System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22648
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 18:00 UTC
- **Last Updated**: August 03, 2024 at 03:21 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to read restricted memory.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213183)
2. [](https://support.apple.com/en-us/HT213184)
3. [](https://support.apple.com/en-us/HT213185) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2221
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 10:52 UTC
- **Last Updated**: December 12, 2024 at 21:05 UTC
- **Reserved Date**: April 21, 2023 at 08:04 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - WP Custom Cursors | WordPress Cursor Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657)
### Credits
- Chien Vuong
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21604
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 15:34 UTC
- **Last Updated**: January 06, 2025 at 16:51 UTC
- **Reserved Date**: December 29, 2024 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
LangChain4j-AIDeepin is a Retrieval enhancement generation (RAG) project. Prior to 3.5.0, LangChain4j-AIDeepin uses MD5 to hash files, which may cause file upload conflicts. This issue is fixed in 3.5.0.
### Weakness Classification (CWE)
- CWE-328: Security Weakness
### Affected Products
**moyangzhan - langchain4j-aideepin**
Affected versions:
- < 3.5.0 (Status: affected)
### References
1. [https://github.com/moyangzhan/langchain4j-aideepin/security/advisories/GHSA-cv5r-73vf-8x7v](https://github.com/moyangzhan/langchain4j-aideepin/security/advisories/GHSA-cv5r-73vf-8x7v)
2. [https://github.com/moyangzhan/langchain4j-aideepin/commit/3cf625c5044a151a8cbcbdf98e10b4b46b8a975a](https://github.com/moyangzhan/langchain4j-aideepin/commit/3cf625c5044a151a8cbcbdf98e10b4b46b8a975a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6303
- **State**: PUBLISHED
- **Published Date**: February 19, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Monitoring Administration pages in PNMsoft Sequence Kinetics before 7.7 do not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://licensing.pnmsoft.com/documents/Security%20Bulletins/Security%20Bulletin%202014-1.htm)
2. [](http://twitter.com/d_gianni/statuses/562628862648270849/photo/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3263
- **State**: REJECTED
- **Published Date**: July 08, 2022 at 17:36 UTC
- **Last Updated**: July 08, 2022 at 17:36 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46408
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 17:05 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36)
2. [](https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/16/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0335
- **State**: PUBLISHED
- **Published Date**: January 29, 2009 at 18:09 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: January 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to inject arbitrary web script or HTML via the view parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7806](https://www.exploit-db.com/exploits/7806)
2. [33572](http://secunia.com/advisories/33572)
3. [33325](http://www.securityfocus.com/bid/33325)
4. [blogit-index-xss(48073)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0249
- **State**: PUBLISHED
- **Published Date**: August 11, 2020 at 19:29 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-154719656
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-8.0 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-08-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57880
- **State**: PUBLISHED
- **Published Date**: January 11, 2025 at 15:05 UTC
- **Last Updated**: May 04, 2025 at 10:05 UTC
- **Reserved Date**: January 11, 2025 at 14:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ASoC: Intel: sof_sdw: Add space for a terminator into DAIs array
The code uses the initialised member of the asoc_sdw_dailink struct to
determine if a member of the array is in use. However in the case the
array is completely full this will lead to an access 1 past the end of
the array, expand the array by one entry to include a space for a
terminator.
### Affected Products
**Linux - Linux**
Affected versions:
- 27fd36aefa0013bea1cf6948e2e825e9b8cff97a (Status: affected)
- 27fd36aefa0013bea1cf6948e2e825e9b8cff97a (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.12.6 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b21a849764a4111b0bc14a5ffe987a0582419de2)
2. [](https://git.kernel.org/stable/c/255cc582e6e16191a20d54bcdbca6c91d3e90c5e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30544
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 11:04 UTC
- **Last Updated**: August 02, 2024 at 01:39 UTC
- **Reserved Date**: March 27, 2024 at 13:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in UPQODE Whizzy.This issue affects Whizzy: from n/a through 1.1.18.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**UPQODE - Whizzy**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/whizzy/wordpress-whizzy-plugin-1-1-18-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Steven Julian (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33508
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 00:00 UTC
- **Last Updated**: January 10, 2025 at 15:24 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KramerAV VIA GO² < 4.0.1.1326 is vulnerable to unauthenticated file upload resulting in Remote Code Execution (RCE).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://zxsecurity.co.nz/research/advisories/kramer-via-go-2-rce-and-other-vulns/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48844
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 12:25 UTC
- **Last Updated**: May 04, 2025 at 08:24 UTC
- **Reserved Date**: July 16, 2024 at 11:38 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Fix leaking sent_cmd skb
sent_cmd memory is not freed before freeing hci_dev causing it to leak
it contents.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.30 (Status: unaffected)
- 5.16.16 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3679ccc09d8806686d579095ed504e045af7f7d6)
2. [](https://git.kernel.org/stable/c/9473d06bd1c8da49eafb685aa95a290290c672dd)
3. [](https://git.kernel.org/stable/c/dd3b1dc3dd050f1f47cd13e300732852414270f8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2982, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2982
- **State**: PUBLISHED
- **Published Date**: July 03, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 12, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to upload arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sterling-b2b-cve20132982-upload(83997)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83997)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21640830) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16024
- **State**: PUBLISHED
- **Published Date**: January 18, 2019 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 28, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106162](http://www.securityfocus.com/bid/106162)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1493
- **State**: PUBLISHED
- **Published Date**: January 09, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 00:30 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.
