer RCE vulnerability persists after 8.3.1](https://lists.apache.org/thread.html/rafc939fdd753f55707841cd5886fc7fcad4d8d8ba0c72429b3220a9a%40%3Cissues.lucene.apache.org%3E)
15. [[ambari-issues] 20200220 [jira] [Created] (AMBARI-25482) solr dependence CVE-2019-17558](https://lists.apache.org/thread.html/rde3dbd8e646dabf8bef1b097e9a13ee0ecbdb8441aaed6092726c98d%40%3Cissues.ambari.apache.org%3E)
16. [[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1](https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E)
17. [[lucene-solr-user] 20200320 Re: CVEs (vulnerabilities) that apply to Solr 8.4.1](https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E)
18. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
19. [](https://issues.apache.org/jira/browse/SOLR-13971)
20. [](http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html)
21. [[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #474: There is a vulnerability in Apache Solr 5.5.4,upgrade recommended](https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8%40%3Ccommits.submarine.apache.org%3E)
22. [[lucene-solr-user] 20210203 Re: SolrCloud keeps crashing](https://lists.apache.org/thread.html/r79c7e75f90e735fd32c4e3e97340625aab66c09dfe8c4dc0ab768b69%40%3Csolr-user.lucene.apache.org%3E)
23. [[lucene-issues] 20210210 [GitHub] [lucene-solr] rhtham edited a comment on pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/re8d12db916b5582a23ed144b9c5abd0bea0be1649231aa880f6cbfff%40%3Cissues.lucene.apache.org%3E)
24. [[lucene-issues] 20210210 [GitHub] [lucene-solr] rhtham commented on pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r8a36e4f92f4449dec517e560e1b55639f31b3aca26c37bbad45e31de%40%3Cissues.lucene.apache.org%3E)
25. [[lucene-solr-user] 20210212 CVE-2019-17558 on SOLR 6.1](https://lists.apache.org/thread.html/r7b89b3dcfc1b6c52dd8d610b897ac98408245040c92b484fe97a51a2%40%3Csolr-user.lucene.apache.org%3E)
26. [[lucene-solr-user] 20210212 Re: CVE-2019-17558 on SOLR 6.1](https://lists.apache.org/thread.html/r8e7a3c253a695a7667da0b0ec57f9bb0e31f039e62afbc00a1d96f7b%40%3Csolr-user.lucene.apache.org%3E)
27. [[lucene-solr-user] 20210213 Re: CVE-2019-17558 on SOLR 6.1](https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12%40%3Csolr-user.lucene.apache.org%3E)
28. [[lucene-issues] 20210315 [GitHub] [lucene-solr] erikhatcher commented on pull request #1156: SOLR-13971: CVE-2019-17558: Velocity custom template RCE vulnerability](https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071%40%3Cissues.lucene.apache.org%3E)
29. [[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves](https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1%40%3Ccommits.druid.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1338
- **State**: PUBLISHED
- **Published Date**: February 16, 2025 at 11:00 UTC
- **Last Updated**: February 18, 2025 at 16:10 UTC
- **Reserved Date**: February 15, 2025 at 14:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-74: Security Weakness
### Affected Products
**NUUO - Camera**
Affected versions:
- 20250203 (Status: affected)
### References
1. [VDB-295954 | NUUO Camera handle_config.php print_file command injection](https://vuldb.com/?id.295954)
2. [VDB-295954 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295954)
3. [Submit #493912 | NUUO NUUO Came handle_config.php Command Injection](https://vuldb.com/?submit.493912)
4. [](https://pan.baidu.com/s/1YW52iM0ehUfFKa_CiTHBjQ?from=init&pwd=kqec)
### Credits
- alc9700 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5617
- **State**: PUBLISHED
- **Published Date**: October 21, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 21, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in VMware Player 1.0.x before 1.0.5 and 2.0 before 2.0.1, and Workstation 5.x before 5.5.5 and 6.x before 6.0.1, prevents it from launching, which has unspecified impact, related to untrusted virtual machine images.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player](http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html)
2. [GLSA-200711-23](http://security.gentoo.org/glsa/glsa-200711-23.xml)
3. [ADV-2007-3229](http://www.vupen.com/english/advisories/2007/3229)
4. [](http://www.vmware.com/support/player2/doc/releasenotes_player2.html)
5. [26890](http://secunia.com/advisories/26890)
6. [](http://www.vmware.com/support/player/doc/releasenotes_player.html)
7. [](http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html)
8. [27706](http://secunia.com/advisories/27706)
9. [](http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37844
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 13:56 UTC
- **Reserved Date**: June 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in MangoOS before 5.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/herombey/Disclosures/tree/main)
2. [](https://github.com/herombey/Disclosures/blob/main/CVE-2024-37844%20XSS.pdf) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.