System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30853 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 20:58 UTC - **Last Updated**: April 02, 2025 at 14:21 UTC - **Reserved Date**: March 26, 2025 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in ShortPixel ShortPixel Adaptive Images allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ShortPixel Adaptive Images: from n/a through 3.10.0. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **ShortPixel - ShortPixel Adaptive Images** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/shortpixel-adaptive-images/vulnerability/wordpress-shortpixel-adaptive-images-plugin-3-10-0-broken-authentication-vulnerability?_s_id=cve) ### Credits - Peter Thaleikis (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2600, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2600 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2600 - **State**: PUBLISHED - **Published Date**: May 15, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 14:02 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343). ### Weakness Classification (CWE) - CWE-325: Security Weakness ### Affected Products **[UNKNOWN] - jenkins** Affected versions: - jenkins 2.44 (Status: affected) - jenkins 2.32.2 (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2017-02-01/) 2. [95954](http://www.securityfocus.com/bid/95954) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600) 4. [](https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40163 - **State**: PUBLISHED - **Published Date**: September 25, 2023 at 15:22 UTC - **Last Updated**: September 24, 2024 at 19:27 UTC - **Reserved Date**: August 22, 2023 at 10:29 UTC - **Assigned By**: talos ### Vulnerability Description An out-of-bounds write vulnerability exists in the allocate_buffer_for_jpeg_decoding functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Accusoft - ImageGear** Affected versions: - 20.1 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836) ### Credits - Discovered by Emmanuel Tacheau of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0265, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0265 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0265 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: April 02, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2556](http://www.securityfocus.com/bid/2556) 2. [1782](http://www.osvdb.org/1782) 3. [A040901-1](http://www.atstake.com/research/advisories/2001/a040901-1.txt) 4. [pgp-armor-code-execution(6643)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6643)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0668, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0668 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0668 - **State**: PUBLISHED - **Published Date**: January 20, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 09:20 UTC - **Reserved Date**: January 02, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the portal in Cisco Secure Access Control System (ACS) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCue65949. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cisco-acs-cve20140668-xss(90561)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90561) 2. [20140117 Cisco Secure ACS Portal Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0668) 3. [56543](http://secunia.com/advisories/56543) 4. [102256](http://osvdb.org/102256) 5. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=32489) 6. [65016](http://www.securityfocus.com/bid/65016) 7. [1029654](http://www.securitytracker.com/id/1029654)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15360, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15360 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15360 - **State**: PUBLISHED - **Published Date**: October 15, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 03:48 UTC - **Reserved Date**: October 15, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all group names created, related to incorrect error handling for an HTML encoded script. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/stolabs/security-issue-on-prtg-network-manager-ada65b45d37b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-45953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-45953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-45953 - **State**: PUBLISHED - **Published Date**: April 28, 2025 at 00:00 UTC - **Last Updated**: April 29, 2025 at 13:45 UTC - **Reserved Date**: April 22, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability was found in PHPGurukul Hostel Management System 2.1 in the /hostel/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://phpgurukul.com) 2. [](https://github.com/VasilVK/CVE/blob/main/CVE-2025-45953/README.MD)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22497 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 15:31 UTC - **Last Updated**: March 27, 2025 at 16:03 UTC - **Reserved Date**: January 07, 2025 at 10:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in A.H.C. Waasdorp Simple Google Calendar Outlook Events Block Widget allows Stored XSS.This issue affects Simple Google Calendar Outlook Events Block Widget: from n/a through 2.5.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **A.H.C. Waasdorp - Simple Google Calendar Outlook Events Block Widget** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/simple-google-icalendar-widget/vulnerability/wordpress-simple-google-calendar-outlook-events-block-widget-plugin-2-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Peter Thaleikis (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24323 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 23:05 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: February 02, 2022 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause a disruption of communication between the Modicon controller and the engineering software, when an attacker is able to intercept and manipulate specific Modbus response data. Affected Product: EcoStruxure Process Expert (V2021 and prior), EcoStruxure Control Expert (V15.0 SP1 and prior) ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-754: Security Weakness ### Affected Products **Schneider Electric - EcoStruxure Process Expert** Affected versions: - V2021 and prior (Status: affected) **Schneider Electric - EcoStruxure Control Expert** Affected versions: - V15.0 SP1 and prior (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5190 - **State**: PUBLISHED - **Published Date**: August 07, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:34 UTC - **Reserved Date**: August 07, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in captcha-secureimage/test/index.php in the SI CAPTCHA Anti-Spam plugin 2.7.