### Affected Products
**IBM - UrbanCode Deploy**
Affected versions:
- 6.1.0.2 (Status: affected)
- 6.1 (Status: affected)
- 6.1.0.1 (Status: affected)
- 6.1.0.3 (Status: affected)
- 6.1.0.4 (Status: affected)
- 6.1.1 (Status: affected)
- 6.1.1.1 (Status: affected)
- 6.1.1.2 (Status: affected)
- 6.1.1.3 (Status: affected)
- 6.1.1.4 (Status: affected)
- 6.1.1.5 (Status: affected)
- 6.1.1.6 (Status: affected)
- 6.1.1.7 (Status: affected)
- 6.1.2 (Status: affected)
- 6.1.1.8 (Status: affected)
- 6.1.3 (Status: affected)
- 6.1.3.1 (Status: affected)
- 6.2 (Status: affected)
- 6.2.0.1 (Status: affected)
- 6.1.3.2 (Status: affected)
- 6.2.0.2 (Status: affected)
- 6.2.1 (Status: affected)
- 6.2.1.1 (Status: affected)
- 6.1.3.3 (Status: affected)
- 6.2.1.2 (Status: affected)
- 6.2.2 (Status: affected)
- 6.2.2.1 (Status: affected)
- 6.2.3.0 (Status: affected)
- 6.2.3.1 (Status: affected)
- 6.1.3.4 (Status: affected)
- 6.1.3.5 (Status: affected)
- 6.2.4 (Status: affected)
- 6.1.3.6 (Status: affected)
- 6.2.4.1 (Status: affected)
- 6.2.4.2 (Status: affected)
- 6.2.5 (Status: affected)
- 6.2.5.1 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/128691)
2. [102483](http://www.securityfocus.com/bid/102483)
3. [](http://www.ibm.com/support/docview.wss?uid=swg2C1000367) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12865
- **State**: PUBLISHED
- **Published Date**: June 17, 2019 at 22:49 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/radare/radare2/issues/14334)
2. [FEDORA-2019-2a16e1ab93](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37281
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 21:45 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 05, 2024 at 14:21 UTC
- **Assigned By**: elastic
### Vulnerability Description
An issue was discovered in Kibana where a user with Viewer role could cause a Kibana instance to crash by sending a large number of maliciously crafted requests to a specific endpoint.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Elastic - Kibana**
Affected versions:
- 7.x (Status: affected)
- 8.x (Status: affected)
### References
1. [](https://discuss.elastic.co/t/kibana-7-17-23-8-14-0-security-update-esa-2024-16/364094) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2590
- **State**: PUBLISHED
- **Published Date**: July 15, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Instance Management component in Oracle Database 10.1.0.5 and Enterprise Manager 10.1.0.6 has unknown impact and remote authenticated attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html)
2. [ADV-2008-2115](http://www.vupen.com/english/advisories/2008/2115)
3. [SSRT061201](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
4. [1020496](http://www.securitytracker.com/id?1020496)
5. [HPSBMA02133](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143)
6. [ADV-2008-2109](http://www.vupen.com/english/advisories/2008/2109/references)
7. [1020499](http://www.securitytracker.com/id?1020499)
8. [31087](http://secunia.com/advisories/31087)
9. [31113](http://secunia.com/advisories/31113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2308
- **State**: PUBLISHED
- **Published Date**: July 02, 2009 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: July 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in affiliates.php in the Affiliation (aka Affiliates) module 1.1.0 and earlier for PunBB allow remote attackers to execute arbitrary SQL commands via the (1) in or (2) out parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9055](http://www.exploit-db.com/exploits/9055)
2. [](http://packetstormsecurity.org/0906-exploits/punbbaffiliationsin-blindsql.txt)
3. [55478](http://www.osvdb.org/55478)
4. [](http://packetstormsecurity.org/0906-exploits/punbbaffiliations-blindsql.txt)
5. [35654](http://secunia.com/advisories/35654)
6. [affiliation-affiliates-sql-injection(51437)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51437) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3236
- **State**: PUBLISHED
- **Published Date**: June 16, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Web Proxy Auto Discovery (WPAD) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles proxy discovery, which allows remote attackers to redirect network traffic via unspecified vectors, aka "Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-077](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077)
2. [1036104](http://www.securitytracker.com/id/1036104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2274
- **State**: PUBLISHED
- **Published Date**: September 16, 2020 at 13:20 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
### Affected Products
**Jenkins project - Jenkins ElasTest Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.2.1 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014)
2. [[oss-security] 20200916 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/09/16/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7268
- **State**: PUBLISHED
- **Published Date**: December 01, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 12:03 UTC
- **Reserved Date**: December 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The phpinfo function in SiteEngine 5.x allows remote attackers to obtain system information by setting the action parameter to php_info in misc.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6823](https://www.exploit-db.com/exploits/6823)
2. [siteengine-misc-information-disclosure(46180)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46180)
3. [32404](http://secunia.com/advisories/32404)
4. [20081023 SiteEngine 5.x Multiple Remote Vulnerabilities](http://www.securityfocus.com/archive/1/497747/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6356
- **State**: PUBLISHED
- **Published Date**: March 20, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: February 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 before 8.0.1 uses weak permissions for unspecified resources, which allows attackers to obtain sensitive session information via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96925](http://www.securityfocus.com/bid/96925)
2. [](https://security.paloaltonetworks.com/CVE-2017-6356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28245
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 17:40 UTC
- **Last Updated**: September 17, 2024 at 04:08 UTC
- **Reserved Date**: March 30, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb22-16.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47012
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:13 UTC
- **Last Updated**: May 04, 2025 at 07:02 UTC
- **Reserved Date**: February 27, 2024 at 18:42 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix a use after free in siw_alloc_mr
Our code analyzer reported a UAF.
In siw_alloc_mr(), it calls siw_mr_add_mem(mr,..). In the implementation of
siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed via
kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point to a
freed object. After, the execution continue up to the err_out branch of
siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).
My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
section, to avoid the uaf.
