System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4624 - **State**: PUBLISHED - **Published Date**: January 06, 2006 at 11:00 UTC - **Last Updated**: September 16, 2024 at 18:29 UTC - **Reserved Date**: January 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The m_join function in channel.c for PTnet ircd 1.5 and 1.6 allows remote attackers to cause a denial of service (memory exhaustion that triggers a daemon restart) via a large number of requests to join a "charmed channel" such as PTnet, #PTnoticias and #*.log, which causes ircd to open the channel even though it does not have any valid users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051230 PTnet IRCD heap exhaustion and integer overflow](http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1476.html) 2. [16089](http://www.securityfocus.com/bid/16089) 3. [1015425](http://securitytracker.com/id?1015425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47833 - **State**: PUBLISHED - **Published Date**: November 22, 2023 at 23:13 UTC - **Last Updated**: August 02, 2024 at 21:16 UTC - **Reserved Date**: November 12, 2023 at 23:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Schmit Theater for WordPress plugin <= 0.18.3 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Jeroen Schmit - Theater for WordPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/theatre/wordpress-theater-for-wordpress-plugin-0-18-3-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - DoYeon Park / p6rkdoye0n (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26243, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26243 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26243 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 17:00 UTC - **Last Updated**: May 03, 2025 at 00:39 UTC - **Reserved Date**: February 15, 2024 at 00:57 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows USB Print Driver Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) ### References 1. [Windows USB Print Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26243)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1744, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1744 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1744 - **State**: PUBLISHED - **Published Date**: February 26, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 01:00 UTC - **Reserved Date**: February 26, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Easy File Sharing (EFS) Webserver 1.25 allows remote attackers to cause a denial of service (CPU consumption or crash) via many large HTTP requests. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [easyfilesharing-http-request-dos(17110)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17110) 2. [12372](http://secunia.com/advisories/12372) 3. [20040824 Easy File Sharing Webserver v1.25 Vulnerabilities](http://marc.info/?l=bugtraq&m=109341398102863&w=2) 4. [11036](http://www.securityfocus.com/bid/11036) 5. [9175](http://www.osvdb.org/9175) 6. [](http://www.gulftech.org/?node=research&article_id=00045-08242004) 7. [1011045](http://securitytracker.com/id?1011045)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19053 - **State**: PUBLISHED - **Published Date**: November 18, 2019 at 05:23 UTC - **Last Updated**: August 05, 2024 at 02:09 UTC - **Reserved Date**: November 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51) 2. [](https://security.netapp.com/advisory/ntap-20191205-0001/) 3. [USN-4300-1](https://usn.ubuntu.com/4300-1/) 4. [USN-4301-1](https://usn.ubuntu.com/4301-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3374 - **State**: PUBLISHED - **Published Date**: November 25, 2019 at 23:13 UTC - **Last Updated**: August 06, 2024 at 23:29 UTC - **Reserved Date**: August 30, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack. ### Affected Products **apt - apt** Affected versions: - All versions (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2011-3374) 2. [](https://access.redhat.com/security/cve/cve-2011-3374) 3. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480) 4. [](https://snyk.io/vuln/SNYK-LINUX-APT-116518) 5. [](https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html) 6. [](https://seclists.org/fulldisclosure/2011/Sep/221) 7. [](https://ubuntu.com/security/CVE-2011-3374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35555 - **State**: PUBLISHED - **Published Date**: December 18, 2020 at 08:44 UTC - **Last Updated**: August 04, 2024 at 17:09 UTC - **Reserved Date**: December 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on LG mobile devices with Android OS 10 software. When a dual-screen configuration is supported, the device does not lock upon disconnection of a call with the cover closed. The LG ID is LVE-SMP-200027 (December 2020). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lgsecurity.lge.com/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21586, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21586 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21586 - **State**: PUBLISHED - **Published Date**: July 01, 2024 at 16:34 UTC - **Last Updated**: August 01, 2024 at 22:27 UTC - **Reserved Date**: December 27, 2023 at 19:38 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition. This issue affects Junos OS on SRX Series: * 21.4 versions before 21.4R3-S7.9, * 22.1 versions before 22.1R3-S5.3, * 22.2 versions before 22.2R3-S4.11, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R3. This issue affects Junos OS on NFX Series: * 21.4 versions before 21.4R3-S8, * 22.1 versions after 22.1R1, * 22.2 versions before 22.2R3-S5, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R3. Junos OS versions prior to 21.4R1 are not affected by this issue. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: unaffected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) **Juniper Networks - Junos OS** Affected versions: - 0 (Status: unaffected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA83195)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27232, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27232 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27232 - **State**: PUBLISHED - **Published Date**: March 28, 2023 at 00:00 UTC - **Last Updated**: February 18, 2025 at 20:15 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the wanStrategy parameter at /setting/setWanIeCfg. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Am1ngl/ttt/tree/main/32)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46842, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46842 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46842 - **State**: PUBLISHED - **Published Date**: September 27, 2024 at 12:39 UTC - **Last Updated**: May 04, 2025 at 09:35 UTC - **Reserved Date**: September 11, 2024 at 15:12 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the routine unconditionally frees submitted mailbox commands regardless of return status. The issue is that for MBX_TIMEOUT cases, when firmware returns SFP information at a later time, that same mailbox memory region references previously freed memory in its cmpl routine. Fix by adding checks for the MBX_TIMEOUT return code. During mailbox resource cleanup, check the mbox flag to make sure that the wait did not timeout. If the MBOX_WAKE flag is not set, then do not free the resources because it will be freed when firmware completes the mailbox at a later time in its cmpl routine. Also, increase the timeout from 30 to 60 seconds to accommodate boot scripts requiring longer timeouts. