System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6981 - **State**: PUBLISHED - **Published Date**: December 04, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 06:17 UTC - **Reserved Date**: February 14, 2018 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host. ### Affected Products **VMware - VMware ESXi, VMware Workstation, and VMware Fusion** Affected versions: - VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below (Status: affected) ### References 1. [1042055](http://www.securitytracker.com/id/1042055) 2. [105881](http://www.securityfocus.com/bid/105881) 3. [](https://www.vmware.com/security/advisories/VMSA-2018-0027.html) 4. [1042054](http://www.securitytracker.com/id/1042054)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37919 - **State**: PUBLISHED - **Published Date**: November 30, 2022 at 19:05 UTC - **Last Updated**: April 24, 2025 at 18:44 UTC - **Reserved Date**: August 08, 2022 at 18:45 UTC - **Assigned By**: hpe ### Vulnerability Description A vulnerability exists in the API of Aruba EdgeConnect Enterprise. An unauthenticated attacker can exploit this condition via the web-based management interface to create a denial-of-service condition which prevents the appliance from properly responding to API requests in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below; ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Hewlett Packard Enterprise (HPE) - Aruba EdgeConnect Enterprise Software** Affected versions: - ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below; (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-018.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14449 - **State**: PUBLISHED - **Published Date**: July 20, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 20, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libgig 4.1.0. There is an out of bounds read in gig::File::UpdateChunks in gig.cpp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TeamSeri0us/pocs/blob/master/libgig/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31165, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31165 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31165 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 19:25 UTC - **Last Updated**: January 24, 2025 at 19:27 UTC - **Reserved Date**: April 24, 2023 at 23:19 UTC - **Assigned By**: SEL ### Vulnerability Description An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Schweitzer Engineering Laboratories - SEL-3505** Affected versions: - R119-V0 (Status: affected) - R119-V0 (Status: affected) - R119-V0 (Status: affected) - R119-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3505-3** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3530** Affected versions: - R100-V0 (Status: affected) - R100-V0 (Status: affected) - R100-V0 (Status: affected) - R100-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3530-4** Affected versions: - R108-V0 (Status: affected) - R108-V0 (Status: affected) - R108-V0 (Status: affected) - R108-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3532** Affected versions: - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) - R132-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3555** Affected versions: - R134-V0 (Status: affected) - R134-V0 (Status: affected) - R134-V0 (Status: affected) - R134-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3560S** Affected versions: - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3560E** Affected versions: - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) - R144-V2 (Status: affected) **Schweitzer Engineering Laboratories - SEL-2241 RTAC module** Affected versions: - R113-V0 (Status: affected) - R113-V0 (Status: affected) - R113-V0 (Status: affected) - R113-V0 (Status: affected) **Schweitzer Engineering Laboratories - SEL-3350** Affected versions: - R148-V0 (Status: affected) - R148-V0 (Status: affected) - R148-V0 (Status: affected) ### References 1. [](https://selinc.com/support/security-notifications/external-reports/) 2. [](https://www.nozominetworks.com/blog/) ### Credits - Andrea Palanca, Nozomi Networks
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28615 - **State**: PUBLISHED - **Published Date**: June 08, 2022 at 10:00 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **Apache Software Foundation - Apache HTTP Server** Affected versions: - Apache HTTP Server (Status: affected) ### References 1. [](https://httpd.apache.org/security/vulnerabilities_24.html) 2. [[oss-security] 20220608 CVE-2022-28615: Apache HTTP Server: Read beyond bounds in ap_strcmp_match()](http://www.openwall.com/lists/oss-security/2022/06/08/9) 3. [](https://security.netapp.com/advisory/ntap-20220624-0005/) 4. [FEDORA-2022-e620fb15d5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/) 5. [FEDORA-2022-b54a8dee29](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/) 6. [GLSA-202208-20](https://security.gentoo.org/glsa/202208-20) ### Credits - The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20986 - **State**: PUBLISHED - **Published Date**: February 16, 2021 at 16:35 UTC - **Last Updated**: September 16, 2024 at 23:46 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: CERTVDE ### Vulnerability Description A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Hilscher - PROFINET IO Device** Affected versions: - V3 (Status: affected) **Pepper+Fuchs - PCV/PXV/PGV** Affected versions: - PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477 (Status: affected) - PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636 (Status: affected) - PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997 (Status: affected) - PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203 (Status: affected) **Pepper+Fuchs - PXV/PGV B28 Profisafe** Affected versions: - PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D (Status: affected) - PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011 (Status: affected) **Pepper+Fuchs - OHV** Affected versions: - OHV-F230-B17 (Status: affected) **Pepper+Fuchs - OIT** Affected versions: - OIT500-F113-B17-CB (Status: affected) **Pepper+Fuchs - PHA** Affected versions: - PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D (Status: affected) **Pepper+Fuchs - WCS** Affected versions: - WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM (Status: affected) ### References 1. [](https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device) 2. [](https://cert.vde.com/en-us/advisories/vde-2021-006)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47442 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 06:19 UTC - **Last Updated**: May 04, 2025 at 07:10 UTC - **Reserved Date**: May 21, 2024 at 14:58 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: NFC: digital: fix possible memory leak in digital_in_send_sdd_req() 'skb' is allocated in digital_in_send_sdd_req(), but not free when digital_in_send_cmd() failed, which will cause memory leak. Fix it by freeing 'skb' if digital_in_send_cmd() return failed. ### Affected Products **Linux - Linux** Affected versions: - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) - 2c66daecc4092e6049673c281b2e6f0d5e59a94c (Status: affected) **Linux - Linux** Affected versions: - 3.13 (Status: affected) - 0 (Status: unaffected) - 4.4.290 (Status: unaffected) - 4.9.288 (Status: unaffected) - 4.14.252 (Status: unaffected) - 4.19.213 (Status: unaffected) - 5.4.155 (Status: unaffected) - 5.10.75 (Status: unaffected) - 5.14.14 (Status: unaffected) - 5.15 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/74569c78aa84f8c958f1334b465bc530906ec99a) 2. [](https://git.kernel.org/stable/c/88c890b0b9a1fb9fcd01c61ada515e8b636c34f9) 3. [](https://git.kernel.org/stable/c/fcce6e5255474ca33c27dda0cdf9bf5087278873) 4. [](https://git.kernel.org/stable/c/071bdef36391958c89af5fa2172f691b31baa212) 5. [](https://git.kernel.org/stable/c/2bde4aca56db9fe25405d39ddb062531493a65db) 6. [](https://git.kernel.org/stable/c/50cb95487c265187289810addec5093d4fed8329) 7. [](https://git.kernel.org/stable/c/6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86) 8. [](https://git.kernel.org/stable/c/291c932fc3692e4d211a445ba8aa35663831bac7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32129 - **State**: PUBLISHED - **Published Date**: April 15, 2024 at 10:32 UTC - **Last Updated**: August 02, 2024 at 02:06 UTC - **Reserved Date**: April 11, 2024 at 13:13 UTC - **Assigned By**: Patchstack ### Vulnerability Description URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.6. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **Freshworks - Freshdesk (official)** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/freshdesk-support/wordpress-freshdesk-official-plugin-2-3-4-open-redirection-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20815, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20815 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20815 - **State**: PUBLISHED - **Published Date**: May 31, 2019 at 21:40 UTC - **Last Updated**: August 05, 2024 at 12:12 UTC - **Reserved Date**: March 26, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=da885fe1ee8b4589047484bd7fa05a4905b52b17) 2. [RHSA-2019:1667](https://access.redhat.com/errata/RHSA-2019:1667) 3. [FEDORA-2019-52a8f5468e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVDHJB2QKXNDU7OFXIHIL5O5VN5QCSZL/) 4. [FEDORA-2019-e9de40d53f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOE3PVFPMWMXV3DGP2R3XIHAF2ZQU3FS/) 5. [RHSA-2019:1723](https://access.redhat.com/errata/RHSA-2019:1723) 6. [RHSA-2019:1743](https://access.redhat.com/errata/RHSA-2019:1743) 7. [RHSA-2019:1881](https://access.redhat.com/errata/RHSA-2019:1881) 8. [RHSA-2019:1968](https://access.redhat.com/errata/RHSA-2019:1968) 9. [RHSA-2019:2507](https://access.redhat.com/errata/RHSA-2019:2507) 10. [RHSA-2019:2553](https://access.redhat.com/errata/RHSA-2019:2553) 11. [20190825 [SECURITY] [DSA 4506-1] qemu security update](https://seclists.org/bugtraq/2019/Aug/41) 12. [DSA-4506](https://www.debian.org/security/2019/dsa-4506)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6706 - **State**: PUBLISHED - **Published Date**: July 04, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 15:41 UTC - **Reserved Date**: March 09, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the logging subsystem of the Cisco Prime Collaboration Provisioning tool could allow an unauthenticated, local attacker to acquire sensitive information. More Information: CSCvd07260. Known Affected Releases: 12.1. ### Affected Products **n/a - Cisco Prime Collaboration Provisioning Tool** Affected versions: - Cisco Prime Collaboration Provisioning Tool (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-pcp4) 2. [1038744](http://www.securitytracker.com/id/1038744) 3. [99204](http://www.securityfocus.com/bid/99204)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2624, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2624 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2624 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 16:16 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). ### Affected Products **Oracle Corporation - Enterprise Manager Base Platform** Affected versions: - 12.1.0.5 (Status: affected) - 13.2.0.0 (Status: affected) - 13.3.0.