### Affected Products
**Linux - Linux**
Affected versions:
- 2251334dcac9eb337575d8767e2a6a7e81848f7f (Status: affected)
- 2251334dcac9eb337575d8767e2a6a7e81848f7f (Status: affected)
- 2251334dcac9eb337575d8767e2a6a7e81848f7f (Status: affected)
- 2251334dcac9eb337575d8767e2a6a7e81848f7f (Status: affected)
- 2251334dcac9eb337575d8767e2a6a7e81848f7f (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.4.119 (Status: unaffected)
- 5.10.37 (Status: unaffected)
- 5.11.21 (Status: unaffected)
- 5.12.4 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/30b9e92d0b5e5d5dc1101ab856c17009537cbca4)
2. [](https://git.kernel.org/stable/c/608a4b90ece039940e9425ee2b39c8beff27e00c)
3. [](https://git.kernel.org/stable/c/3e22b88e02c194f6c80867abfef5cc09383461f4)
4. [](https://git.kernel.org/stable/c/ad9ce7188432650469a6c7625bf479f5ed0b6155)
5. [](https://git.kernel.org/stable/c/3093ee182f01689b89e9f8797b321603e5de4f63) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32579
- **State**: PUBLISHED
- **Published Date**: April 18, 2024 at 09:27 UTC
- **Last Updated**: August 08, 2024 at 16:11 UTC
- **Reserved Date**: April 15, 2024 at 10:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation allows Stored XSS.This issue affects Restaurant Menu – Food Ordering System – Table Reservation: from n/a through 2.4.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GloriaFood - Restaurant Menu – Food Ordering System – Table Reservation**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/menu-ordering-reservations/wordpress-restaurant-menu-food-ordering-system-table-reservation-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Ray Wilson (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5117
- **State**: PUBLISHED
- **Published Date**: May 27, 2025 at 11:14 UTC
- **Last Updated**: May 27, 2025 at 13:05 UTC
- **Reserved Date**: May 23, 2025 at 10:58 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**themeglow - Property – Real Estate Directory Listing**
Affected versions:
- 1.0.5 (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/df48f7f9-7bc9-4f9b-b9b5-6bfb86309030?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/admin/pages/payment-inc/paypal-submit.php#L128)
3. [](https://wordpress.org/plugins/property/#developers)
4. [](https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/property.php#L1964)
5. [](https://plugins.trac.wordpress.org/changeset/3299714/)
### Credits
- Kenneth Dunn |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1438
- **State**: PUBLISHED
- **Published Date**: March 13, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in devami.asp in X-Ice News System 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24502](http://secunia.com/advisories/24502)
2. [ADV-2007-0941](http://www.vupen.com/english/advisories/2007/0941)
3. [22939](http://www.securityfocus.com/bid/22939)
4. [3469](https://www.exploit-db.com/exploits/3469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1035
- **State**: PUBLISHED
- **Published Date**: February 08, 2012 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: February 08, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdaCore Ada Web Services (AWS) before 2.10.2 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.nruns.com/_downloads/advisory28122011.pdf)
2. [](http://www.adacore.com/2012/01/27/security-advisory-sa-2012-l119-003-hash-collisions-in-aws/)
3. [20120127 AdaCore Security Advisory SA-2012-L119-003 Hash collisions in AWS](http://archives.neohapsis.com/archives/bugtraq/2012-01/0169.html)
4. [](http://www.ocert.org/advisories/ocert-2011-003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0506
- **State**: PUBLISHED
- **Published Date**: January 26, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Nootka 1.4.4 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
### Affected Products
**SeeLook - Nootka**
Affected versions:
- 1.4.4 and earlier (Status: affected)
### References
1. [JVN#10103841](https://jvn.jp/en/jp/JVN10103841/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0077
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 21:52 UTC
- **Last Updated**: August 27, 2024 at 16:28 UTC
- **Reserved Date**: December 02, 2023 at 00:41 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**nvidia - vGPU driver, Cloud Gaming driver**
Affected versions:
- All versions prior to and including 16.3, 13.9, and all versions prior to and including the January 2024 release (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5520) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4558
- **State**: PUBLISHED
- **Published Date**: September 06, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: September 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1492](http://securityreason.com/securityalert/1492)
2. [](http://retrogod.altervista.org/deluxebb_106_xpl.html)
3. [ADV-2006-1843](http://www.vupen.com/english/advisories/2006/1843)
4. [deluxebb-modmime-file-upload(26485)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26485)
5. [20135](http://secunia.com/advisories/20135)
6. [20060516 DeluxeBB <= v1.06 attachment mod_mime exploit](http://archives.neohapsis.com/archives/bugtraq/2006-05/0318.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4155
- **State**: PUBLISHED
- **Published Date**: August 20, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/swift/+bug/1196932)
2. [DSA-2737](http://www.debian.org/security/2012/dsa-2737)
3. [](https://review.openstack.org/#/c/40646/)
4. [[oss-security] 20130807 [OSSA 2013-022] Swift Denial of Service using superfluous object tombstones (CVE-2013-4155)](http://www.openwall.com/lists/oss-security/2013/08/07/6)
5. [USN-2001-1](http://www.ubuntu.com/usn/USN-2001-1)
6. [](https://review.openstack.org/#/c/40645/)
7. [](https://review.openstack.org/#/c/40643/)
8. [RHSA-2013:1197](http://rhn.redhat.com/errata/RHSA-2013-1197.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5466
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 02:39 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An IDOR was discovered in GitLab CE/EE 11.5 and later that allowed new merge requests endpoint to disclose label names.
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**n/a - GitLab CE/EE**
Affected versions:
- Affects GitLab CE/EE 11.5 and later (Status: affected)
- Fixed in 12.1.2 in 12.0.4 and in 11.11.6 (Status: affected)
### References
1. [](https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/)
2. [](https://hackerone.com/reports/507113)
3. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/59809) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3405
- **State**: PUBLISHED
- **Published Date**: June 26, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in defter_yaz.asp in Lebisoft zdefter 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) ad and (2) konu parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25779](http://secunia.com/advisories/25779)
2. [37529](http://osvdb.org/37529)
3. [24620](http://www.securityfocus.com/bid/24620)
4. [lebisoft-zdefter-adkonu-xss(35159)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3008
- **State**: PUBLISHED
- **Published Date**: July 20, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:50 UTC
- **Reserved Date**: May 30, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Stack-based buffer overflow in OSIsoft PI OPC DA Interface before 2.3.20.9 allows remote authenticated users to execute arbitrary code by sending packet data during the processing of messages associated with OPC items.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [osisoft-piopcda-opc-bo(77131)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77131)
2. [84091](http://osvdb.org/84091)
3. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-201-01.pdf)
4. [49986](http://secunia.com/advisories/49986)
5. [54609](http://www.securityfocus.com/bid/54609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6565
- **State**: PUBLISHED
- **Published Date**: December 15, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:33 UTC
- **Reserved Date**: December 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [filezilla-commands-dos(30853)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30853)
2. [2914](https://www.exploit-db.com/exploits/2914)
3. [](http://sourceforge.net/project/shownotes.php?release_id=470364&group_id=21558)
4. [ADV-2006-4937](http://www.vupen.com/english/advisories/2006/4937) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50026, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50026
- **State**: PUBLISHED
- **Published Date**: February 09, 2024 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 19:40 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Presta Monster "Multi Accessories Pro" (hsmultiaccessoriespro) module for PrestaShop versions 5.1.1 and before, allows remote attackers to escalate privileges and obtain sensitive information via the method HsAccessoriesGroupProductAbstract::getAccessoriesByIdProducts().