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.10.10 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/bba47fe3b038cca3d3ebd799665ce69d6d273b58) 2. [](https://git.kernel.org/stable/c/ede596b1434b57c0b3fd5c02b326efe5c54f6e48)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4017 - **State**: PUBLISHED - **Published Date**: June 10, 2014 at 14:00 UTC - **Last Updated**: September 16, 2024 at 16:58 UTC - **Reserved Date**: June 10, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Conversion Ninja plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter to lp/index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/126781/WordPress-Conversion-Ninja-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0135 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 00:00 UTC - **Last Updated**: May 05, 2025 at 16:10 UTC - **Reserved Date**: January 09, 2023 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium) ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1385831) 3. [GLSA-202305-10](https://security.gentoo.org/glsa/202305-10) 4. [GLSA-202311-11](https://security.gentoo.org/glsa/202311-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23510 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:06 UTC - **Last Updated**: January 17, 2025 at 19:23 UTC - **Reserved Date**: January 16, 2025 at 11:25 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Zaantar - WordPress Logging Service** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wordpress-logging-service/vulnerability/wordpress-wordpress-logging-service-plugin-1-5-4-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1177 - **State**: PUBLISHED - **Published Date**: August 28, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 04:33 UTC - **Reserved Date**: January 17, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Exponent CMS 2.3.2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/130058/Exponent-CMS-2.3.2-Cross-Site-Scripting.html) 2. [20150122 CVE-2015-1177-xss-exponent](http://www.securityfocus.com/archive/1/534528/100/0/threaded) 3. [72274](http://www.securityfocus.com/bid/72274)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47750 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 12:14 UTC - **Last Updated**: May 04, 2025 at 09:39 UTC - **Reserved Date**: September 30, 2024 at 16:00 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 Currently rsv_qp is freed before ib_unregister_device() is called on HIP08. During the time interval, users can still dereg MR and rsv_qp will be used in this process, leading to a UAF. Move the release of rsv_qp after calling ib_unregister_device() to fix it. ### Affected Products **Linux - Linux** Affected versions: - 70f92521584f1d1e8268311ee84413307b0fdea8 (Status: affected) - 70f92521584f1d1e8268311ee84413307b0fdea8 (Status: affected) - 70f92521584f1d1e8268311ee84413307b0fdea8 (Status: affected) - 70f92521584f1d1e8268311ee84413307b0fdea8 (Status: affected) - 70f92521584f1d1e8268311ee84413307b0fdea8 (Status: affected) **Linux - Linux** Affected versions: - 5.18 (Status: affected) - 0 (Status: unaffected) - 6.1.113 (Status: unaffected) - 6.6.54 (Status: unaffected) - 6.10.13 (Status: unaffected) - 6.11.2 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/2ccf1c75d39949d8ea043d04a2e92d7100ea723d) 2. [](https://git.kernel.org/stable/c/d2d9c5127122745da6e887f451dd248cfeffca33) 3. [](https://git.kernel.org/stable/c/dac2723d8bfa9cf5333f477741e6e5fa1ed34645) 4. [](https://git.kernel.org/stable/c/60595923371c2ebe7faf82536c47eb0c967e3425) 5. [](https://git.kernel.org/stable/c/fd8489294dd2beefb70f12ec4f6132aeec61a4d0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11130 - **State**: PUBLISHED - **Published Date**: November 12, 2024 at 15:00 UTC - **Last Updated**: November 12, 2024 at 15:51 UTC - **Reserved Date**: November 12, 2024 at 08:52 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **n/a - ZZCMS** Affected versions: - 2023 (Status: affected) ### References 1. [VDB-283976 | ZZCMS msg.php cross site scripting](https://vuldb.com/?id.283976) 2. [VDB-283976 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.283976) 3. [Submit #439699 | ZZCMS 2023 Cross Site Scripting](https://vuldb.com/?submit.439699) 4. [](https://github.com/En0t5/vul/blob/main/zzcms-msg-xss.md) ### Credits - NLow6jRm5wxb3RNyziGE (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9512, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9512 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9512 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 21, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2790 - **State**: PUBLISHED - **Published Date**: August 19, 2022 at 22:32 UTC - **Last Updated**: April 16, 2025 at 16:12 UTC - **Reserved Date**: August 11, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-347 Improper Verification of Cryptographic Signature, and does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files). ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **Emerson Electric - Proficy Machine Edition** Affected versions: - all (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-06) ### Credits - Sharon Brizinov of Claroty reported this vulnerability to Emerson and CISA
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22561 - **State**: PUBLISHED - **Published Date**: April 12, 2022 at 17:50 UTC - **Last Updated**: September 16, 2024 at 19:50 UTC - **Reserved Date**: January 04, 2022 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contain an improper restriction of excessive authentication attempts. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to compromised accounts. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 8.2.x-9.3.0.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000195815)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27299 - **State**: PUBLISHED - **Published Date**: April 26, 2022 at 13:40 UTC - **Last Updated**: August 03, 2024 at 05:25 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the component room.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kabirkhyrul/HMS/discussions/14)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2108 - **State**: PUBLISHED - **Published Date**: April 16, 2023 at 07:31 UTC - **Last Updated**: August 02, 2024 at 06:12 UTC - **Reserved Date**: April 16, 2023 at 07:10 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in SourceCodester Judging Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_contestant.php. The manipulation of the argument contestant_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226147. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Judging Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.226147) 2. [](https://vuldb.com/?ctiid.226147) 3. [](https://github.com/hackerzyq/mycve/blob/main/vendors/oretnom23/judging-management-system/SQLi-1.md) ### Credits - zhengyiqun (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0856, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0856 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0856 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 13, 2004 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29576 - **State**: PUBLISHED - **Published Date**: December 08, 2020 at 15:28 UTC - **Last Updated**: August 04, 2024 at 16:55 UTC - **Reserved Date**: December 05, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The official eggdrop Docker images before 1.8.4rc2 contain a blank password for a root user. Systems using the Eggdrop Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/koharin/koharin2/blob/main/CVE-2020-29576)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46721 - **State**: REJECTED - **Last Updated**: March 17, 2025 at 22:38 UTC - **Reserved Date**: October 25, 2023 at 08:43 UTC - **Assigned By**: fortinet ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19502 - **State**: PUBLISHED - **Published Date**: November 23, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 11:37 UTC - **Reserved Date**: November 23, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.1. There was a heap-based buffer overflow in the function excluded_channels() in libfaad/syntax.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TeamSeri0us/pocs/tree/master/faad) 2. [](https://sourceforge.net/p/faac/bugs/240/) 3. [[debian-lts-announce] 20190828 [SECURITY] [DLA 1899-1] faad2 security update](https://lists.debian.org/debian-lts-announce/2019/08/msg00033.html) 4. [DSA-4522](https://www.debian.org/security/2019/dsa-4522) 5. [20190916 [SECURITY] [DSA 4522-1] faad2 security update](https://seclists.org/bugtraq/2019/Sep/28) 6. [GLSA-202006-17](https://security.gentoo.org/glsa/202006-17)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4375, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4375 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4375 - **State**: PUBLISHED - **Published Date**: June 15, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 05, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Chaos tool suite (ctools) module 7.x-1.x before 7.x-1.7 for Drupal allows remote attackers to obtain sensitive node titles via (1) an autocomplete search on custom entities without an access query tag or (2) leveraging knowledge of the ID of an entity. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150322 CVE requests for Drupal contributed modules](http://www.openwall.com/lists/oss-security/2015/03/22/35) 2. [[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)](http://www.openwall.com/lists/oss-security/2015/04/25/6) 3. [](https://www.drupal.org/node/2454909) 4. [](https://www.drupal.org/node/2454883)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0257 - **State**: PUBLISHED - **Published Date**: January 17, 2022 at 15:15 UTC - **Last Updated**: August 02, 2024 at 23:25 UTC - **Reserved Date**: January 17, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **pimcore - pimcore/pimcore** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6) 2. [](https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1215, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1215 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1215 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 09:34 UTC - **Reserved Date**: January 07, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple buffer overflows in Core FTP Server before 1.2 build 508 allow local users to gain privileges via vectors related to reading data from config.dat and Windows Registry. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1215/) 2. [20140218 CVE-2014-1215 - Local Code Execution in CoreFTP Core FTP Server](http://www.securityfocus.com/archive/1/531144/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0132 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [expreserve(401)](https://exchange.xforce.ibmcloud.com/vulnerabilities/401) 2. [11723](http://www.osvdb.org/11723) 3. [CA-1996-19](http://www.cert.org/advisories/CA-1996-19.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5337 - **State**: PUBLISHED - **Published Date**: October 20, 2023 at 07:29 UTC - **Last Updated**: February 05, 2025 at 19:05 UTC - **Reserved Date**: October 02, 2023 at 12:35 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Contact form Form For All plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formforall' shortcode in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **formforall - Contact form Form For All – Easy to use, fast, 37 languages.** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/abe2f596-b2c3-49d3-b646-0f4b64f15674?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/formforall/trunk/formforall_common.php#L21) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1080 - **State**: PUBLISHED - **Published Date**: January 22, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: November 29, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Quake 1 (quake1) and ProQuake 1.01 and earlier allow remote attackers to cause a denial of service via a malformed (empty) UDP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://proquake.ai.mit.edu/) 2. [quake-empty-udp-dos(5527)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5527) 3. [20001102 dos on quake1 servers](http://marc.info/?l=bugtraq&m=97318797630246&w=2) 4. [1900](http://www.securityfocus.com/bid/1900)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25896 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 00:00 UTC - **Last Updated**: November 21, 2024 at 20:18 UTC - **Reserved Date**: February 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ChurchCRM 5.5.0 EventEditor.php is vulnerable to Blind SQL Injection (Time-based) via the EID POST parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ChurchCRM/CRM/issues/6854)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37039 - **State**: PUBLISHED - **Published Date**: December 08, 2021 at 14:11 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. ### Affected Products **Huawei - EMUI** Affected versions: - 11.0.0 (Status: affected) - 10.1.1 (Status: affected) **Huawei - Magic UI** Affected versions: - 4.0.0 (Status: affected) - 3.1.1 (Status: affected) **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2021/9/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42552 - **State**: PUBLISHED - **Published Date**: August 20, 2024 at 00:00 UTC - **Last Updated**: August 22, 2024 at 14:20 UTC - **Reserved Date**: August 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_room_history.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/topsky979/2386856df3f3ffa7bdc4738e24da4af3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-100018, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-100018 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-100018 - **State**: PUBLISHED - **Published Date**: January 13, 2015 at 15:00 UTC - **Last Updated**: September 16, 2024 at 22:25 UTC - **Reserved Date**: January 13, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Unconfirmed plugin before 1.2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter in the unconfirmed page to wp-admin/network/users.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://security.dxw.com/advisories/xss-in-unconfirmed-1-2-3/) 2. [66781](http://www.securityfocus.com/bid/66781) 3. [57838](http://secunia.com/advisories/57838) 4. [](https://wordpress.org/plugins/unconfirmed/changelog/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35004 - **State**: PUBLISHED - **Published Date**: January 21, 2022 at 15:45 UTC - **Last Updated**: August 04, 2024 at 00:26 UTC - **Reserved Date**: June 17, 2021 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link TL-WA1201 1.0.1 Build 20200709 rel.66244(5553) wireless access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14656. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **TP-Link - TL-WA1201** Affected versions: - 1.0.1 Build 20200709 rel.66244(5553) (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-22-081/) ### Credits - Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9670, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9670 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9670 - **State**: PUBLISHED - **Published Date**: June 15, 2017 at 13:00 UTC - **Last Updated**: September 16, 2024 at 16:13 UTC - **Reserved Date**: June 15, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/gnuplot/bugs/1933/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45297, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45297 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45297 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 20:24 UTC - **Last Updated**: October 08, 2024 at 18:13 UTC - **Reserved Date**: August 26, 2024 at 18:25 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **discourse - discourse** Affected versions: - stable: < 3.3.2 (Status: affected) - beta: < 3.4.0.beta2 (Status: affected) ### References 1. [https://github.com/discourse/discourse/security/advisories/GHSA-58xw-3qr3-53gp](https://github.com/discourse/discourse/security/advisories/GHSA-58xw-3qr3-53gp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43523 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 05:47 UTC - **Last Updated**: August 02, 2024 at 19:44 UTC - **Reserved Date**: September 19, 2023 at 14:48 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS while processing 11AZ RTT management action frame received through OTA. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-617: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - AR8035 (Status: affected) - CSR8811 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - Immersive Home 214 Platform (Status: affected) - Immersive Home 216 Platform (Status: affected) - Immersive Home 316 Platform (Status: affected) - Immersive Home 318 Platform (Status: affected) - Immersive Home 3210 Platform (Status: affected) - Immersive Home 326 Platform (Status: affected) - IPQ5010 (Status: affected) - IPQ5028 (Status: affected) - IPQ5302 (Status: affected) - IPQ5312 (Status: affected) - IPQ5332 (Status: affected) - IPQ6000 (Status: affected) - IPQ6010 (Status: affected) - IPQ6018 (Status: affected) - IPQ6028 (Status: affected) - IPQ8070A (Status: affected) - IPQ8071A (Status: affected) - IPQ8072A (Status: affected) - IPQ8074A (Status: affected) - IPQ8076 (Status: affected) - IPQ8076A (Status: affected) - IPQ8078 (Status: affected) - IPQ8078A (Status: affected) - IPQ8173 (Status: affected) - IPQ8174 (Status: affected) - IPQ9008 (Status: affected) - IPQ9554 (Status: affected) - IPQ9570 (Status: affected) - IPQ9574 (Status: affected) - QAM8255P (Status: affected) - QAM8650P (Status: affected) - QAM8775P (Status: affected) - QCA0000 (Status: affected) - QCA4024 (Status: affected) - QCA6391 (Status: affected) - QCA6426 (Status: affected) - QCA6436 (Status: affected) - QCA6554A (Status: affected) - QCA6564AU (Status: affected) - QCA6574 (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA6797AQ (Status: affected) - QCA8072 (Status: affected) - QCA8075 (Status: affected) - QCA8081 (Status: affected) - QCA8082 (Status: affected) - QCA8084 (Status: affected) - QCA8085 (Status: affected) - QCA8337 (Status: affected) - QCA8386 (Status: affected) - QCA9888 (Status: affected) - QCA9889 (Status: affected) - QCC2073 (Status: affected) - QCC2076 (Status: affected) - QCC710 (Status: affected) - QCF8000 (Status: affected) - QCF8001 (Status: affected) - QCM8550 (Status: affected) - QCN5022 (Status: affected) - QCN5024 (Status: affected) - QCN5052 (Status: affected) - QCN5054 (Status: affected) - QCN5122 (Status: affected) - QCN5124 (Status: affected) - QCN5152 (Status: affected) - QCN5154 (Status: affected) - QCN5164 (Status: affected) - QCN6023 (Status: affected) - QCN6024 (Status: affected) - QCN6122 (Status: affected) - QCN6132 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN6402 (Status: affected) - QCN6412 (Status: affected) - QCN6422 (Status: affected) - QCN6432 (Status: affected) - QCN9000 (Status: affected) - QCN9001 (Status: affected) - QCN9002 (Status: affected) - QCN9003 (Status: affected) - QCN9012 (Status: affected) - QCN9013 (Status: affected) - QCN9022 (Status: affected) - QCN9024 (Status: affected) - QCN9070 (Status: affected) - QCN9072 (Status: affected) - QCN9074 (Status: affected) - QCN9100 (Status: affected) - QCN9274 (Status: affected) - QCS8550 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - SC8380XP (Status: affected) - SD 8 Gen1 5G (Status: affected) - SD865 5G (Status: affected) - SDX65M (Status: affected) - SG8275P (Status: affected) - SM8550P (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8 Gen 3 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon AR2 Gen 1 Platform (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon XR2+ Gen 1 Platform (Status: affected) - SSG2115P (Status: affected) - SSG2125P (Status: affected) - SXR1230P (Status: affected) - SXR2130 (Status: affected) - SXR2230P (Status: affected) - WCD9340 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN6740 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6348, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6348 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6348 - **State**: PUBLISHED - **Published Date**: October 30, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:22 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The report-generation web interface in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and read report or status information, by visiting an unspecified web page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033970](http://www.securitytracker.com/id/1033970) 2. [20151026 Cisco Secure Access Control Server Role-Based Access Control Weak Protection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16720 - **State**: PUBLISHED - **Published Date**: January 05, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 20:35 UTC - **Reserved Date**: November 09, 2017 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **n/a - Advantech WebAccess** Affected versions: - Advantech WebAccess (Status: affected) ### References 1. [44278](https://www.exploit-db.com/exploits/44278/) 2. [102424](http://www.securityfocus.com/bid/102424) 3. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-004-02) 4. [](https://www.tenable.com/security/research/tra-2018-23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8962 - **State**: PUBLISHED - **Published Date**: February 15, 2018 at 22:00 UTC - **Last Updated**: September 16, 2024 at 18:18 UTC - **Reserved Date**: May 15, 2017 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. ### Affected Products **Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT** Affected versions: - 7.3 E0504P2 (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03787en_us) 2. [1039684](http://www.securitytracker.com/id/1039684)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47201 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 00:00 UTC - **Last Updated**: May 02, 2025 at 13:39 UTC - **Reserved Date**: May 02, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Intrexx Portal Server before 12.0.4, multiple Velocity-Scripts are susceptible to the execution of unrequested JavaScript code in HTML, aka XSS. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Intrexx - Portal Server** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.intrexx.com/en/security-advisories/ixsa-20250429-01/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26871, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26871 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26871 - **State**: PUBLISHED - **Published Date**: March 29, 2022 at 20:45 UTC - **Last Updated**: January 29, 2025 at 16:35 UTC - **Reserved Date**: March 10, 2022 at 00:00 UTC - **Assigned By**: trendmicro ### Vulnerability Description An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution. ### Affected Products **Trend Micro - Trend Micro Apex Central** Affected versions: - 2019 (on-premise), SaaS (Status: affected) ### References 1. [](https://success.trendmicro.com/solution/000290678) 2. [](https://success.trendmicro.com/jp/solution/000290660) 3. [](https://www.jpcert.or.jp/english/at/2022/at220008.html) 4. [](https://jvn.jp/vu/JVNVU99107357) 5. [](https://appweb.trendmicro.com/supportNews/NewsDetail.aspx?id=4435)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17832 - **State**: PUBLISHED - **Published Date**: December 22, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 21:06 UTC - **Reserved Date**: December 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ServersCheck Monitoring Software before 14.2.3 is prone to a cross-site scripting vulnerability as user supplied-data is not validated/sanitized when passed in the settings_SMS_ALERT_TYPE parameter, and JavaScript can be executed on settings-save.html (the Settings - SMS Alerts page). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/145517/ServersCheck-Monitoring-Software-Cross-Site-Scripting.html) 2. [](https://serverscheck.com/monitoring-software/release.asp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1426, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1426 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1426 - **State**: PUBLISHED - **Published Date**: May 03, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Uapplication Ublog Reload stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for mdb-database/blog.mdb (aka mdb-database/blog.msb). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15996](http://www.osvdb.org/15996) 2. [uapplication-information-disclosure(20314)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20314) 3. [1013830](http://securitytracker.com/id?1013830) 4. [8610](https://www.exploit-db.com/exploits/8610)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29027 - **State**: PUBLISHED - **Published Date**: March 24, 2021 at 12:03 UTC - **Last Updated**: August 03, 2024 at 21:55 UTC - **Reserved Date**: March 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/index.php URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8294 - **State**: PUBLISHED - **Published Date**: August 29, 2024 at 11:00 UTC - **Last Updated**: August 29, 2024 at 13:36 UTC - **Reserved Date**: August 29, 2024 at 05:33 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in FeehiCMS up to 2.1.1. This affects the function update of the file /admin/index.php?r=friendly-link%2Fupdate. The manipulation of the argument FriendlyLink[image] leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **n/a - FeehiCMS** Affected versions: - 2.1.0 (Status: affected) - 2.1.1 (Status: affected) ### References 1. [VDB-276069 | FeehiCMS index.php update unrestricted upload](https://vuldb.com/?id.276069) 2. [VDB-276069 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276069) 3. [Submit #394556 | FeehiCMS 2.1.1 Upload any file you want](https://vuldb.com/?submit.394556) 4. [](https://gitee.com/A0kooo/cve_article/blob/master/feehi_cms/Fichkems%20Friendley-Link%20file%20upload%20vulnerability.md) ### Credits - 0kooo (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3016 - **State**: REJECTED - **Published Date**: August 17, 2010 at 17:00 UTC - **Last Updated**: September 16, 2024 at 19:21 UTC - **Reserved Date**: August 16, 2010 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24784 - **State**: PUBLISHED - **Published Date**: March 05, 2024 at 22:22 UTC - **Last Updated**: February 13, 2025 at 17:40 UTC - **Reserved Date**: January 30, 2024 at 16:05 UTC - **Assigned By**: Go ### Vulnerability Description The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. ### Affected Products **Go standard library - net/mail** Affected versions: - 0 (Status: affected) - 1.22.0-0 (Status: affected) ### References 1. [](https://go.dev/issue/65083) 2. [](https://go.dev/cl/555596) 3. [](https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg) 4. [](https://pkg.go.dev/vuln/GO-2024-2609) 5. [](https://security.netapp.com/advisory/ntap-20240329-0007/) 6. [](http://www.openwall.com/lists/oss-security/2024/03/08/4) ### Credits - Juho Nurminen of Mattermost - Slonser (https://github.com/Slonser)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43588 - **State**: PUBLISHED - **Published Date**: November 28, 2022 at 10:20 UTC - **Last Updated**: April 15, 2025 at 18:39 UTC - **Reserved Date**: October 21, 2022 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Callback technologies - CBFS Filter** Affected versions: - 20.0.8317 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21417 - **State**: PUBLISHED - **Published Date**: April 29, 2021 at 17:10 UTC - **Last Updated**: August 03, 2024 at 18:09 UTC - **Reserved Date**: December 22, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description fluidsynth is a software synthesizer based on the SoundFont 2 specifications. A use after free violation was discovered in fluidsynth, that can be triggered when loading an invalid SoundFont file. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **FluidSynth - fluidsynth** Affected versions: - < 2.1.8 (Status: affected) ### References 1. [](https://github.com/FluidSynth/fluidsynth/issues/808) 2. [](https://github.com/FluidSynth/fluidsynth/pull/810) 3. [](https://github.com/FluidSynth/fluidsynth/security/advisories/GHSA-6fcq-pxhc-jxc9) 4. [[debian-lts-announce] 20210629 [SECURITY] [DLA 2697-1] fluidsynth security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4786 - **State**: PUBLISHED - **Published Date**: July 08, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: July 08, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi) 2. [](http://fish2.com/ipmi/remote-pw-cracking.html) 3. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764) 4. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html) 5. [HPSBHF02981](http://marc.info/?l=bugtraq&m=139653661621384&w=2) 6. [](https://security.netapp.com/advisory/ntap-20190919-0005/) 7. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5010)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8937 - **State**: PUBLISHED - **Published Date**: June 01, 2020 at 16:26 UTC - **Last Updated**: August 06, 2024 at 13:33 UTC - **Reserved Date**: November 15, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Lexiglot through 2014-11-20 allows denial of service because api/update.php launches svn update operations that use a great deal of resources. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.justanotherhacker.com/2018/05/jahx181_-_piwigo_lexiglot_multiple_vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13037 - **State**: REJECTED - **Published Date**: January 14, 2022 at 16:24 UTC - **Last Updated**: January 14, 2022 at 16:24 UTC - **Reserved Date**: May 15, 2020 at 00:00 UTC - **Assigned By**: AMD ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36488 - **State**: PUBLISHED - **Published Date**: August 25, 2022 at 13:55 UTC - **Last Updated**: August 03, 2024 at 10:07 UTC - **Reserved Date**: July 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51684, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51684 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51684 - **State**: PUBLISHED - **Published Date**: November 14, 2024 at 20:27 UTC - **Last Updated**: November 14, 2024 at 21:18 UTC - **Reserved Date**: October 30, 2024 at 15:05 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu W3P SEO allows Stored XSS.This issue affects W3P SEO: from n/a before 1.8.6. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Ciprian Popescu - W3P SEO** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-perfect-plugin/wordpress-w3p-seo-plugin-1-8-6-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1473 - **State**: PUBLISHED - **Published Date**: August 02, 2006 at 16:00 UTC - **Last Updated**: August 07, 2024 at 17:12 UTC - **Reserved Date**: March 28, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in AFP Server for Apple Mac OS X 10.3.9 and 10.4.7 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#575372](http://www.kb.cert.org/vuls/id/575372) 2. [APPLE-SA-2006-08-01](http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html) 3. [ADV-2006-3101](http://www.vupen.com/english/advisories/2006/3101) 4. [21253](http://secunia.com/advisories/21253) 5. [19289](http://www.securityfocus.com/bid/19289) 6. [TA06-214A](http://www.us-cert.gov/cas/techalerts/TA06-214A.html) 7. [1016620](http://securitytracker.com/id?1016620) 8. [macosx-afp-overflow(28135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28135) 9. [27731](http://www.osvdb.org/27731)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4513 - **State**: PUBLISHED - **Published Date**: November 05, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 15:01 UTC - **Reserved Date**: August 23, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple stack-based buffer overflows in IBM AIX 5.2 and 5.3 allow local users to gain privileges via a long argument to the (1) "-p" option to lqueryvg or (2) the "-V" option to lquerypv. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IZ05349](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05349) 2. [IZ05877](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05877) 3. [20071030 IBM AIX lqueryvg Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=614) 4. [](ftp://aix.software.ibm.com/aix/efixes/security/lqueryvg_ifix.tar) 5. [27437](http://secunia.com/advisories/27437) 6. [26259](http://www.securityfocus.com/bid/26259) 7. [aix-lqueryvg-sprintf-bo(38165)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38165) 8. [oval:org.mitre.oval:def:5650](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5650) 9. [1018871](http://securitytracker.com/id?1018871) 10. [26256](http://www.securityfocus.com/bid/26256) 11. [20071030 IBM AIX lquerypv Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=615) 12. [](ftp://aix.software.ibm.com/aix/efixes/security/lquerypv_ifix.tar) 13. [ADV-2007-3669](http://www.vupen.com/english/advisories/2007/3669) 14. [IZ05129](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05129) 15. [IZ05971](http://www-1.ibm.com/support/docview.wss?uid=isg1IZ05971)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32301 - **State**: PUBLISHED - **Published Date**: May 16, 2025 at 15:45 UTC - **Last Updated**: May 16, 2025 at 16:46 UTC - **Reserved Date**: April 04, 2025 at 10:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup CountDown Pro WP Plugin allows SQL Injection. This issue affects CountDown Pro WP Plugin: from n/a through 2.7. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **LambertGroup - CountDown Pro WP Plugin** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/circular_countdown/vulnerability/wordpress-countdown-pro-wp-plugin-2-7-sql-injection-vulnerability?_s_id=cve) ### Credits - Tran Nguyen Bao Khanh (VCI - VNPT Cyber Immunity) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3043 - **State**: PUBLISHED - **Published Date**: December 14, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 12, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Directory traversal vulnerability in the client in IBM Rational Software Architect Design Manager and Rhapsody Design Manager 3.x and 4.x before 4.0.5 allows local users to read arbitrary files via vectors involving temporary files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [rhapsody-dm-cve20133043-client-dir-trav(84769)](https://exchange.xforce.ibmcloud.com/vulnerabilities/84769) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21655724)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2570 - **State**: PUBLISHED - **Published Date**: April 23, 2019 at 18:16 UTC - **Last Updated**: October 02, 2024 at 15:49 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Siebel Core - Server BizLogic Script component of Oracle Siebel CRM (subcomponent: Integration - Scripting). The supported version that is affected is 19.3. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Siebel Core - Server BizLogic Script. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel Core - Server BizLogic Script accessible data as well as unauthorized read access to a subset of Siebel Core - Server BizLogic Script accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Siebel Core - Server BizLogic Script. CVSS 3.0 Base Score 4.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L). ### Affected Products **Oracle Corporation - Siebel Core - Server Framework** Affected versions: - 19.3 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7161 - **State**: PUBLISHED - **Published Date**: July 28, 2024 at 15:31 UTC - **Last Updated**: August 01, 2024 at 21:52 UTC - **Reserved Date**: July 27, 2024 at 20:14 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in SeaCMS 13.0. Affected by this vulnerability is an unknown functionality of the file /member.php?action=chgpwdsubmit of the component Password Change Handler. The manipulation of the argument newpwd/newpwd2 leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272575. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - SeaCMS** Affected versions: - 13.0 (Status: affected) ### References 1. [VDB-272575 | SeaCMS Password Change cross-site request forgery](https://vuldb.com/?id.272575) 2. [VDB-272575 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.272575) 3. [Submit #379473 | SeaCms V13.0 Cross-Site Request Forgery](https://vuldb.com/?submit.379473) 4. [](https://github.com/HuaQiPro/seacms/issues/30) ### Credits - jiashenghe (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6123 - **State**: PUBLISHED - **Published Date**: October 31, 2019 at 20:38 UTC - **Last Updated**: August 06, 2024 at 21:28 UTC - **Reserved Date**: December 06, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack." ### Affected Products **chicken - chicken** Affected versions: - before 4.8.0 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2012-6123) 2. [](https://access.redhat.com/security/cve/cve-2012-6123) 3. [](http://www.openwall.com/lists/oss-security/2013/02/08/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11199 - **State**: PUBLISHED - **Published Date**: July 29, 2019 at 15:36 UTC - **Last Updated**: August 04, 2024 at 22:48 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dolibarr ERP/CRM 9.0.1 was affected by stored XSS within uploaded files. These vulnerabilities allowed the execution of a JavaScript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. The vulnerabilities could be exploited by low privileged users to target administrators. The viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested MIME type. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49185 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:55 UTC - **Last Updated**: May 04, 2025 at 08:31 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak. ### Affected Products **Linux - Linux** Affected versions: - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) - 32e67eee670e1254ee5ab41e2f454680acb9c17c (Status: affected) **Linux - Linux** Affected versions: - 3.9 (Status: affected) - 0 (Status: unaffected) - 4.9.311 (Status: unaffected) - 4.14.276 (Status: unaffected) - 4.19.238 (Status: unaffected) - 5.4.189 (Status: unaffected) - 5.10.110 (Status: unaffected) - 5.15.33 (Status: unaffected) - 5.16.19 (Status: unaffected) - 5.17.2 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/59250d547542f1c7765a78dc97ddfe5e6b0d2ab0) 2. [](https://git.kernel.org/stable/c/0356d4b64a03d23daf99a2a29d7d7d91d6ec2ea8) 3. [](https://git.kernel.org/stable/c/0067ba448f1c29ca06e5aee00d8506889ed1f9d0) 4. [](https://git.kernel.org/stable/c/bc1e29a35147c1ba6ea2b06a16cb0028f7c852d2) 5. [](https://git.kernel.org/stable/c/669b05ff43bd7ed684379c6e2006a6dad5127b71) 6. [](https://git.kernel.org/stable/c/c52703355766c347f270df222a744e0c491a02f2) 7. [](https://git.kernel.org/stable/c/9511c6018cd772668def8b034bc67269847e591a) 8. [](https://git.kernel.org/stable/c/62580a40c9bef3d8a90629c64dda381344b35ffd) 9. [](https://git.kernel.org/stable/c/c09ac191b1f97cfa06f394dbfd7a5db07986cefc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7288 - **State**: PUBLISHED - **Published Date**: October 27, 2020 at 19:23 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 31, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved validation on the FaceTime server. This issue is fixed in macOS Mojave 10.14.3 Supplemental Update, iOS 12.1.4. A thorough security audit of the FaceTime service uncovered an issue with Live Photos . ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT209520) 2. [](https://support.apple.com/en-us/HT209521)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40104 - **State**: PUBLISHED - **Published Date**: September 27, 2021 at 11:56 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackerone.com/reports/1102088) 2. [](https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1240 - **State**: PUBLISHED - **Published Date**: November 27, 2017 at 21:00 UTC - **Last Updated**: September 16, 2024 at 18:43 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Rhapsody DM products could reveal sensitive information in HTTP 500 Internal Server Error responses. IBM X-Force ID: 124359. ### Affected Products **IBM - Rational Collaborative Lifecycle Management** Affected versions: - 4.0 (Status: affected) - 4.0.1 (Status: affected) - 4.0.2 (Status: affected) - 4.0.3 (Status: affected) - 4.0.4 (Status: affected) - 4.0.5 (Status: affected) - 4.0.6 (Status: affected) - 5.0 (Status: affected) - 4.0.7 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) ### References 1. [101976](http://www.securityfocus.com/bid/101976) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/124359) 3. [](http://www.ibm.com/support/docview.wss?uid=swg22010512)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5362 - **State**: PUBLISHED - **Published Date**: June 10, 2020 at 20:40 UTC - **Last Updated**: September 17, 2024 at 02:41 UTC - **Reserved Date**: January 03, 2020 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Dell - Dell Client Consumer and Commercial platforms** Affected versions: - https://www.dell.com/support/article/SLN321726 (Status: affected) ### References 1. [](https://www.dell.com/support/article/SLN321726)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4320, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4320 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4320 - **State**: PUBLISHED - **Published Date**: April 10, 2017 at 03:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource. ### Affected Products **n/a - Atlassian Bitbucket Server before 4.7.1** Affected versions: - Atlassian Bitbucket Server before 4.7.1 (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/BSERV-8819) 2. [97515](http://www.securityfocus.com/bid/97515) 3. [](https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0202 - **State**: PUBLISHED - **Published Date**: January 15, 2021 at 17:35 UTC - **Last Updated**: September 17, 2024 at 00:31 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 17.3R3-S8 (Status: affected) - 17.4R3-S2 (Status: affected) - 18.1 (Status: unaffected) - 19.1 (Status: unaffected) - 19.3 (Status: unaffected) - 20.1 (Status: unaffected) - 18.2R3-S4 (Status: affected) - 18.3R3-S2 (Status: affected) - 18.4R3-S1 (Status: affected) - 19.2R2 (Status: affected) - 19.4R2 (Status: affected) - 20.2R1 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11092)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24344 - **State**: PUBLISHED - **Published Date**: August 13, 2020 at 18:53 UTC - **Last Updated**: August 04, 2024 at 15:12 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jerryscript-project/jerryscript/issues/3976)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5486 - **State**: PUBLISHED - **Published Date**: December 12, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 12, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in admin.php in TurnkeyForms Text Link Sales allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32732](http://secunia.com/advisories/32732) 2. [32308](http://www.securityfocus.com/bid/32308) 3. [7124](https://www.exploit-db.com/exploits/7124) 4. [4719](http://securityreason.com/securityalert/4719) 5. [textlinksales-admin-sql-injection(46631)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46631)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36423, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36423 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36423 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 17:57 UTC - **Last Updated**: April 29, 2025 at 23:34 UTC - **Reserved Date**: June 21, 2023 at 15:14 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Remote Registry Service Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Microsoft Remote Registry Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30397 - **State**: PUBLISHED - **Published Date**: April 12, 2024 at 15:25 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 23:06 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Check for Unusual or Exceptional Conditions vulnerability in the the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS). The pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail. This CPU utilization of pkid can be checked using this command:   root@srx> show system processes extensive | match pkid   xxxxx  root  103  0  846M  136M  CPU1  1 569:00 100.00% pkid This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S10; * 21.2 versions prior to 21.2R3-S7; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: affected) - 21.2 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) - 23.2 (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA79179) 2. [](https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15973 - **State**: PUBLISHED - **Published Date**: November 26, 2019 at 03:11 UTC - **Last Updated**: November 21, 2024 at 19:05 UTC - **Reserved Date**: September 06, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected application. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected application. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cisco - Cisco Industrial Network Director** Affected versions: - unspecified (Status: affected) ### References 1. [20191106 Cisco Industrial Network Director Reflected Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-idn-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26379 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11132 - **State**: PUBLISHED - **Published Date**: May 31, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 08:01 UTC - **Reserved Date**: May 15, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.coresecurity.com/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9625 - **State**: PUBLISHED - **Published Date**: January 24, 2020 at 21:57 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 20, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14) 2. [](http://openwall.com/lists/oss-security/2015/01/20/5) 3. [](https://www.videolan.org/security/sa1501.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5894, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5894 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5894 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 01:33 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [64873](http://www.securityfocus.com/bid/64873) 2. [oracle-cpujan2014-cve20135894(90376)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90376) 3. [56491](http://secunia.com/advisories/56491) 4. [102065](http://osvdb.org/102065) 5. [64758](http://www.securityfocus.com/bid/64758) 6. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html) 7. [GLSA-201409-04](http://security.gentoo.org/glsa/glsa-201409-04.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28496 - **State**: PUBLISHED - **Published Date**: March 23, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 15:46 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 discovered to contain a command injection vulnerability in the setPasswordCfg function via the adminuser and adminpassparameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/B2eFly/Router/blob/main/totolink/CP900/1/1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42139 - **State**: PUBLISHED - **Published Date**: October 11, 2021 at 04:14 UTC - **Last Updated**: August 04, 2024 at 03:30 UTC - **Reserved Date**: October 11, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Deno Standard Modules before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/denoland/deno_std/releases/tag/0.107.0) 2. [](https://github.com/denoland/deno_std/pull/1275) 3. [](https://vuln.ryotak.me/advisories/58)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37452 - **State**: PUBLISHED - **Published Date**: January 02, 2025 at 13:30 UTC - **Last Updated**: January 02, 2025 at 14:31 UTC - **Reserved Date**: June 09, 2024 at 08:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in MyThemeShop Schema Lite allows Cross Site Request Forgery.This issue affects Schema Lite: from n/a through 1.2.2. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **MyThemeShop - Schema Lite** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/schema-lite/vulnerability/wordpress-schema-lite-theme-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50996 - **State**: PUBLISHED - **Published Date**: November 05, 2024 at 00:00 UTC - **Last Updated**: November 05, 2024 at 16:13 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the bpa_server parameter at genie_bpa.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.netgear.com/about/security/) 2. [](https://github.com/wudipjq/my_vuln/blob/main/Netgear4/vuln_37/37.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2343 - **State**: PUBLISHED - **Published Date**: May 19, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 08:58 UTC - **Reserved Date**: May 19, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description News Manager 2.0 allows remote attackers to bypass restrictions and obtain sensitive information via a direct request to (1) db/connect_str.php and (2) login/info.