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1539 - **State**: PUBLISHED - **Published Date**: September 26, 2017 at 17:00 UTC - **Last Updated**: September 16, 2024 at 17:18 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Business Process Manager 7.5, 8.0, and 8.5 is vulnerable to privilege escalation by not properly distinguishing internal group memberships from user registry group memberships. By manipulating LDAP group membership an attack might gain privileged access. IBM X-Force ID: 130807. ### Affected Products **IBM - Business Process Manager Advanced** Affected versions: - 7.5 (Status: affected) - 7.5.0.1 (Status: affected) - 7.5.1 (Status: affected) - 7.5.1.1 (Status: affected) - 7.5.1.2 (Status: affected) - 8.0 (Status: affected) - 8.0.1 (Status: affected) - 8.0.1.1 (Status: affected) - 8.0.1.2 (Status: affected) - 8.5 (Status: affected) - 8.5.0.1 (Status: affected) - 8.5.5 (Status: affected) - 8.0.1.3 (Status: affected) - 8.5.6 (Status: affected) - 8.5.0.2 (Status: affected) - 8.5.7 (Status: affected) - 8.5.7.CF201609 (Status: affected) - 8.5.6.1 (Status: affected) - 8.5.6.2 (Status: affected) - 8.5.7.CF201606 (Status: affected) - 8.5.7.CF201612 (Status: affected) - 8.5.7.CF201703 (Status: affected) - 8.5.7.CF201706 (Status: affected) ### References 1. [100967](http://www.securityfocus.com/bid/100967) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22007451) 3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/130807)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10861 - **State**: PUBLISHED - **Published Date**: April 01, 2020 at 16:50 UTC - **Last Updated**: August 04, 2024 at 11:14 UTC - **Reserved Date**: March 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://forum.avast.com/index.php?topic=232420.0) 2. [](https://forum.avast.com/index.php?topic=232423.0) 3. [](https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1134 - **State**: PUBLISHED - **Published Date**: September 24, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: September 23, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in Compaq WEBES Service Tools 2.0 through WEBES 4.0 (Service Pack 5) allows local users to read privileged files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [webes-unauth-file-access(10167)](http://www.iss.net/security_center/static/10167.php) 2. [SSRT2362](http://online.securityfocus.com/advisories/4497) 3. [5773](http://www.securityfocus.com/bid/5773) 4. [20020923 [security bulletin] SSRT2362 WEBES Service Tools (HP Tru64 UNIX, HP](http://marc.info/?l=bugtraq&m=103280973718587&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0407 - **State**: PUBLISHED - **Published Date**: January 28, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 07:46 UTC - **Reserved Date**: January 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HTTP File Server (HFS) before 2.2c tags HTTP request log entries with the username sent during HTTP Basic Authentication, regardless of whether authentication succeeded, which might make it more difficult for an administrator to determine who made a remote request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080123 Syhunt: HFS (HTTP File Server) Username Spoofing and Log Forging/Injection Vulnerability](http://www.securityfocus.com/archive/1/486874/100/0/threaded) 2. [hfs-username-spoofing(39877)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39877) 3. [](http://www.rejetto.com/hfs/?f=wn) 4. [27423](http://www.securityfocus.com/bid/27423) 5. [](http://www.syhunt.com/advisories/hfs-1-username.txt) 6. [](http://www.syhunt.com/advisories/hfshack.txt) 7. [28631](http://secunia.com/advisories/28631) 8. [3582](http://securityreason.com/securityalert/3582)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4459 - **State**: PUBLISHED - **Published Date**: April 12, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 00:32 UTC - **Reserved Date**: May 02, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Stack-based buffer overflow in native/mod_manager/node.c in mod_cluster 1.2.9. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2016:2056](http://rhn.redhat.com/errata/RHSA-2016-2056.html) 2. [RHSA-2016:2055](http://rhn.redhat.com/errata/RHSA-2016-2055.html) 3. [RHSA-2017:0194](https://access.redhat.com/errata/RHSA-2017:0194) 4. [RHSA-2017:0193](https://access.redhat.com/errata/RHSA-2017:0193) 5. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html) 6. [RHSA-2016:2054](http://rhn.redhat.com/errata/RHSA-2016-2054.html) 7. [93555](http://www.securityfocus.com/bid/93555) 8. [](https://bugzilla.redhat.com/show_bug.cgi?id=1341583)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000054 - **State**: PUBLISHED - **Published Date**: February 09, 2018 at 23:00 UTC - **Last Updated**: August 05, 2024 at 12:33 UTC - **Reserved Date**: February 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2018-02-05/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2828, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2828 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2828 - **State**: PUBLISHED - **Published Date**: April 12, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 15:52 UTC - **Reserved Date**: April 11, 2013 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The DNP Master Driver in the OSIsoft PI Interface before 3.1.2.54 for DNP3 allows physically proximate attackers to cause a denial of service (interface shutdown) via crafted input over a serial line. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://ics-cert.us-cert.gov/advisories/ICSA-14-098-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13676 - **State**: PUBLISHED - **Published Date**: July 09, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 09:07 UTC - **Reserved Date**: July 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for Orderbook Presale Token (OBP), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/PresaleToken)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55917 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 16:16 UTC - **Last Updated**: December 31, 2024 at 17:24 UTC - **Reserved Date**: December 12, 2024 at 21:32 UTC - **Assigned By**: trendmicro ### Vulnerability Description An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-346: Security Weakness ### Affected Products **Trend Micro, Inc. - Trend Micro Apex One** Affected versions: - 2019 (14.0) (Status: affected) **Trend Micro, Inc. - Trend Micro Apex One as a Service** Affected versions: - SaaS (Status: affected) ### References 1. [](https://success.trendmicro.com/en-US/solution/KA-0018217)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34367, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34367 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34367 - **State**: PUBLISHED - **Published Date**: June 14, 2023 at 00:00 UTC - **Last Updated**: January 06, 2025 at 18:10 UTC - **Reserved Date**: June 02, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Windows 7 is vulnerable to a full blind TCP/IP hijacking attack. The vulnerability exists in Windows 7 (any Windows until Windows 8) and in any implementation of TCP/IP, which is vulnerable to the Idle scan attack (including many IoT devices). NOTE: The vendor considers this a low severity issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://blog.pi3.com.pl/?p=850) 2. [](https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7) 3. [](https://pwnies.com/windows-7-blind-tcp-ip-hijacking/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26400 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49657 - **State**: PUBLISHED - **Published Date**: January 23, 2024 at 15:06 UTC - **Last Updated**: August 02, 2024 at 22:01 UTC - **Reserved Date**: November 28, 2023 at 21:39 UTC - **Assigned By**: apache ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS. For 2.X versions, users should change their config to include: TALISMAN_CONFIG = {     "content_security_policy": {         "base-uri": ["'self'"],         "default-src": ["'self'"],         "img-src": ["'self'", "blob:", "data:"],         "worker-src": ["'self'", "blob:"],         "connect-src": [             "'self'",             " https://api.mapbox.com" https://api.mapbox.com" ;,             " https://events.mapbox.com" https://events.mapbox.com" ;,         ],         "object-src": "'none'",         "style-src": [             "'self'",             "'unsafe-inline'",         ],         "script-src": ["'self'", "'strict-dynamic'"],     },     "content_security_policy_nonce_in": ["script-src"],     "force_https": False,     "session_cookie_secure": False, } ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Apache Software Foundation - Apache Superset** Affected versions: - 0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/wjyvz8om9nwd396lh0bt156mtwjxpsvx) ### Credits - Nick Barnes, Praetorian Security Inc. - Amit Laish – GE Vernova