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.friendsofpresta.org/modules/2024/02/08/hsmultiaccessoriespro.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6168
- **State**: PUBLISHED
- **Published Date**: November 14, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 16, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Zikula Application Framework before 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the returnpage parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63186](http://www.securityfocus.com/bid/63186)
2. [zikulaapplicationframework-unspecified-xss(88654)](https://exchange.xforce.ibmcloud.com/vulnerabilities/88654)
3. [](http://community.zikula.org/index.php?module=News&func=display&sid=3132)
4. [20131113 Cross-Site Scripting (XSS) in Zikula Application Framework](http://archives.neohapsis.com/archives/bugtraq/2013-11/0057.html)
5. [](https://www.htbridge.com/advisory/HTB23178) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14121
- **State**: PUBLISHED
- **Published Date**: April 21, 2022 at 17:25 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 15, 2020 at 00:00 UTC
- **Assigned By**: Xiaomi
### Vulnerability Description
A business logic vulnerability exists in Mi App Store. The vulnerability is caused by incomplete permission checks of the products being bypassed, and an attacker can exploit the vulnerability to perform a local silent installation.
### Affected Products
**n/a - Mi App Store**
Affected versions:
- Mi App Store version 4.12.2 (Status: affected)
### References
1. [](https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0914
- **State**: PUBLISHED
- **Published Date**: December 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: November 04, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57434](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57434)
2. [CSSA-2004-003.0](ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt)
3. [CSSA-2003-SCO.33](ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.33/CSSA-2003-SCO.33.txt)
4. [2003-0044](http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt)
5. [VU#734644](http://www.kb.cert.org/vuls/id/734644)
6. [oval:org.mitre.oval:def:2011](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2011)
7. [DSA-409](http://www.debian.org/security/2004/dsa-409)
8. [10542](http://secunia.com/advisories/10542) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34266
- **State**: PUBLISHED
- **Published Date**: July 19, 2022 at 19:34 UTC
- **Last Updated**: August 03, 2024 at 09:07 UTC
- **Reserved Date**: June 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 allows attackers to cause a denial of service (application crash), a different vulnerability than CVE-2022-0562. When processing a malicious TIFF file, an invalid range may be passed as an argument to the memset() function within TIFFFetchStripThing() in tif_dirread.c. This will cause TIFFFetchStripThing() to segfault after use of an uninitialized resource.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:N/I:N/PR:N/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://alas.aws.amazon.com/AL2/ALAS-2022-1814.html)
2. [](https://bugs.gentoo.org/859433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3690
- **State**: PUBLISHED
- **Published Date**: October 01, 2013 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 04:28 UTC
- **Reserved Date**: May 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in cgi-bin/users.cgi in Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.1.0.8 and earlier, allows remote attackers to hijack the authentication of administrators for requests that add users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130612 Security Analysis of IP video surveillance cameras](http://seclists.org/fulldisclosure/2013/Jun/84) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49756
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 16:43 UTC
- **Last Updated**: May 04, 2025 at 08:44 UTC
- **Reserved Date**: March 27, 2025 at 16:39 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe()
sp_usb_phy_probe() will call platform_get_resource_byname() that may fail
and return NULL. devm_ioremap() will use usbphy->moon4_res_mem->start as
input, which may causes null-ptr-deref. Check the ret value of
platform_get_resource_byname() to avoid the null-ptr-deref.
### Affected Products
**Linux - Linux**
Affected versions:
- 99d9ccd97385208b78b3d88e756451f4b70119fc (Status: affected)
- 99d9ccd97385208b78b3d88e756451f4b70119fc (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1 (Status: affected)
- 0 (Status: unaffected)
- 6.1.9 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d838b5c99bcecd593b4710a93fce8fdbf122395b)
2. [](https://git.kernel.org/stable/c/17eee264ef386ef30a69dd70e36f29893b85c170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35825
- **State**: REJECTED
- **Last Updated**: June 19, 2023 at 00:00 UTC
- **Reserved Date**: June 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16575
- **State**: PUBLISHED
- **Published Date**: December 17, 2019 at 14:40 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 20, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery vulnerability in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.
### Affected Products
**Jenkins project - Jenkins Alauda Kubernetes Suport Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 2.3.0 (Status: unknown)
### References
1. [](https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602)
2. [[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/12/17/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54255
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:32 UTC
- **Last Updated**: December 09, 2024 at 18:39 UTC
- **Reserved Date**: December 02, 2024 at 12:03 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in aviplugins.com Login Widget With Shortcode allows Phishing.This issue affects Login Widget With Shortcode: from n/a through 6.1.2.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**aviplugins.com - Login Widget With Shortcode**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/login-sidebar-widget/vulnerability/wordpress-login-widget-with-shortcode-plugin-6-1-2-open-redirection-vulnerability?_s_id=cve)
### Credits
- Muhamad Agil Fachrian (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33059
- **State**: PUBLISHED
- **Published Date**: June 29, 2022 at 17:05 UTC
- **Last Updated**: August 03, 2024 at 08:01 UTC
- **Reserved Date**: June 13, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_train.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/online-railway-reservation-system/SQLi-7.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6880, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6880
- **State**: PUBLISHED
- **Published Date**: July 30, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: July 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in joke.php in EasySiteNetwork Free Jokes Website allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32908](http://www.securityfocus.com/bid/32908)
2. [20081218 EasySiteNetwork (joke.php?id) Remote SQL injection Vulnerability](http://www.securityfocus.com/archive/1/499351/100/0/threaded)
3. [52032](http://osvdb.org/52032)
4. [freejokeswebsite-jokes-sql-injection(47468)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47468) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29765
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 13:08 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 19, 2024 at 15:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alireza Sedghi Aparat for WordPress allows Stored XSS.This issue affects Aparat for WordPress: from n/a through 2.2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Alireza Sedghi - Aparat for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-aparat/wordpress-aparat-for-wordpress-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Steven Julian (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30015
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 07:14 UTC
- **Last Updated**: April 08, 2025 at 13:22 UTC
- **Reserved Date**: March 13, 2025 at 18:03 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to incorrect memory address handling in ABAP SQL of SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker with high privileges could execute certain forms of SQL queries leading to manipulation of content in the output variable. This vulnerability has a low impact on the confidentiality, integrity and the availability of the application.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**SAP_SE - SAP NetWeaver and ABAP Platform (Application Server ABAP)**
Affected versions:
- KRNL64UC 7.53 (Status: affected)
- KERNEL 7.53 (Status: affected)