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29251](http://www.securityfocus.com/bid/29251) 2. [newsmanager-multiple-info-disclosure(42462)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42462) 3. [5624](https://www.exploit-db.com/exploits/5624)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23481 - **State**: PUBLISHED - **Published Date**: September 22, 2021 at 19:47 UTC - **Last Updated**: August 04, 2024 at 14:58 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CMS Made Simple 2.2.14 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Field Definition text field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.cmsmadesimple.org/bug/view/12317)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39806 - **State**: PUBLISHED - **Published Date**: August 10, 2023 at 00:00 UTC - **Last Updated**: October 09, 2024 at 19:42 UTC - **Reserved Date**: August 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the bakupdata function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://icms.com) 2. [](http://icmsdev.com) 3. [](https://gist.github.com/ChubbyZ/27fa6f43699c9964ddfa701614fc4d5e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25746 - **State**: PUBLISHED - **Published Date**: February 22, 2024 at 00:00 UTC - **Last Updated**: August 28, 2024 at 17:57 UTC - **Reserved Date**: February 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the add_white_node function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2241 - **State**: PUBLISHED - **Published Date**: July 17, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: July 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Phorum 5.0.11 and earlier allows remote attackers to inject arbitrary HTML or web script via search.php. NOTE: some sources have reported that the affected file is read.php, but this is inconsistent with the vendor's patch. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://phorum.org/cvs-changelog-5.txt) 2. [11538](http://www.securityfocus.com/bid/11538) 3. [1011921](http://securitytracker.com/id?1011921) 4. [phorum-xss(17846)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17846) 5. [12980](http://secunia.com/advisories/12980)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32811, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32811 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32811 - **State**: PUBLISHED - **Published Date**: August 02, 2021 at 21:55 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-915: Security Weakness ### Affected Products **zopefoundation - Zope** Affected versions: - >= 4.0, < 4.6.3 (Status: affected) - >= 5.0, < 5.3 (Status: affected) ### References 1. [](https://github.com/zopefoundation/Zope/security/advisories/GHSA-g4gq-j4p2-j8fr) 2. [](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf) 3. [](https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9256 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 21:18 UTC - **Last Updated**: November 25, 2024 at 18:46 UTC - **Reserved Date**: September 26, 2024 at 19:34 UTC - **Assigned By**: zdi ### Vulnerability Description Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25267. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Foxit - PDF Reader** Affected versions: - 2024.2.3.25184 (Status: affected) ### References 1. [ZDI-24-1309](https://www.zerodayinitiative.com/advisories/ZDI-24-1309/) 2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24737 - **State**: PUBLISHED - **Published Date**: March 06, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 11:03 UTC - **Reserved Date**: January 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AetherBlack/CVE/tree/main/PMB)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5189 - **State**: PUBLISHED - **Published Date**: September 20, 2012 at 10:00 UTC - **Last Updated**: August 07, 2024 at 00:30 UTC - **Reserved Date**: September 19, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Webform Validation module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with permissions to "update Webform nodes" to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [webformvalidation-unspecified-xss(71597)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71597) 2. [47035](http://secunia.com/advisories/47035) 3. [](http://drupal.org/node/1357356) 4. [](http://drupal.org/node/1357360) 5. [77426](http://www.osvdb.org/77426) 6. [](http://drupal.org/node/1357354)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22083 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 00:00 UTC - **Last Updated**: November 18, 2024 at 18:45 UTC - **Reserved Date**: January 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. A hardcoded backdoor session ID exists that can be used for further access to the device, including reconfiguration tasks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.elspec-ltd.com/support/security-advisories/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38877 - **State**: PUBLISHED - **Published Date**: August 02, 2024 at 10:36 UTC - **Last Updated**: August 13, 2024 at 07:54 UTC - **Reserved Date**: June 21, 2024 at 08:28 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Security Server R9.2 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). The affected devices stores initial system credentials without sufficient protection. An attacker with remote shell access or physical access could retrieve the credentials leading to confidentiality loss allowing the attacker to laterally move within the affected network. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-312: Security Weakness ### Affected Products **Siemens - Omnivise T3000 Application Server R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Domain Controller R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Product Data Management (PDM) R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 R8.2 SP3** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 R8.2 SP4** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Security Server R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Terminal Server R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Thin Client R9.2** Affected versions: - 0 (Status: affected) **Siemens - Omnivise T3000 Whitelisting Server R9.2** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-857368.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40577 - **State**: REJECTED - **Last Updated**: March 27, 2023 at 00:00 UTC - **Reserved Date**: September 12, 2022 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0671 - **State**: PUBLISHED - **Published Date**: April 13, 2011 at 20:07 UTC - **Last Updated**: October 17, 2024 at 19:41 UTC - **Reserved Date**: January 28, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:11942](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11942) 2. [71745](http://osvdb.org/71745) 3. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html) 4. [MS11-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034) 5. [ADV-2011-0952](http://www.vupen.com/english/advisories/2011/0952) 6. [mswin-win32k-var6-priv-escalation(66400)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66400) 7. [47206](http://www.securityfocus.com/bid/47206) 8. [](http://support.avaya.com/css/P8/documents/100133352) 9. [44156](http://secunia.com/advisories/44156) 10. [](http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx) 11. [1025345](http://www.securitytracker.com/id?1025345)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23059 - **State**: PUBLISHED - **Published Date**: March 29, 2022 at 10:25 UTC - **Last Updated**: September 16, 2024 at 23:10 UTC - **Reserved Date**: January 10, 2022 at 00:00 UTC - **Assigned By**: Mend ### Vulnerability Description A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **shopizer-ecommerce - Shopizer** Affected versions: - 2.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059) 2. [](https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e) ### Credits - WhiteSource Vulnerability Research Team (WVR)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39765 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 14:21 UTC - **Last Updated**: January 14, 2025 at 15:15 UTC - **Reserved Date**: June 28, 2024 at 16:07 UTC - **Assigned By**: talos ### Vulnerability Description Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `custom_interface` POST parameter. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Wavlink - Wavlink AC3000** Affected versions: - M33A8.V5030.210505 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2020](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2020) ### Credits - Discovered by Lilith &gt;_&gt; of Cisco Talos.