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3504 - **State**: PUBLISHED - **Published Date**: April 24, 2017 at 19:00 UTC - **Last Updated**: October 07, 2024 at 16:14 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Automatic Service Request (ASR) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Automatic Service Request (ASR). CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) 2. [97797](http://www.securityfocus.com/bid/97797)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6464 - **State**: PUBLISHED - **Published Date**: December 14, 2016 at 00:37 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web management interface of the Cisco Unified Communications Manager IM and Presence Service could allow an unauthenticated, remote attacker to view information on web pages that should be restricted. More Information: CSCva49629. Known Affected Releases: 11.5(1). Known Fixed Releases: 11.5(1.12000.2) 12.0(0.98000.181). ### Affected Products **n/a - Cisco Unified Communications Manager** Affected versions: - Cisco Unified Communications Manager (Status: affected) ### References 1. [1037412](http://www.securitytracker.com/id/1037412) 2. [94802](http://www.securityfocus.com/bid/94802) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ucm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1857 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 08:00 UTC - **Last Updated**: March 03, 2025 at 14:19 UTC - **Reserved Date**: March 02, 2025 at 20:24 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file /check_availability.php. The manipulation of the argument employeeid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **PHPGurukul - Nipah Virus Testing Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-298125 | PHPGurukul Nipah Virus Testing Management System check_availability.php sql injection](https://vuldb.com/?id.298125) 2. [VDB-298125 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298125) 3. [Submit #506120 | PHPGurukul Nipah Virus Testing Management System V1.0 SQL Injection](https://vuldb.com/?submit.506120) 4. [](https://github.com/panghuanjie/Code-audits/issues/1) 5. [](https://phpgurukul.com/) ### Credits - panghuanjie66 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42640 - **State**: PUBLISHED - **Published Date**: February 02, 2022 at 17:18 UTC - **Last Updated**: August 04, 2024 at 03:38 UTC - **Reserved Date**: October 18, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://printerlogic.com) 2. [](https://www.printerlogic.com/security-bulletin/) 3. [](https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/) 4. [](https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite) 5. [](https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html) 6. [](https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints) 7. [](https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5975 - **State**: PUBLISHED - **Published Date**: December 04, 2012 at 23:00 UTC - **Last Updated**: September 17, 2024 at 02:37 UTC - **Reserved Date**: November 21, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23082](http://www.exploit-db.com/exploits/23082/) 2. [20121203 Re: SSH.com Communications SSH Tectia Authentication Bypass Remote Zeroday Exploit (king cope)](http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0065.html) 3. [20121201 SSH.com Communications SSH Tectia Authentication Bypass Remote Zeroday Exploit](http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0013.html) 4. [](https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ssh/tectia_passwd_changereq.rb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10959 - **State**: PUBLISHED - **Published Date**: April 17, 2019 at 14:34 UTC - **Last Updated**: August 05, 2024 at 07:54 UTC - **Reserved Date**: May 09, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Avecto Defendpoint 4 prior to 4.4 SR6 and 5 prior to 5.1 SR1 has an Untrusted Search Path vulnerability, exploitable by modifying environment variables to trigger automatic elevation of an attacker's process launch. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackandpwn.com/cve-2018-10959/) 2. [](https://hackandpwn.com/assets/2019-04-17-cve-2018-10959/Defendpoint_Windows_Client_Release_Notes_4.4.267.0_SR6.pdf) 3. [](https://hackandpwn.com/assets/2019-04-17-cve-2018-10959/Defendpoint_Windows_Client_Release_Notes_5.1.149.0_SR1.pdf) 4. [](https://www.beyondtrust.com/docs/release-notes/privilege-management/windows-and-mac/windows/pm-windows-4-4-sr6.pdf) 5. [](https://www.beyondtrust.com/docs/release-notes/privilege-management/windows-and-mac/windows/pm-windows-5-1.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48945, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48945 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48945 - **State**: PUBLISHED - **Published Date**: November 29, 2023 at 00:00 UTC - **Last Updated**: October 10, 2024 at 20:20 UTC - **Reserved Date**: November 20, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stack overflow in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openlink/virtuoso-opensource/issues/1172)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16125 - **State**: PUBLISHED - **Published Date**: September 09, 2019 at 01:01 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Jobberbase 2.0, the parameter category is not sanitized in public/page_subscribe.php, leading to /subscribe SQL injection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://zerodays.lol/) 2. [](https://www.exploit-db.com/exploits/47314)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1592 - **State**: PUBLISHED - **Published Date**: March 22, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 12:59 UTC - **Reserved Date**: March 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2007:0436](http://rhn.redhat.com/errata/RHSA-2007-0436.html) 2. [DSA-1286](http://www.debian.org/security/2007/dsa-1286) 3. [RHSA-2007:0347](http://www.redhat.com/support/errata/RHSA-2007-0347.html) 4. [[linux-netdev] 20070316 [PATCH 2.6.21-rc3] IPV6: ipv6_fl_socklist is inadvertently shared.](http://marc.info/?l=linux-netdev&m=117406721731891&w=2) 5. [USN-464-1](http://www.ubuntu.com/usn/usn-464-1) 6. [SUSE-SA:2007:043](http://www.novell.com/linux/security/advisories/2007_43_kernel.html) 7. [MDKSA-2007:078](http://www.mandriva.com/security/advisories?name=MDKSA-2007:078) 8. [RHSA-2007:0673](http://www.redhat.com/support/errata/RHSA-2007-0673.html) 9. [24777](http://secunia.com/advisories/24777) 10. [23104](http://www.securityfocus.com/bid/23104) 11. [27528](http://secunia.com/advisories/27528) 12. [26379](http://secunia.com/advisories/26379) 13. [25226](http://secunia.com/advisories/25226) 14. [SUSE-SA:2007:029](http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html) 15. [24618](http://secunia.com/advisories/24618) 16. [25683](http://secunia.com/advisories/25683) 17. [ADV-2007-1084](http://www.vupen.com/english/advisories/2007/1084) 18. [MDVSA-2011:051](http://www.mandriva.com/security/advisories?name=MDVSA-2011:051) 19. [25288](http://secunia.com/advisories/25288) 20. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478) 21. [RHSA-2007:0672](http://www.redhat.com/support/errata/RHSA-2007-0672.html) 22. [RHBA-2007-0304](http://rhn.redhat.com/errata/RHBA-2007-0304.html) 23. [25099](http://secunia.com/advisories/25099) 24. [25961](http://secunia.com/advisories/25961) 25. [DSA-1503](http://www.debian.org/security/2008/dsa-1503) 26. [25078](http://secunia.com/advisories/25078) 27. [25392](http://secunia.com/advisories/25392) 28. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4) 29. [SUSE-SA:2007:030](http://www.novell.com/linux/security/advisories/2007_30_kernel.html) 30. [29058](http://secunia.com/advisories/29058) 31. [DSA-1304](http://www.debian.org/security/2007/dsa-1304) 32. [25630](http://secunia.com/advisories/25630) 33. [25714](http://secunia.com/advisories/25714) 34. [kernel-tcpv6synrecvsoc-dos(33176)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33176) 35. [SUSE-SA:2007:035](http://www.novell.com/linux/security/advisories/2007_35_kernel.html) 36. [oval:org.mitre.oval:def:10130](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130) 37. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299) 38. [](http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1707 - **State**: PUBLISHED - **Published Date**: August 07, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 15:13 UTC - **Reserved Date**: February 13, 2013 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Stack-based buffer overflow in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line to the Mozilla Maintenance Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:18871](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18871) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=888314) 3. [](http://www.mozilla.org/security/announce/2013/mfsa2013-66.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0234 - **State**: PUBLISHED - **Published Date**: July 15, 2019 at 21:13 UTC - **Last Updated**: August 04, 2024 at 17:44 UTC - **Reserved Date**: November 14, 2018 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description A Reflected Cross-site Scripting (XSS) vulnerability exists in Apache Roller. Roller's Math Comment Authenticator did not property sanitize user input and could be exploited to perform Reflected Cross Site Scripting (XSS). The mitigation for this vulnerability is to upgrade to the latest version of Roller, which is now Roller 5.2.3. ### Affected Products **Apache - Apache Roller** Affected versions: - Roller 5.2 (Status: affected) - 5.2.1 (Status: affected) - 5.2.2. The unsupported pre-Roller 5.1 versions may also be affected. (Status: affected) ### References 1. [](https://lists.apache.org/thread.html/26cdef3fa8a8fa7fcbb99320aa860836ead124b414c654a4d12674cf%40%3Cdev.roller.apache.org%3E) 2. [[roller-user] 20210830 Fwd: [CVE-2019-0234] Reflected Cross-site Scripting (XSS) Vulnerability](https://lists.apache.org/thread.html/r81a61626d03a11e610c4fbf641f19a6075a0d082906388826829663d%40%3Cuser.roller.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24496 - **State**: PUBLISHED - **Published Date**: August 02, 2021 at 10:32 UTC - **Last Updated**: August 03, 2024 at 19:35 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Community Events WordPress plugin before 1.4.8 does not sanitise, validate or escape its importrowscount and successimportcount GET parameters before outputting them back in an admin page, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Community Events** Affected versions: - 1.4.8 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/5fd1cb7f-a036-4c5b-9557-0ffd4ef6b834) ### Credits - iohex