- 7.54 (Status: affected)
### References
1. [](https://me.sap.com/notes/3565944)
2. [](https://url.sap/sapsecuritypatchday) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5275
- **State**: PUBLISHED
- **Published Date**: June 18, 2024 at 14:11 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 23, 2024 at 16:28 UTC
- **Assigned By**: Fortra
### Vulnerability Description
A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**Fortra - FileCatalyst Direct**
Affected versions:
- 3.7 (Status: affected)
**Fortra - FileCatalyst Workflow**
Affected versions:
- 4.9.8 (Status: affected)
### References
1. [](https://www.fortra.com/security/advisory/fi-2024-007)
2. [](https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm)
### Credits
- Greg at Palmer Research |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0664
- **State**: PUBLISHED
- **Published Date**: March 06, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 17:51 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
### References
1. [106862](http://www.securityfocus.com/bid/106862)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0664) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0315
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:09 UTC
- **Last Updated**: March 20, 2025 at 18:34 UTC
- **Reserved Date**: January 07, 2025 at 18:35 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A vulnerability in ollama/ollama <=0.3.14 allows a malicious user to create a customized GGUF model file, upload it to the Ollama server, and create it. This can cause the server to allocate unlimited memory, leading to a Denial of Service (DoS) attack.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**ollama - ollama/ollama**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/da414d29-b55a-496f-b135-17e0fcec67bc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4237
- **State**: PUBLISHED
- **Published Date**: August 20, 2012 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:43 UTC
- **Reserved Date**: August 09, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54861](http://www.securityfocus.com/bid/54861)
2. [](http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742)
3. [20120814 TCExam Edit SQL Injection](http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html)
4. [50141](http://secunia.com/advisories/50141)
5. [](http://freecode.com/projects/tcexam/releases/347125)
6. [](http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html)
7. [[oss-security] 20120813 TCExam Edit SQL Injection](http://www.openwall.com/lists/oss-security/2012/08/13/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5704
- **State**: PUBLISHED
- **Published Date**: January 16, 2018 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 05:40 UTC
- **Reserved Date**: January 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/openocd/mailman/message/36188041/)
2. [DSA-4093](https://www.debian.org/security/2018/dsa-4093)
3. [[debian-lts-announce] 20180121 [SECURITY] [DLA 1253-1] openocd security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00027.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28714
- **State**: PUBLISHED
- **Published Date**: August 11, 2023 at 02:37 UTC
- **Last Updated**: October 17, 2024 at 13:55 UTC
- **Reserved Date**: March 22, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi software for Windows**
Affected versions:
- before version 22.220 HF (Hot Fix) (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32028
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 16:06 UTC
- **Last Updated**: April 08, 2025 at 20:00 UTC
- **Reserved Date**: April 01, 2025 at 21:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks ’.php’, ’.sh’, ’.js’, and ’.css’ files. The existing logic causes the system to "fail open" rather than "fail closed." This vulnerability is fixed in 10.0.3.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**haxtheweb - issues**
Affected versions:
- >= 9.0.0, < 10.0.3 (Status: affected)
### References
1. [https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p](https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11323
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:45 UTC
- **Last Updated**: December 20, 2021 at 22:45 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7248
- **State**: PUBLISHED
- **Published Date**: July 29, 2024 at 21:18 UTC
- **Last Updated**: August 01, 2024 at 21:52 UTC
- **Reserved Date**: July 29, 2024 at 21:07 UTC
- **Assigned By**: zdi
### Vulnerability Description
Comodo Internet Security Pro Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the update mechanism. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-19055.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Comodo - Internet Security Pro**
Affected versions:
- 12.2.4.8032 (Status: affected)
### References
1. [ZDI-24-953](https://www.zerodayinitiative.com/advisories/ZDI-24-953/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3767
- **State**: PUBLISHED
- **Published Date**: July 21, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in showprofile.php in Darren's $5 Script Archive osDate 1.1.7 and earlier allows remote attackers to inject arbitrary web script or HTML via the onerror attribute in an HTML IMG tag with a non-existent source file in txtcomment parameter, which is used when posting a comment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [osdate-showprofile-xss(27814)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27814)
2. [ADV-2006-2864](http://www.vupen.com/english/advisories/2006/2864)
3. [20060812 osDate 1.1.8 - Multiple HTML Injection Vulnerability - fixed](http://archives.neohapsis.com/archives/bugtraq/2006-08/0285.html)
4. [19034](http://www.securityfocus.com/bid/19034)
5. [21103](http://secunia.com/advisories/21103)
6. [1016700](http://securitytracker.com/id?1016700)
7. [20060719 Re: osDate 1.1.7 multiple vulnerabilities](http://www.securityfocus.com/archive/1/440592/100/0/threaded)
8. [20060717 osDate 1.1.7 multiple vulnerabilities](http://www.securityfocus.com/archive/1/440490/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20914
- **State**: PUBLISHED
- **Published Date**: July 16, 2020 at 17:46 UTC
- **Last Updated**: August 05, 2024 at 03:00 UTC
- **Reserved Date**: July 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/LibreDWG/libredwg/issues/178)
2. [](https://github.com/LibreDWG/libredwg/commit/3b837bb72d6b9ab4d563faa211f90efc257e3c96) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2659
- **State**: PUBLISHED
- **Published Date**: April 23, 2019 at 18:16 UTC
- **Last Updated**: October 02, 2024 at 15:42 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Commerce Platform component of Oracle Commerce (subcomponent: Dynamo Application Framework). The supported version that is affected is 11.2.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Commerce Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Commerce Platform accessible data as well as unauthorized read access to a subset of Oracle Commerce Platform accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Commerce Platform**
Affected versions:
- 11.2.0.3 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2328
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 06:51 UTC
- **Last Updated**: March 28, 2025 at 14:35 UTC
- **Reserved Date**: March 14, 2025 at 19:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'dnd_remove_uploaded_files' function in all versions up to, and including, 1.3.8.7. This makes it possible for unauthenticated attackers to add arbitrary file paths (such as ../../../../wp-config.php) to uploaded files on the server, which can easily lead to remote code execution when an Administrator deletes the message. Exploiting this vulnerability requires the Flamingo plugin to be installed and activated.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**glenwpcoder - Drag and Drop Multiple File Upload for Contact Form 7**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0f6cca7a-b8ff-4ca5-b813-e611eac07695?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/trunk/inc/dnd-upload-cf7.php#L153)
3. [](https://plugins.trac.wordpress.org/changeset/3261964/)
### Credits
- Nguyen Tan Phat |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6607
- **State**: PUBLISHED
- **Published Date**: December 31, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: December 31, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenBiblio 0.5.2-pre4 and earlier allows remote attackers to obtain sensitive information via a direct request for (1) shared/footer.php, (2) circ/mbr_fields.php, or (3) admin/custom_marc_form_fields.php, which reveals the path in various error messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3502](http://securityreason.com/securityalert/3502)
2. [41288](http://osvdb.org/41288)
3. [41286](http://osvdb.org/41286)
4. [20071228 OpenBiblio 0.5.2-pre4 and prior multiple vulnerabilities](http://www.securityfocus.com/archive/1/485588/100/0/threaded)
5. [](http://sourceforge.net/project/shownotes.php?release_id=451780&group_id=50071)
6. [27053](http://www.securityfocus.com/bid/27053)
7. [](http://sourceforge.net/project/shownotes.php?release_id=488061&group_id=50071)
8. [openbiblio-multiple-scripts-path-disclosure(39295)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39295)
9. [41287](http://osvdb.org/41287) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34854, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34854 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34854
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 16:30 UTC
- **Last Updated**: February 13, 2025 at 15:53 UTC
- **Reserved Date**: May 09, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
F-logic DataCube3 v1.0 is vulnerable to File Upload via `/admin/transceiver_schedule.php.`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7739
- **State**: PUBLISHED
- **Published Date**: March 06, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44262](https://www.exploit-db.com/exploits/44262/)
2. [](http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html)
3. [44220](https://www.exploit-db.com/exploits/44220/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14548
- **State**: PUBLISHED
- **Published Date**: August 05, 2019 at 18:55 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: August 02, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in EspoCRM before 5.6.9. Stored XSS in the body of an Article was executed when a victim opens articles received through mail. This Article can be formed by an attacker using the Knowledge Base feature in the tab list. The attacker could inject malicious JavaScript inside the body of the article, thus helping him steal victims' cookies (hence compromising their accounts).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5)
2. [](https://github.com/espocrm/espocrm/releases/tag/5.6.9)
3. [](https://github.com/espocrm/espocrm/issues/1369)
4. [](https://gauravnarwani.com/publications/cve-2019-14548/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56268
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:22 UTC
- **Last Updated**: January 02, 2025 at 15:48 UTC
- **Reserved Date**: December 18, 2024 at 19:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Hait Post Grid Elementor Addon allows Stored XSS.This issue affects Post Grid Elementor Addon: from n/a through 2.0.18.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WP Hait - Post Grid Elementor Addon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/post-grid-elementor-addon/vulnerability/wordpress-post-grid-elementor-addon-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- ghsinfosec (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6492
- **State**: PUBLISHED
- **Published Date**: February 14, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Piranha Configuration Tool in Piranha 0.8.6 does not properly restrict access to webpages, which allows remote attackers to bypass authentication and read or modify the LVS configuration via an HTTP POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2014:0175](http://rhn.redhat.com/errata/RHSA-2014-0175.html)
2. [](http://bugs.centos.org/view.php?id=6825)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1043040)
4. [RHSA-2014:0174](http://rhn.redhat.com/errata/RHSA-2014-0174.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5983
- **State**: PUBLISHED
- **Published Date**: April 10, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-64077)
2. [VU#307983](https://www.kb.cert.org/vuls/id/307983)
3. [97379](http://www.securityfocus.com/bid/97379)
4. [](http://codewhitesec.blogspot.com/2017/04/amf.html)
5. [](https://confluence.atlassian.com/jira063/jira-security-advisory-2017-03-09-875604401.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31064
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 19:50 UTC
- **Last Updated**: April 22, 2025 at 17:53 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
BigBlueButton is an open source web conferencing system. Users in meetings with private chat enabled are vulnerable to a cross site scripting attack in affected versions. The attack occurs when the attacker (with xss in the name) starts a chat. in the victim's client the JavaScript will be executed. This issue has been addressed in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bigbluebutton - bigbluebutton**
Affected versions:
- < 2.4.8 (Status: affected)
### References
1. [](https://github.com/bigbluebutton/bigbluebutton/pull/15090)
2. [](https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-hwv2-5pf5-hr87)
3. [](https://github.com/bigbluebutton/bigbluebutton/pull/15067)
4. [](https://pentests.nl/pentest-blog/stored-xss-in-bigbluebutton/)
5. [20220630 BigBlueButton - Stored XSS in username (CVE-2022-31064)](http://seclists.org/fulldisclosure/2022/Jun/52)
6. [](http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000404
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: June 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.27 and later.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-06-25/#SECURITY-834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35746
- **State**: PUBLISHED
- **Published Date**: June 10, 2024 at 16:34 UTC
- **Last Updated**: August 02, 2024 at 03:14 UTC
- **Reserved Date**: May 17, 2024 at 10:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Asghar Hatampoor BuddyPress Cover allows Code Injection.This issue affects BuddyPress Cover: from n/a through 2.1.4.2.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Asghar Hatampoor - BuddyPress Cover**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/bp-cover/wordpress-buddypress-cover-plugin-2-1-4-2-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- YC_Infosec (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2875
- **State**: PUBLISHED
- **Published Date**: June 07, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 18:06 UTC
- **Reserved Date**: June 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the CL_ParseDownload function of Quake 3 Engine 1.32c and earlier, as used in multiple products, allows remote attackers to execute arbitrary code via a svc_download command with compressed data that triggers the overflow during expansion.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aluigi.altervista.org/adv/q3cbof-adv.txt)
2. [18271](http://www.securityfocus.com/bid/18271)
3. [1016219](http://securitytracker.com/id?1016219)
4. [ADV-2006-2129](http://www.vupen.com/english/advisories/2006/2129)
5. [20401](http://secunia.com/advisories/20401)
6. [20060602 Client buffer-overflow in Quake 3 engine (1.32c / rev 795)](http://www.securityfocus.com/archive/1/435963/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1564
- **State**: PUBLISHED
- **Published Date**: May 30, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:26 UTC
- **Reserved Date**: May 29, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 5.5 and 6.0 allows remote attackers to steal potentially sensitive information from cookies via a cookie that contains script which is executed when a page is loaded, aka the "Script within Cookies Reading Cookies" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS02-023](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0057
- **State**: PUBLISHED
- **Published Date**: March 18, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: January 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple integer overflows in a "legacy serialization format" parser in AppKit in Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via a crafted serialized property list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28304](http://www.securityfocus.com/bid/28304)
2. [TA08-079A](http://www.us-cert.gov/cas/techalerts/TA08-079A.html)
3. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references)
4. [macos-appkit-parser-bo(41298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41298)
5. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html)
6. [28358](http://www.securityfocus.com/bid/28358)
7. [1019648](http://www.securitytracker.com/id?1019648)
8. [](http://docs.info.apple.com/article.html?artnum=307562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1169
- **State**: PUBLISHED
- **Published Date**: October 25, 2017 at 12:00 UTC
- **Last Updated**: September 17, 2024 at 01:31 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DOORS next Generation (DNG/RRC) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123188.