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5625 - **State**: PUBLISHED - **Published Date**: July 18, 2024 at 17:12 UTC - **Last Updated**: August 01, 2024 at 21:18 UTC - **Reserved Date**: June 04, 2024 at 08:50 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Improper Restriction of XML External Entity Reference vulnerability in PruvaSoft Informatics Apinizer Management Console allows Data Serialization External Entities Blowup.This issue affects Apinizer Management Console: before 2024.05.1. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-611: Security Weakness ### Affected Products **PruvaSoft Informatics - Apinizer Management Console** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-24-1010) ### Credits - Akın ŞENGEZER
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4667 - **State**: PUBLISHED - **Published Date**: August 25, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:42 UTC - **Reserved Date**: August 24, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in SquidClamav 5.x before 5.8 allow remote attackers to inject arbitrary web script or HTML via the (1) url, (2) virus, (3) source, or (4) user parameter to (a) clwarn.cgi, (b) clwarn.cgi.de_DE, (c) clwarn.cgi.en_EN, (d) clwarn.cgi.fr_FR, (e) clwarn.cgi.pt_BR, or (f) clwarn.cgi.ru_RU in cgi-bin/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120824 Re: CVE Request: SquidClamav insufficient escaping flaws](http://www.openwall.com/lists/oss-security/2012/08/25/1) 2. [](http://squidclamav.darold.net/news.html) 3. [[oss-security] 20120816 Re: CVE Request: SquidClamav insufficient escaping flaws](http://www.openwall.com/lists/oss-security/2012/08/16/4) 4. [[oss-security] 20120816 CVE Request: SquidClamav insufficient escaping flaws](http://www.openwall.com/lists/oss-security/2012/08/16/2) 5. [](http://freecode.com/projects/squidclamav/releases/346722)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5354 - **State**: PUBLISHED - **Published Date**: September 29, 2020 at 19:54 UTC - **Last Updated**: August 05, 2024 at 05:33 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 allows remote attackers to execute code and escalate privileges via spoofing. When the client is configured to use HTTP, it does not authenticate the intended server before opening a browser window. An unauthenticated attacker capable of conducting a spoofing attack can redirect the browser to gain execution in the context of the WinLogon.exe process. If Network Level Authentication is not enforced, the vulnerability can be exploited via RDP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://anixis.com) 2. [](https://github.com/missing0x00/CVE-2018-5354)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43952 - **State**: PUBLISHED - **Published Date**: February 15, 2022 at 00:45 UTC - **Last Updated**: October 04, 2024 at 18:11 UTC - **Reserved Date**: November 16, 2021 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0. ### Affected Products **Atlassian - Jira Server** Affected versions: - unspecified (Status: affected) **Atlassian - Jira Data Center** Affected versions: - unspecified (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/JRASERVER-73138)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0745 - **State**: PUBLISHED - **Published Date**: January 30, 2025 at 11:18 UTC - **Last Updated**: February 18, 2025 at 19:02 UTC - **Reserved Date**: January 27, 2025 at 12:21 UTC - **Assigned By**: INCIBE ### Vulnerability Description An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain the backups of the database by requesting the "/embedai/app/uploads/database/<SQL_FILE>" endpoint. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **EmbedAI - EmbedAI** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai) ### Credits - David Utón Amaya (m3n0sd0n4ld)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30445 - **State**: PUBLISHED - **Published Date**: April 29, 2025 at 02:05 UTC - **Last Updated**: April 30, 2025 at 15:43 UTC - **Reserved Date**: March 22, 2025 at 00:04 UTC - **Assigned By**: apple ### Vulnerability Description A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination. ### Affected Products **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122377) 2. [](https://support.apple.com/en-us/122371) 3. [](https://support.apple.com/en-us/122372) 4. [](https://support.apple.com/en-us/122373) 5. [](https://support.apple.com/en-us/122378) 6. [](https://support.apple.com/en-us/122374) 7. [](https://support.apple.com/en-us/122375)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2209, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2209 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2209 - **State**: PUBLISHED - **Published Date**: November 13, 2019 at 17:43 UTC - **Last Updated**: August 04, 2024 at 18:42 UTC - **Reserved Date**: December 10, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In BTA_DmPinReply of bta_dm_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139287605 ### Affected Products **n/a - Android** Affected versions: - Android-8.0 Android-8.1 Android-9 Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2019-11-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7618 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 07:30 UTC - **Last Updated**: September 10, 2024 at 13:29 UTC - **Reserved Date**: August 08, 2024 at 15:35 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Community by PeepSo – Social Network, Membership, Registration, User Profiles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘content’ parameter in all versions up to, and including, 6.4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **peepso - Community by PeepSo – Social Network, Membership, Registration, User Profiles, Premium – Mobile App** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/edf2e060-5ae4-4b46-bc68-22ae5f516fe8?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.4.0/templates/reactions/admin_reaction.php#L112) 3. [](https://wordpress.org/plugins/peepso-core/#developers) 4. [](https://www.peepso.com/changelog/) 5. [](https://plugins.trac.wordpress.org/changeset/3147528/) 6. [](https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigreactions.php?rev=3147528#L88) ### Credits - Tieu Pham Trong Nhan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3337 - **State**: PUBLISHED - **Published Date**: July 03, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 18:23 UTC - **Reserved Date**: July 03, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in frontend/x/files/select.html in cPanel 10.8.2-CURRENT 118 and earlier allows remote attackers to inject arbitrary web script or HTML via the file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugzilla.cpanel.net/show_bug.cgi?id=4282) 2. [20060626 Re: XSS in Cpanel 10](http://www.securityfocus.com/archive/1/438477/100/0/threaded) 3. [ADV-2006-2547](http://www.vupen.com/english/advisories/2006/2547) 4. [20060626 XSS in Cpanel 10](http://www.securityfocus.com/archive/1/438355/100/0/threaded) 5. [cpanel-select-xss(27403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27403) 6. [20840](http://secunia.com/advisories/20840) 7. [1016383](http://securitytracker.com/id?1016383) 8. [18655](http://www.securityfocus.com/bid/18655)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2778 - **State**: REJECTED - **Last Updated**: May 07, 2025 at 14:54 UTC - **Reserved Date**: March 24, 2025 at 21:52 UTC - **Assigned By**: VulnCheck ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28344 - **State**: PUBLISHED - **Published Date**: May 30, 2023 at 00:00 UTC - **Last Updated**: January 14, 2025 at 16:25 UTC - **Reserved Date**: March 14, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Faronics Insight 10.0.19045 on Windows. The Insight Teacher Console application allows unauthenticated attackers to view constantly updated screenshots of student desktops and to submit falsified screenshots on behalf of students. Attackers are able to view screenshots of student desktops without their consent. These screenshots may potentially contain sensitive/personal data. Attackers can also rapidly submit falsified images, hiding the actual contents of student desktops from the Teacher Console. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://research.nccgroup.com/?research=Technical%20advisories) 2. [](https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11773 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:51 UTC - **Last Updated**: August 04, 2024 at 11:42 UTC - **Reserved Date**: April 15, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, XR500 before 2.3.2.56, and XR700 before 1.0.1.10. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000061757/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0521)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32478 - **State**: PUBLISHED - **Published Date**: April 09, 2025 at 16:09 UTC - **Last Updated**: April 09, 2025 at 17:58 UTC - **Reserved Date**: April 09, 2025 at 11:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Mario Aguiar WP SexyLightBox allows Stored XSS. This issue affects WP SexyLightBox: from n/a through 0.5.3. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Mario Aguiar - WP SexyLightBox** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-sexylightbox/vulnerability/wordpress-wp-sexylightbox-plugin-0-5-3-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - johska (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49934, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49934 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49934 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 18:01 UTC - **Last Updated**: May 04, 2025 at 09:41 UTC - **Reserved Date**: October 21, 2024 at 12:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name It's observed that a crash occurs during hot-remove a memory device, in which user is accessing the hugetlb. See calltrace as following: ------------[ cut here ]------------ WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790 Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s mirror dm_region_hash dm_log dm_mod CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:do_user_addr_fault+0x2a0/0x790 Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 42 fe ff ff <0f> 0b 48 83 c4 08 4c 89 ea 48 89 ee 4c 89 e7 5b 5d 41 5c 41 5d 41 RSP: 0000:ffffc90000a575f0 EFLAGS: 00010046 RAX: ffff88800c303600 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000001000 RSI: ffffffff82504162 RDI: ffffffff824b2c36 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90000a57658 R13: 0000000000001000 R14: ffff88800bc2e040 R15: 0000000000000000 FS: 00007f51cb57d880(0000) GS:ffff88807fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000001000 CR3: 00000000072e2004 CR4: 00000000001706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? __warn+0x8d/0x190 ? do_user_addr_fault+0x2a0/0x790 ? report_bug+0x1c3/0x1d0 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x14/0x70 ? asm_exc_invalid_op+0x16/0x20 ? do_user_addr_fault+0x2a0/0x790 ? exc_page_fault+0x31/0x200 exc_page_fault+0x68/0x200 <...snip...> BUG: unable to handle page fault for address: 0000000000001000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI ---[ end trace 0000000000000000 ]--- BUG: unable to handle page fault for address: 0000000000001000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 14045 Comm: daxctl Kdump: loaded Tainted: G W 6.10.0-rc2-lizhijian+ #492 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:dentry_name+0x1f4/0x440 <...snip...> ? dentry_name+0x2fa/0x440 vsnprintf+0x1f3/0x4f0 vprintk_store+0x23a/0x540 vprintk_emit+0x6d/0x330 _printk+0x58/0x80 dump_mapping+0x10b/0x1a0 ? __pfx_free_object_rcu+0x10/0x10 __dump_page+0x26b/0x3e0 ? vprintk_emit+0xe0/0x330 ? _printk+0x58/0x80 ? dump_page+0x17/0x50 dump_page+0x17/0x50 do_migrate_range+0x2f7/0x7f0 ? do_migrate_range+0x42/0x7f0 ? offline_pages+0x2f4/0x8c0 offline_pages+0x60a/0x8c0 memory_subsys_offline+0x9f/0x1c0 ? lockdep_hardirqs_on+0x77/0x100 ? _raw_spin_unlock_irqrestore+0x38/0x60 device_offline+0xe3/0x110 state_store+0x6e/0xc0 kernfs_fop_write_iter+0x143/0x200 vfs_write+0x39f/0x560 ksys_write+0x65/0xf0 do_syscall_64+0x62/0x130 Previously, some sanity check have been done in dump_mapping() before the print facility parsing '%pd' though, it's still possible to run into an invalid dentry.d_name.name. Since dump_mapping() only needs to dump the filename only, retrieve it by itself in a safer way to prevent an unnecessary crash. Note that either retrieving the filename with '%pd' or strncpy_from_kernel_nofault(), the filename could be unreliable. ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 6.1.120 (Status: unaffected) - 6.6.64 (Status: unaffected) - 6.10.14 (Status: unaffected) - 6.11.3 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/1a4159138e718db6199f0abf376ad52f726dcc5c) 2. [](https://git.kernel.org/stable/c/e0f6ee75f50476607ca82fc7c3711c795ce09b52) 3. [](https://git.kernel.org/stable/c/f92b8829c6e75632de4e2b9f70e7a7e6c5c2ba98) 4. [](https://git.kernel.org/stable/c/ef921bc72328b577cb45772ff7921cba4773b74a) 5. [](https://git.kernel.org/stable/c/7f7b850689ac06a62befe26e1fd1806799e7f152)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14118 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:43 UTC - **Last Updated**: December 20, 2021 at 22:43 UTC - **Reserved Date**: July 19, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2491, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2491 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2491 - **State**: PUBLISHED - **Published Date**: November 13, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 04:21 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description When opening a deep link URL in SAP Fiori Client with log level set to "Debug", the client application logs the URL to the log file. If this URL contains malicious JavaScript code it can eventually run inside the built-in log viewer of the application in case user opens the viewer and taps on the hyperlink in the viewer. SAP Fiori Client version 1.11.5 in Google Play store addresses these issues and users must update to that version. ### Affected Products **SAP - SAP Fiori Client** Affected versions: - < 1.11.5 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/2691126) 2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56638 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 15:02 UTC - **Last Updated**: May 04, 2025 at 10:00 UTC - **Reserved Date**: December 27, 2024 at 15:00 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_inner: incorrect percpu area handling under softirq Softirq can interrupt ongoing packet from process context that is walking over the percpu area that contains inner header offsets. Disable bh and perform three checks before restoring the percpu inner header offsets to validate that the percpu area is valid for this skbuff: 1) If the NFT_PKTINFO_INNER_FULL flag is set on, then this skbuff has already been parsed before for inner header fetching to register. 2) Validate that the percpu area refers to this skbuff using the skbuff pointer as a cookie. If there is a cookie mismatch, then this skbuff needs to be parsed again. 3) Finally, validate if the percpu area refers to this tunnel type. Only after these three checks the percpu area is restored to a on-stack copy and bh is enabled again. After inner header fetching, the on-stack copy is stored back to the percpu area. ### Affected Products **Linux - Linux** Affected versions: - 3a07327d10a09379315c844c63f27941f5081e0a (Status: affected) - 3a07327d10a09379315c844c63f27941f5081e0a (Status: affected) - 3a07327d10a09379315c844c63f27941f5081e0a (Status: affected) **Linux - Linux** Affected versions: - 6.2 (Status: affected) - 0 (Status: unaffected) - 6.6.66 (Status: unaffected) - 6.12.5 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/53c7314208c865086d78b4e88da53bc33da0b603) 2. [](https://git.kernel.org/stable/c/da5cc778e7bf78fe525bc90ec2043f41415c31d9) 3. [](https://git.kernel.org/stable/c/7b1d83da254be3bf054965c8f3b1ad976f460ae5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23353 - **State**: PUBLISHED - **Published Date**: March 09, 2021 at 18:30 UTC - **Last Updated**: September 17, 2024 at 01:27 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:R` ### Affected Products **n/a - jspdf** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-JSPDF-1073626) 2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286) 3. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287) 4. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288) 5. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289) 6. [](https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e) 7. [](https://github.com/MrRio/jsPDF/pull/3091) ### Credits - Yeting Li
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-47578, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-47578 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-47578 - **State**: PUBLISHED - **Published Date**: May 12, 2025 at 16:04 UTC - **Last Updated**: May 12, 2025 at 18:00 UTC - **Reserved Date**: May 07, 2025 at 09:55 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Edward Caissie BNS Twitter Follow Button allows DOM-Based XSS.This issue affects BNS Twitter Follow Button: from n/a through 0.3.8. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Edward Caissie - BNS Twitter Follow Button** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/bns-twitter-follow-button/vulnerability/wordpress-bns-twitter-follow-button-plugin-0-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Chu The Anh - Blue Rock (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20774 - **State**: PUBLISHED - **Published Date**: July 04, 2023 at 01:44 UTC - **Last Updated**: December 04, 2024 at 16:21 UTC - **Reserved Date**: October 28, 2022 at 02:03 UTC - **Assigned By**: MediaTek ### Vulnerability Description In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07292228; Issue ID: ALPS07292228. ### Affected Products **MediaTek, Inc. - MT6789, MT6835, MT6855, MT6886, MT6895, MT6983, MT6985, MT8195, MT8673, MT8781** Affected versions: - Android 12.0, 13.0 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/July-2023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4632, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4632 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4632 - **State**: PUBLISHED - **Published Date**: November 06, 2019 at 16:39 UTC - **Last Updated**: August 07, 2024 at 00:09 UTC - **Reserved Date**: November 29, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the tcemain flash message. ### Affected Products **TYPO3 - TYPO3** Affected versions: - before 4.5.4 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2011-4632) 2. [](https://typo3.org/security/advisory/typo3-core-sa-2011-001/#XSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23738 - **State**: PUBLISHED - **Published Date**: January 28, 2024 at 00:00 UTC - **Last Updated**: August 01, 2024 at 23:13 UTC - **Reserved Date**: January 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/V3x0r/CVE-2024-23738) 2. [](https://www.electronjs.org/blog/statement-run-as-node-cves)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8883 - **State**: PUBLISHED - **Published Date**: January 13, 2017 at 16:00 UTC - **Last Updated**: August 06, 2024 at 02:35 UTC - **Reserved Date**: October 22, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [95865](http://www.securityfocus.com/bid/95865) 2. [](https://github.com/mdadams/jasper/issues/32) 3. [RHSA-2017:1208](https://access.redhat.com/errata/RHSA-2017:1208) 4. [[oss-security] 20161017 Re: Re: Fuzzing jasper](http://www.openwall.com/lists/oss-security/2016/10/17/1) 5. [[oss-security] 20161022 Re: Fuzzing jasper](http://www.openwall.com/lists/oss-security/2016/10/23/8) 6. [USN-3693-1](https://usn.ubuntu.com/3693-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1752 - **State**: PUBLISHED - **Published Date**: June 22, 2010 at 20:24 UTC - **Last Updated**: August 07, 2024 at 01:35 UTC - **Reserved Date**: May 06, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Stack-based buffer overflow in CFNetwork in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to URL handling. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT4435) 2. [](http://support.apple.com/kb/HT4225) 3. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html) 4. [41016](http://www.securityfocus.com/bid/41016) 5. [appleios-cfnetwork-bo(59631)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59631) 6. [APPLE-SA-2010-06-21-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39004 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 17:56 UTC - **Last Updated**: August 03, 2024 at 11:10 UTC - **Reserved Date**: August 29, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) - 2.1 (Status: affected) **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) - 11.0.1 (Status: affected) - 11.0.0 (Status: affected) **Huawei - Magic UI** Affected versions: - 4.0.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845) 2. [](https://consumer.huawei.com/en/support/bulletin/2022/9/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44534 - **State**: PUBLISHED - **Published Date**: January 03, 2023 at 19:47 UTC - **Last Updated**: April 10, 2025 at 16:04 UTC - **Reserved Date**: October 31, 2022 at 21:09 UTC - **Assigned By**: hpe ### Vulnerability Description A vulnerability in the Aruba EdgeConnect Enterprise Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Hewlett Packard Enterprise (HPE) - Aruba EdgeConnect Enterprise Orchestration Software** Affected versions: - Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned. (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21705 - **State**: REJECTED - **Last Updated**: January 01, 2025 at 00:01 UTC - **Reserved Date**: January 01, 2024 at 00:05 UTC - **Assigned By**: atlassian ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3362 - **State**: REJECTED - **Published Date**: October 29, 2005 at 02:22 UTC - **Last Updated**: December 12, 2005 at 10:00 UTC - **Reserved Date**: October 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8604 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 17:33 UTC - **Last Updated**: August 04, 2024 at 21:24 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.5. An application may be able to execute arbitrary code with system privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/HT210119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22881 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:44 UTC - **Last Updated**: February 26, 2025 at 15:43 UTC - **Reserved Date**: January 09, 2025 at 03:48 UTC - **Assigned By**: Deltaww ### Vulnerability Description Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Delta Electronics - CNCSoft-G2** Affected versions: - 0 (Status: affected) ### References 1. [](https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00003_CNCSoft-G2%20-%20Heap-based%20Buffer%20Overflow_v1.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36852 - **State**: PUBLISHED - **Published Date**: August 22, 2022 at 14:45 UTC - **Last Updated**: February 20, 2025 at 20:13 UTC - **Reserved Date**: July 19, 2021 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Hotel Booking plugin <= 1.10.5 at WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **ThimPress - WP Hotel Booking** Affected versions: - <= 1.10.5 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-hotel-booking/wordpress-wp-hotel-booking-plugin-1-10-5-cross-site-request-forgery-csrf-vulnerability) 2. [](https://wordpress.org/plugins/wp-hotel-booking/#developers) ### Credits - Vulnerability discovered by Ngo Van Thien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22749 - **State**: PUBLISHED - **Published Date**: February 28, 2023 at 16:05 UTC - **Last Updated**: March 07, 2025 at 20:48 UTC - **Reserved Date**: January 06, 2023 at 15:24 UTC - **Assigned By**: hpe ### Vulnerability Description There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Hewlett Packard Enterprise (HPE) - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central** Affected versions: - ArubaOS 8.6.x.x: 8.6.0.19 and below (Status: affected) - ArubaOS 8.10.x.x: 8.10.0.4 and below (Status: affected) - ArubaOS 10.3.x.x: 10.3.1.0 and below (Status: affected) - SD-WAN 8.7.0.0-2.3.0.x: 8.7.0.0-2.3.0.8 and below (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt) ### Credits - Erik de Jong (bugcrowd.com/erikdejong)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14064 - **State**: PUBLISHED - **Published Date**: August 31, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 19:13 UTC - **Reserved Date**: August 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3685-1](https://usn.ubuntu.com/3685-1/) 2. [RHSA-2018:0585](https://access.redhat.com/errata/RHSA-2018:0585) 3. [DSA-3966](https://www.debian.org/security/2017/dsa-3966) 4. [](https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/) 5. [RHSA-2018:0378](https://access.redhat.com/errata/RHSA-2018:0378) 6. [](https://hackerone.com/reports/209949) 7. [1042004](http://www.securitytracker.com/id/1042004) 8. [](https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/) 9. [1039363](http://www.securitytracker.com/id/1039363) 10. [RHSA-2017:3485](https://access.redhat.com/errata/RHSA-2017:3485) 11. [[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html) 12. [RHSA-2018:0583](https://access.redhat.com/errata/RHSA-2018:0583) 13. [](https://bugs.ruby-lang.org/issues/13853) 14. [](https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85) 15. [100890](http://www.securityfocus.com/bid/100890) 16. [GLSA-201710-18](https://security.gentoo.org/glsa/201710-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1161 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:44 UTC - **Reserved Date**: March 15, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (CSS) vulnerability in Lotus Domino 5.0.6 allows remote attackers to execute script on other web clients via a URL that ends in Javascript, which generates an error message that does not quote the resulting script. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [lotus-domino-css(6789)](http://www.iss.net/security_center/static/6789.php) 2. [2962](http://www.securityfocus.com/bid/2962) 3. [20010702 Re: Lotus Domino Server Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/194609) 4. [VU#642239](http://www.kb.cert.org/vuls/id/642239) 5. [1887](http://www.osvdb.org/1887) 6. [20010702 Lotus Domino Server Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/194465)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41267 - **State**: PUBLISHED - **Published Date**: September 14, 2023 at 07:46 UTC - **Last Updated**: February 13, 2025 at 17:09 UTC - **Reserved Date**: August 27, 2023 at 21:27 UTC - **Assigned By**: apache ### Vulnerability Description In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1 ### Weakness Classification (CWE) - CWE-829: Security Weakness ### Affected Products **Apache Software Foundation - Apache Airflow HDFS Provider** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/apache/airflow/pull/33813) 2. [](https://lists.apache.org/thread/ggthr5pn42bn6wcr25hxnykjzh4ntw7z) 3. [](http://www.openwall.com/lists/oss-security/2023/09/14/3) ### Credits - AnupamAs01
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20817, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20817 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20817 - **State**: PUBLISHED - **Published Date**: February 06, 2024 at 02:23 UTC - **Last Updated**: May 08, 2025 at 18:56 UTC - **Reserved Date**: December 05, 2023 at 04:57 UTC - **Assigned By**: SamsungMobile ### Vulnerability Description Out-of-bounds Write vulnerabilities in svc1td_vld_slh of libsthmbc.so prior to SMR Feb-2024 Release 1 allows local attackers to trigger buffer overflow. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L` ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - SMR Feb-2024 Release in Android 11, 12, 13, 14 (Status: unaffected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37740, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37740 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37740 - **State**: PUBLISHED - **Published Date**: April 20, 2022 at 19:31 UTC - **Last Updated**: August 04, 2024 at 01:30 UTC - **Reserved Date**: July 30, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mdt.de/EN_IP_Interface_Router.html) 2. [](https://www.mdt.de/download/MDT_CL_SCN_IP_03_IP_Interface_Router.pdf) 3. [](https://github.com/robertguetzkow/CVE-2021-37740)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4294 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 15:15 UTC - **Last Updated**: August 06, 2024 at 11:12 UTC - **Reserved Date**: June 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java VM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4295, CVE-2014-6538, and CVE-2014-6563. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70508](http://www.securityfocus.com/bid/70508) 2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23793, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23793 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23793 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:08 UTC - **Last Updated**: January 17, 2025 at 17:31 UTC - **Reserved Date**: January 16, 2025 at 11:30 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Auto FTP allows Stored XSS. This issue affects Auto FTP: from n/a through 1.0.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Turcu Ciprian - Auto FTP** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/auto-ftp/vulnerability/wordpress-auto-ftp-plugin-1-0-1-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25027 - **State**: PUBLISHED - **Published Date**: January 12, 2023 at 00:00 UTC - **Last Updated**: April 08, 2025 at 14:15 UTC - **Reserved Date**: February 14, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Forgotten Password functionality of Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to bypass authentication and access restricted pages by validating the user's session token when the "Password forgotten?" button is clicked. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-21866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-21866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-21866 - **State**: PUBLISHED - **Published Date**: January 17, 2023 at 23:35 UTC - **Last Updated**: September 17, 2024 at 14:13 UTC - **Reserved Date**: December 17, 2022 at 19:26 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.28 and prior (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2023.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9109 - **State**: PUBLISHED - **Published Date**: June 18, 2020 at 13:02 UTC - **Last Updated**: August 05, 2024 at 16:55 UTC - **Reserved Date**: May 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git) 2. [openSUSE-SU-2020:0827](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html) 3. [](https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html) 4. [](http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git%3Ba=blob%3Bf=changelog) 5. [FEDORA-2020-530188bf36](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/) 6. [FEDORA-2020-e59bcaf702](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6431 - **State**: PUBLISHED - **Published Date**: December 23, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:22 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IOS XE 16.1.1 allows remote attackers to cause a denial of service (device reload) via a packet with the 00-00-00-00-00-00 source MAC address, aka Bug ID CSCux48405. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1034514](http://www.securitytracker.com/id/1034514) 2. [79654](http://www.securityfocus.com/bid/79654) 3. [20151221 Cisco IOS XE Software Packet Processing Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2015-1221-iosxe)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2513 - **State**: PUBLISHED - **Published Date**: November 22, 2022 at 10:30 UTC - **Last Updated**: May 01, 2025 at 03:55 UTC - **Reserved Date**: July 22, 2022 at 13:30 UTC - **Assigned By**: Hitachi Energy ### Vulnerability Description A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-312: Security Weakness ### Affected Products **Hitachi Energy - PCM600** Affected versions: - v2.6 (Status: affected) **Hitachi Energy - 670 Connectivity Package** Affected versions: - 3.0 (Status: affected) **Hitachi Energy - 650 Connectivity Package** Affected versions: - 1.3 (Status: affected) **Hitachi Energy - SAM600-IO Connectivity Package** Affected versions: - 1.0 (Status: affected) **Hitachi Energy - GMS600 Connectivity Package** Affected versions: - 1.3 (Status: affected) **Hitachi Energy - PWC600 Connectivity Package** Affected versions: - 1.1 (Status: affected) ### References 1. [](https://publisher.hitachienergy.com/preview?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch) ### Credits - PSE - Polskie Sieci Elektroenergetyczne (Polish Power Grid Company (PPGC))
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3551 - **State**: PUBLISHED - **Published Date**: July 29, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:50 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the advanced-grading implementation in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) qualification or (2) rating field in a rubric. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-46223) 2. [[oss-security] 20140721 Moodle security notifications public](http://openwall.com/lists/oss-security/2014/07/21/1) 3. [](https://moodle.org/mod/forum/discuss.php?d=264273) 4. [68763](http://www.securityfocus.com/bid/68763)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16059 - **State**: PUBLISHED - **Published Date**: June 07, 2018 at 02:00 UTC - **Last Updated**: September 17, 2024 at 00:01 UTC - **Reserved Date**: October 29, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description mssql-node was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. ### Weakness Classification (CWE) - CWE-506: Security Weakness ### Affected Products **HackerOne - mssql-node node module** Affected versions: - All versions (Status: affected) ### References 1. [](https://nodesecurity.io/advisories/480)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24056 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 16:59 UTC - **Last Updated**: May 19, 2025 at 21:38 UTC - **Reserved Date**: January 16, 2025 at 23:11 UTC - **Assigned By**: microsoft ### Vulnerability Description Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19044.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows Server 2025 (Server Core installation)** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows Server 2025** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Telephony Service Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0840 - **State**: PUBLISHED - **Published Date**: April 01, 2010 at 16:00 UTC - **Last Updated**: February 10, 2025 at 18:55 UTC - **Reserved Date**: March 03, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2010-05-18-1](http://lists.apple.com/archives/security-announce/2010//May/msg00001.html) 2. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2) 3. [20100405 ZDI-10-056: Sun Java Runtime Environment Trusted Methods Chaining Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/510528/100/0/threaded) 4. [39317](http://secunia.com/advisories/39317) 5. [RHSA-2010:0383](http://www.redhat.com/support/errata/RHSA-2010-0383.html) 6. [40545](http://secunia.com/advisories/40545) 7. [ADV-2010-1454](http://www.vupen.com/english/advisories/2010/1454) 8. [oval:org.mitre.oval:def:13971](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971) 9. [39819](http://secunia.com/advisories/39819) 10. [ADV-2010-1107](http://www.vupen.com/english/advisories/2010/1107) 11. [RHSA-2010:0338](http://www.redhat.com/support/errata/RHSA-2010-0338.html) 12. [ADV-2010-1793](http://www.vupen.com/english/advisories/2010/1793) 13. [APPLE-SA-2010-05-18-2](http://lists.apple.com/archives/security-announce/2010//May/msg00002.html) 14. [SUSE-SR:2010:011](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html) 15. [43308](http://secunia.com/advisories/43308) 16. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html) 17. [SSRT100179](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751) 18. [SSRT100089](http://marc.info/?l=bugtraq&m=127557596201693&w=2) 19. [](http://www.oracle.com/technetwork/topics/security/javacpumar2010-083341.html) 20. [RHSA-2010:0339](http://www.redhat.com/support/errata/RHSA-2010-0339.html) 21. [HPSBUX02524](http://marc.info/?l=bugtraq&m=127557596201693&w=2) 22. [39292](http://secunia.com/advisories/39292) 23. [](http://support.apple.com/kb/HT4170) 24. [ADV-2010-1523](http://www.vupen.com/english/advisories/2010/1523) 25. [](http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html) 26. [39065](http://www.securityfocus.com/bid/39065) 27. [SUSE-SR:2010:008](http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html) 28. [39659](http://secunia.com/advisories/39659) 29. [RHSA-2010:0471](http://www.redhat.com/support/errata/RHSA-2010-0471.html) 30. [SUSE-SR:2010:017](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html) 31. [USN-923-1](http://ubuntu.com/usn/usn-923-1) 32. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html) 33. [RHSA-2010:0337](http://www.redhat.com/support/errata/RHSA-2010-0337.html) 34. [RHSA-2010:0489](http://www.redhat.com/support/errata/RHSA-2010-0489.html) 35. [HPSBMA02547](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751) 36. [](http://www.zerodayinitiative.com/advisories/ZDI-10-056) 37. [40211](http://secunia.com/advisories/40211) 38. [](http://support.apple.com/kb/HT4171) 39. [oval:org.mitre.oval:def:9974](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974) 40. [MDVSA-2010:084](http://www.mandriva.com/security/advisories?name=MDVSA-2010:084) 41. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded) 42. [ADV-2010-1191](http://www.vupen.com/english/advisories/2010/1191)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9791 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: isc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10825 - **State**: PUBLISHED - **Published Date**: August 01, 2019 at 16:39 UTC - **Last Updated**: August 06, 2024 at 03:38 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 55.9999.141 allows attackers to bypass a Security Policy by faking static documents (SEC-92). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/56+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20851 - **State**: PUBLISHED - **Published Date**: June 19, 2020 at 14:02 UTC - **Last Updated**: August 05, 2024 at 02:53 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Mattermost Mobile Apps before 1.26.0. An attacker can use directory traversal with the Video Preview feature to overwrite arbitrary files on a device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://mattermost.com/security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3622 - **State**: PUBLISHED - **Published Date**: July 14, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 18:39 UTC - **Reserved Date**: July 14, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The showtopic module in Koobi Pro CMS 5.6 allows remote attackers to obtain sensitive information via a ' (single quote) in the p parameter, which displays the path in an error message. NOTE: it is not clear whether this is SQL injection or a forced SQL error. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060815 Koobi Pro CMS 5.6 SQL injection & XSS](http://www.securityfocus.com/archive/1/443294/100/100/threaded) 2. [1016485](http://securitytracker.com/id?1016485)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6742 - **State**: PUBLISHED - **Published Date**: April 21, 2011 at 10:00 UTC - **Last Updated**: September 17, 2024 at 01:36 UTC - **Reserved Date**: April 20, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The get_filter_list function in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0006 does not properly perform certain sub filter parsing, which allows remote authenticated users to cause a denial of service (infinite loop) via a malformed search filter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [IO07450](http://www.ibm.com/support/docview.wss?uid=swg1IO07450) 2. [](http://www.ibm.com/support/docview.wss?uid=swg24029663)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28651 - **State**: PUBLISHED - **Published Date**: June 01, 2023 at 00:00 UTC - **Last Updated**: January 09, 2025 at 20:52 UTC - **Reserved Date**: May 11, 2023 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. If a user who can access the affected product with an administrative privilege configures specially crafted settings, an arbitrary script may be executed on the web browser of the other user who is accessing the affected product with an administrative privilege. ### Affected Products **Contec Co., Ltd. - CONPROSYS HMI System (CHS)** Affected versions: - versions prior to 3.5.3 (Status: affected) ### References 1. [](https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf) 2. [](https://www.contec.com/jp/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_jp.pdf) 3. [](https://jvn.jp/en/vu/JVNVU93372935/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11266 - **State**: PUBLISHED - **Published Date**: June 09, 2021 at 05:00 UTC - **Last Updated**: August 04, 2024 at 11:28 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Image address is dereferenced before validating its range which can cause potential QSEE information leakage in Snapdragon Wired Infrastructure and Networking ### Affected Products **Qualcomm, Inc. - Snapdragon Wired Infrastructure and Networking** Affected versions: - AR7420, AR9580, CSR8811, IPQ4018, IPQ4019, IPQ4028, IPQ4029, QCA10901, QCA4024, QCA7500, QCA7520, QCA7550, QCA8075, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9984, QCA9992, QCA9994, QCN3018, QFE1922, QFE1952, WCD9340, WSA8810 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31121 - **State**: PUBLISHED - **Published Date**: July 07, 2022 at 18:00 UTC - **Last Updated**: April 23, 2025 at 18:04 UTC - **Reserved Date**: May 18, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **hyperledger - fabric** Affected versions: - < 2.2.7 (Status: affected) - >= 2.3.0, < 2.4.5 (Status: affected) ### References 1. [](https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p) 2. [](https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06) 3. [](https://github.com/hyperledger/fabric/releases/tag/v2.2.7) 4. [](https://github.com/hyperledger/fabric/releases/tag/v2.4.5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1898 - **State**: PUBLISHED - **Published Date**: June 03, 2009 at 16:33 UTC - **Last Updated**: August 07, 2024 at 05:27 UTC - **Reserved Date**: June 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The secure login page in the Administrative Console component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 does not redirect to an https page upon receiving an http request, which makes it easier for remote attackers to read the contents of WAS sessions by sniffing the network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35301](http://secunia.com/advisories/35301) 2. [was-securelogin-info-disclosure(51170)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51170) 3. [35405](http://www.securityfocus.com/bid/35405) 4. [](http://www-01.ibm.com/support/docview.wss?uid=swg27006876) 5. [PK77010](http://www-1.ibm.com/support/docview.wss?uid=swg1PK77010) 6. [ADV-2009-1464](http://www.vupen.com/english/advisories/2009/1464)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2184 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35960, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35960 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35960 - **State**: PUBLISHED - **Published Date**: January 08, 2024 at 14:47 UTC - **Last Updated**: February 13, 2025 at 16:56 UTC - **Reserved Date**: June 20, 2023 at 18:31 UTC - **Assigned By**: talos ### Vulnerability Description Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns legacy decompression in `vcd_main`. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **GTKWave - GTKWave** Affected versions: - 3.3.115 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786) 2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html) ### Credits - Discovered by Claudio Bozzato of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1087 - **State**: PUBLISHED - **Published Date**: February 23, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 12:43 UTC - **Reserved Date**: February 23, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IBM DB2 8.x before 8.1 FixPak 15 and 9.1 before Fix Pack 2 does not properly terminate certain input strings, which allows local users to execute arbitrary code via unspecified environment variables that trigger a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [40970](http://osvdb.org/40970) 2. [20070818 Recent DB2 Vulnerabilities](http://www.attrition.org/pipermail/vim/2007-August/001765.html) 3. [IY94833](http://www-1.ibm.com/support/docview.wss?uid=swg21255747) 4. [db2-bss-bo(32651)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32651) 5. [20070222 IBM DB2 Universal Database Multiple Privilege Escalation Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=481) 6. [22677](http://www.securityfocus.com/bid/22677)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54310 - **State**: PUBLISHED - **Published Date**: December 13, 2024 at 14:25 UTC - **Last Updated**: December 13, 2024 at 17:37 UTC - **Reserved Date**: December 02, 2024 at 12:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Aslam Khan Gouran Gou Manage My Account Menu allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Gou Manage My Account Menu: from n/a through 1.0.1.8. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Aslam Khan Gouran - Gou Manage My Account Menu** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/gou-wc-account-tabs/vulnerability/wordpress-gou-manage-my-account-menu-plugin-1-0-1-8-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24183 - **State**: PUBLISHED - **Published Date**: April 05, 2021 at 18:27 UTC - **Last Updated**: August 03, 2024 at 19:21 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The tutor_quiz_builder_get_question_form AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Tutor LMS – eLearning and online course solution** Affected versions: - 1.8.3 (Status: affected) ### References 1. [](https://www.wordfence.com/blog/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin/) 2. [](https://wpscan.com/vulnerability/9b8da6b7-f1d6-4a7d-a621-4ca01e4b7496) ### Credits - Chloe Chamberland
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1212 - **State**: PUBLISHED - **Published Date**: May 29, 2013 at 19:00 UTC - **Last Updated**: September 16, 2024 at 20:57 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The SSL functionality in Cisco NX-OS on the Nexus 1000V does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof servers, and intercept or modify Virtual Supervisor Module (VSM) to VMware vCenter communication, via a crafted certificate, aka Bug ID CSCud14837. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130528 Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1212)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0721 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 18:52 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0719. ### Affected Products **Microsoft - Windows** Affected versions: - 10 Version 1709 for x64-based Systems (Status: affected) - 10 Version 1803 for x64-based Systems (Status: affected) - 10 Version 1809 for x64-based Systems (Status: affected) **Microsoft - Windows Server** Affected versions: - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0721)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5330, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5330 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5330 - **State**: PUBLISHED - **Published Date**: August 01, 2024 at 06:47 UTC - **Last Updated**: August 01, 2024 at 18:37 UTC - **Reserved Date**: May 24, 2024 at 17:31 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the breakdance_css_file_paths_cache parameter in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Breakdance - Breakdance** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9dbd26f5-b75e-41a3-aefb-d6c8cc2cec7b?source=cve) 2. [](https://breakdance.com/breakdance-2-0-now-available/) ### Credits - Francesco Carlucci