### Affected Products
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 4.0 (Status: affected)
- 4.0.1 (Status: affected)
- 4.0.2 (Status: affected)
- 4.0.3 (Status: affected)
- 4.0.4 (Status: affected)
- 4.0.5 (Status: affected)
- 4.0.6 (Status: affected)
- 5.0 (Status: affected)
- 4.0.7 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/123188)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22009296)
3. [101593](http://www.securityfocus.com/bid/101593) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5137
- **State**: PUBLISHED
- **Published Date**: January 02, 2014 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:32 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Mini-stream CastRipper 2.50.70 allows remote attackers to execute arbitrary code via a long URL in the [playlist] section in a .pls file, a different vector than CVE-2009-1667.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8663](http://www.exploit-db.com/exploits/8663/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4009
- **State**: PUBLISHED
- **Published Date**: April 13, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:17 UTC
- **Reserved Date**: April 13, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201612-52](https://security.gentoo.org/glsa/201612-52)
2. [](https://github.com/python-pillow/Pillow/pull/1714)
3. [](https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e)
4. [86064](http://www.securityfocus.com/bid/86064)
5. [](https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13226
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The sell function of a smart contract implementation for YLCToken, an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/YLCToken)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/ETHEREUMBLACK/sell%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4691
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22811
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 19:09 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause script execution when the request of a privileged account accessing the vulnerable web page is intercepted. Affected Products: 1-Phase Uninterruptible Power Supply (UPS) using NMC2 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.8 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 250/500 (SYPX) Network Management Card 2 (NMC2): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635J (NMC2 AOS V6.9.6 and earlier), 3-Phase Uninterruptible Power Supply (UPS) using NMC2 including Symmetra PX 48/96/100/160 kW UPS (PX2), Symmetra PX 20/40 kW UPS (SY3P), Gutor (SXW, GVX), and Galaxy (GVMTS, GVMSA, GVXTS, GVXSA, G7K, GFC, G9KCHU): AP9630/AP9630CH/AP9630J, AP9631/AP9631CH/AP9631J, AP9635/AP9635CH (NMC2 AOS V6.9.6 and earlier), 1-Phase Uninterruptible Power Supply (UPS) using NMC3 including Smart-UPS, Symmetra, and Galaxy 3500 with Network Management Card 3 (NMC3): AP9640/AP9640J, AP9641/AP9641J, AP9643/AP9643J (NMC3 AOS V1.4.2.1 and earlier), APC Rack Power Distribution Units (PDU) using NMC2 2G Metered/Switched Rack PDUs with embedded NMC2: AP84XX, AP86XX, AP88XX, AP89XX (NMC2 AOS V6.9.6 and earlier), APC Rack Power Distribution Units (PDU) using NMC3 2G Metered/Switched Rack PDUs with embedded NMC3: APDU99xx (NMC3 AOS V1.4.0 and earlier), APC 3-Phase Power Distribution Products using NMC2 Galaxy RPP: GRPPIP2X84 (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) for InfraStruxure 150 kVA PDU with 84 Poles (X84P): PDPB150G6F (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for InfraStruxure 40/60kVA PDU (XPDU) PD40G6FK1-M, PD40F6FK1-M, PD40L6FK1-M, PDRPPNX10 M,PD60G6FK1, PD60F6FK1, PD60L6FK1, PDRPPNX10, PD40E5EK20-M, PD40H5EK20-M (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular 150/175kVA PDU (XRDP): PDPM150G6F, PDPM150L6F, PDPM175G6H (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for 400 and 500 kVA (PMM): PMM400-ALA, PMM400-ALAX, PMM400-CUB, PMM500-ALA, PMM500-ALAX, PMM500-CUB (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 for Modular PDU (XRDP2G): PDPM72F-5U, PDPM138H-5U, PDPM144F, PDPM138H-R, PDPM277H, PDPM288G6H (NMC2 AOS V6.9.6 and earlier), Rack Automatic Transfer Switches (ATS) Embedded NMC2: Rack Automatic Transfer Switches - AP44XX (ATS4G) (NMC2 AOS V6.9.6 and earlier), Network Management Card 2 (NMC2) Cooling Products: InRow Cooling for series ACRP5xx, ACRP1xx, ACRD5xx, and ACRC5xx SKUs (ACRP2G), InRow Cooling for series ACRC10x SKUs (RC10X2G), InRow Cooling for series ACRD6xx and ACRC6xx SKUs (ACRD2G), InRow Cooling Display for series ACRD3xx (ACRC2G), InRow Cooling for series ACSC1xx SKUs (SC2G), InRow Cooling for series ACRD1xx and ACRD2xx (ACRPTK2G), Ecoflair IAEC25/50 Air Economizer Display (EB2G), Uniflair SP UCF0481I, UCF0341I (UNFLRSP), Uniflair LE DX Perimeter Cooling Display for SKUs: IDAV, IDEV, IDWV, IUAV, IUEV, IUWV, IXAV, IXEV, IXWV, LDAV, LDEV, and LDWV (LEDX2G), Refrigerant Distribution Unit: ACDA9xx (RDU) (NMC2 AOS V6.9.6 and earlier), Environmental Monitoring Unit with embedded NMC2 (NB250): NetBotz NBRK0250 (NMC2 AOS V6.9.6 and earlier), and Network Management Card 2 (NMC2): AP9922 Battery Management System (BM4) (NMC2 AOS V6.9.6 and earlier)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26050
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 03:00 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SaferVPN for Windows Ver 5.0.3.3 through 5.0.4.15 could allow local privilege escalation from low privileged users to SYSTEM via a crafted openssl configuration file. This issue is similar to CVE-2019-12572.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vimeo.com/459654003)
2. [](https://thebinary0x1.medium.com/cve-2020-26050-safervpn-for-windows-local-privilege-escalation-da069bb1373c)
3. [](https://www.safervpn.com/blog/updates-to-the-safervpn-windows-application/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28877
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 20:15 UTC
- **Last Updated**: August 02, 2024 at 00:56 UTC
- **Reserved Date**: May 23, 2024 at 16:46 UTC
- **Assigned By**: icscert
### Vulnerability Description
MicroDicom DICOM Viewer is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**MicroDicom - DICOM Viewer**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01)
### Credits
- Michael Heinzl reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32083
- **State**: PUBLISHED
- **Published Date**: April 11, 2024 at 12:51 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 10, 2024 at 19:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Varun Kumar Easy Logo allows Stored XSS.This issue affects Easy Logo: from n/a through 1.9.3.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Varun Kumar - Easy Logo**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/easylogo/wordpress-easy-logo-plugin-1-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Cronus (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4816
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:43 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000396
- **State**: PUBLISHED
- **Published Date**: January 26, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 22:00 UTC
- **Reserved Date**: November 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2017-10-11/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9394
- **State**: PUBLISHED
- **Published Date**: September 20, 2019 at 15:03 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: September 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The users-ultra plugin before 1.5.63 for WordPress has CSRF via action=package_add_new to wp-admin/admin-ajax.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/8350)
2. [](https://wordpress.org/plugins/users-ultra/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5928
- **State**: PUBLISHED
- **Published Date**: November 10, 2007 at 02:00 UTC
- **Last Updated**: April 03, 2025 at 14:09 UTC
- **Reserved Date**: November 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenBase 10.0.5 and earlier allows remote authenticated users to trigger a free of an arbitrary memory location via long strings in a SELECT statement. NOTE: this might be a buffer overflow, but it is not clear.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.netragard.com/pdfs/research/NETRAGARD-20070313-OPENBASE.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1976
- **State**: PUBLISHED
- **Published Date**: September 05, 2019 at 01:25 UTC
- **Last Updated**: November 19, 2024 at 18:57 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the “plug-and-play” services component of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper access restrictions on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to access running configuration information about devices managed by the IND, including administrative credentials.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Cisco - Cisco Industrial Network Director**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190904 Cisco Industrial Network Director Configuration Data Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-ind) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0848
- **State**: PUBLISHED
- **Published Date**: February 22, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18963](http://secunia.com/advisories/18963)
2. [](http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html)
3. [VU#999708](http://www.kb.cert.org/vuls/id/999708)
4. [16736](http://www.securityfocus.com/bid/16736)
5. [1015652](http://securitytracker.com/id?1015652)
6. [TA06-053A](http://www.us-cert.gov/cas/techalerts/TA06-053A.html)
7. [ADV-2006-0671](http://www.vupen.com/english/advisories/2006/0671)
8. [TA06-062A](http://www.us-cert.gov/cas/techalerts/TA06-062A.html)
9. [](http://www.heise.de/english/newsticker/news/69862)
10. [23510](http://www.osvdb.org/23510)
11. [](http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php)
12. [](http://docs.info.apple.com/article.html?artnum=303382)
13. [macosx-zip-command-execution(24808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24808) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3154
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: December 05, 2016 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Error responses from Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating included stack trace, exposing excessive information.
### Affected Products
**Apache Software Foundation - Apache Atlas**
Affected versions:
- 0.6.0-incubating (Status: affected)
- 0.7.0-incubating (Status: affected)
### References
1. [[dev] 20170507 CVE updates: fixes in Apache Atlas 0.7.1-incubating](https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea%40%3Cdev.atlas.apache.org%3E)
2. [100581](http://www.securityfocus.com/bid/100581) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2116
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:14 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Application Express Opportunity Tracker component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Opportunity Tracker. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Opportunity Tracker, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Opportunity Tracker accessible data as well as unauthorized read access to a subset of Oracle Application Express Opportunity Tracker accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - Application Express (APEX)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6034
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Storage Manager for Virtual Environments (VMware) could disclose the Windows domain credentials to a user with a high level of privileges.
### Affected Products
**IBM Corporation - Tivoli Storage Manager for Virtual Environments**
Affected versions:
- 6.3 (Status: affected)
- 6.4 (Status: affected)
- 7.1 (Status: affected)
### References
1. [95976](http://www.securityfocus.com/bid/95976)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21995544) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47183
- **State**: PUBLISHED
- **Published Date**: October 04, 2024 at 15:06 UTC
- **Last Updated**: October 04, 2024 at 15:30 UTC
- **Reserved Date**: September 19, 2024 at 22:32 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**parse-community - parse-server**
Affected versions:
- < 6.5.9 (Status: affected)
- >= 7.0.0, < 7.3.0 (Status: affected)
### References
1. [https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg](https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg)
2. [https://github.com/parse-community/parse-server/pull/9317](https://github.com/parse-community/parse-server/pull/9317)
3. [https://github.com/parse-community/parse-server/pull/9318](https://github.com/parse-community/parse-server/pull/9318)
4. [https://github.com/parse-community/parse-server/commit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc](https://github.com/parse-community/parse-server/commit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc)
5. [https://github.com/parse-community/parse-server/commit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f](https://github.com/parse-community/parse-server/commit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2820
- **State**: PUBLISHED
- **Published Date**: September 07, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: September 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote attackers to inject arbitrary web script or HTML via an e-mail message containing Internet Explorer "Conditional Comments" such as "[if]" and "[endif]".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16704](http://secunia.com/advisories/16704/)
2. [sqwebmail-html-comment-xss(22158)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22158)
3. [20050906 Secunia Research: SqWebMail Conditional Comments Script Insertion](http://marc.info/?l=bugtraq&m=112607033030475&w=2)
4. [17156](http://secunia.com/advisories/17156)
5. [USN-201-1](http://www.ubuntu.com/usn/usn-201-1)
6. [](http://secunia.com/secunia_research/2005-44/advisory/)
7. [DSA-820](http://www.debian.org/security/2005/dsa-820)
8. [](http://www.securiteam.com/unixfocus/5RP0220GUS.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41637
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 17:05 UTC
- **Reserved Date**: August 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md)
2. [](https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1531
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 22:15 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Claris Emailer 2.0v2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an email attachment with a long filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011019 Claris Emailer buffer over flow vulnerabirity](http://archives.neohapsis.com/archives/bugtraq/2001-10/0162.html)
2. [3454](http://www.securityfocus.com/bid/3454)
3. [claris-long-filename-bo(7314)](http://www.iss.net/security_center/static/7314.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14434
- **State**: PUBLISHED
- **Published Date**: May 14, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 22:45 UTC
- **Reserved Date**: September 13, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetmask0= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.
### Affected Products
**Talos - Moxa**
Affected versions:
- Moxa EDR-810 V4.1 build 17030317 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.