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [69011](http://www.securityfocus.com/bid/69011) 2. [](http://packetstormsecurity.com/files/127723/WordPress-SI-CAPTCHA-Cross-Site-Scripting.html) 3. [sicaptchaantispam-wordpress-index-xss(95104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36444 - **State**: PUBLISHED - **Published Date**: February 03, 2023 at 00:00 UTC - **Last Updated**: March 26, 2025 at 16:23 UTC - **Reserved Date**: July 12, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Request Forgery (CSRF) vulnerability in imcat 5.4 allows remote attackers to gain escalated privileges via flaws one time token generation on the add administrator page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/peacexie/imcat/issues/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34479 - **State**: PUBLISHED - **Published Date**: July 14, 2021 at 17:54 UTC - **Last Updated**: November 19, 2024 at 14:41 UTC - **Reserved Date**: June 09, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Visual Studio Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Visual Studio Code** Affected versions: - 1.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34479)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41112 - **State**: PUBLISHED - **Published Date**: July 26, 2024 at 20:01 UTC - **Last Updated**: August 02, 2024 at 04:46 UTC - **Reserved Date**: July 15, 2024 at 15:53 UTC - **Assigned By**: GitHub_M ### Vulnerability Description streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the palette variable in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 380, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **opengeos - streamlit-geospatial** Affected versions: - < c4f81d9616d40c60584e36abb15300853a66e489 (Status: affected) ### References 1. [https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/](https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/) 2. [https://github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489](https://github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489) 3. [https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L373-L376](https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L373-L376) 4. [https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L380](https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py#L380)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8495 - **State**: PUBLISHED - **Published Date**: February 13, 2017 at 15:00 UTC - **Last Updated**: October 25, 2024 at 14:40 UTC - **Reserved Date**: October 07, 2016 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature. ### Affected Products **Fortinet - FortiManager** Affected versions: - 5.0.6 to 5.2.7 (Status: affected) - 5.4.0 to 5.4.1 (Status: affected) ### References 1. [1037805](http://www.securitytracker.com/id/1037805) 2. [](https://fortiguard.com/advisory/FG-IR-16-055) 3. [96157](http://www.securityfocus.com/bid/96157)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31381 - **State**: PUBLISHED - **Published Date**: October 19, 2021 at 18:17 UTC - **Last Updated**: September 16, 2024 at 17:08 UTC - **Reserved Date**: April 15, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to delete files which may allow the attacker to disrupt the integrity and availability of the system. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-16: Security Weakness - CWE-200: Improper Input Validation ### Affected Products **Juniper Networks - SRC Series** Affected versions: - unspecified (Status: affected) - 4.13.0 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11248)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6777 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 08, 2024 at 18:30 UTC - **Reserved Date**: December 13, 2023 at 13:26 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 9.0.34 due to the plugin adding the API key to several plugin files. This makes it possible for unauthenticated attackers to obtain the developer's Google API key. While this does not affect the security of sites using this plugin, it allows unauthenticated attackers to make requests using this API key with the potential of exhausting requests resulting in an inability to use the map functionality offered by the plugin. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **wpgmaps - WP Go Maps (formerly WP Google Maps)** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/509cccbd-3aa0-45f1-84a0-387d678ebf65?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058300%40wp-google-maps&new=3058300%40wp-google-maps&sfp_email=&sfph_mail=#file673) ### Credits - Hassan Khan Yusufzai - Danish Tariq
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-25352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-25352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-25352 - **State**: PUBLISHED - **Published Date**: February 13, 2025 at 00:00 UTC - **Last Updated**: February 14, 2025 at 19:05 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL Injection vulnerability was found in /admin/aboutus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the pagetitle POST request parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20About.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2655 - **State**: PUBLISHED - **Published Date**: April 02, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:21 UTC - **Reserved Date**: March 26, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the gen_show_status function in functions.inc.php in Postfix Admin (aka postfixadmin) before 2.3.7 allows remote authenticated users to execute arbitrary SQL commands via a new alias. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/p/postfixadmin/code/1650) 2. [DSA-2889](http://www.debian.org/security/2014/dsa-2889) 3. [openSUSE-SU-2014:0715](http://lists.opensuse.org/opensuse-updates/2014-05/msg00075.html) 4. [66455](http://www.securityfocus.com/bid/66455) 5. [[oss-security] 20140326 Re: CVE request: postfixadmin SQL injection vulnerability](http://www.openwall.com/lists/oss-security/2014/03/26/11) 6. [[oss-security] 20140326 CVE request: postfixadmin SQL injection vulnerability](http://www.openwall.com/lists/oss-security/2014/03/26/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6827, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6827 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6827 - **State**: PUBLISHED - **Published Date**: September 11, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 07:29 UTC - **Reserved Date**: September 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Auto-Exchanger 5.1.0 allows remote attackers to hijack the authentication of users for requests that change a password via a request to signup.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/133498/Autoexchanger-5.1.0-Cross-Site-Request-Forgery.html) 2. [38119](https://www.exploit-db.com/exploits/38119/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2905 - **State**: PUBLISHED - **Published Date**: September 09, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 00:53 UTC - **Reserved Date**: August 19, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **n/a - kernel** Affected versions: - Linux kernel 6.0-rc4 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2121800) 2. [](https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/) 3. [[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3947 - **State**: PUBLISHED - **Published Date**: October 03, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:57 UTC - **Reserved Date**: June 03, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unrestricted file upload vulnerability in the powermail extension before 1.6.11 and 2.x before 2.0.14 for TYPO3 allows remote attackers to execute arbitrary code by uploading a file with a crafted extension, then accessing it via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007/) 2. [](http://typo3.org/extensions/repository/view/powermail)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0456, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0456 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0456 - **State**: PUBLISHED - **Published Date**: January 28, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 00:52 UTC - **Reserved Date**: January 28, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the indianpulse Game Server (com_gameserver) component 1.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the grp parameter in a gameserver action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37920](http://www.securityfocus.com/bid/37920) 2. [gameserver-grp-sql-injection(55829)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55829) 3. [11222](http://www.exploit-db.com/exploits/11222) 4. [37934](http://www.securityfocus.com/bid/37934)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10433, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10433 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10433 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 19:56 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 820, and SD 820A, TOCTOU vulnerability during SSD image decryption may cause memory corruption. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 820, SD 820A (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24388 - **State**: PUBLISHED - **Published Date**: February 17, 2023 at 14:25 UTC - **Last Updated**: August 02, 2024 at 14:46 UTC - **Reserved Date**: January 23, 2023 at 18:16 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in WpDevArt Booking calendar, Appointment Booking System plugin <= 3.2.3 versions affects plugin forms actions (create, duplicate, edit, delete). ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **WpDevArt - Booking calendar, Appointment Booking System** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/booking-calendar/wordpress-booking-calendar-appointment-booking-system-plugin-3-2-3-cross-site-request-forgery-csrf?_s_id=cve) ### Credits - yuyudhn (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9398 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 23:11 UTC - **Last Updated**: December 05, 2024 at 16:43 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In fm_set_stat of mediatek FM radio driver, there is a possible OOB write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2018-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0938 - **State**: PUBLISHED - **Published Date**: March 14, 2022 at 08:05 UTC - **Last Updated**: August 02, 2024 at 23:47 UTC - **Reserved Date**: March 13, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Stored XSS via file upload in GitHub repository star7th/showdoc prior to v2.10.4. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **star7th - star7th/showdoc** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e) 2. [](https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5858 - **State**: PUBLISHED - **Published Date**: November 01, 2023 at 17:14 UTC - **Last Updated**: February 13, 2025 at 17:25 UTC - **Reserved Date**: October 30, 2023 at 22:11 UTC - **Assigned By**: Chrome ### Vulnerability Description Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low) ### Affected Products **Google - Chrome** Affected versions: - 119.0.6045.105 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html) 2. [](https://crbug.com/1457704) 3. [](https://www.debian.org/security/2023/dsa-5546) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/) 5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/) 6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/) 7. [](https://security.gentoo.org/glsa/202311-11) 8. [](https://security.gentoo.org/glsa/202312-07) 9. [](https://security.gentoo.org/glsa/202401-34)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2066 - **State**: PUBLISHED - **Published Date**: June 28, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:15 UTC - **Reserved Date**: June 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in comment_post.asp in ASP Nuke 0.80 allows remote attackers to execute arbitrary SQL statements via the TaskID parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050627 SQL Injection Exploit for ASPNuke <= 0.80](http://marc.info/?l=bugtraq&m=111999188612055&w=2) 2. [14064](http://www.securityfocus.com/bid/14064) 3. [20050626 M4DR007-07SA (security advisory): Multiple vulnerabilities in ASP Nuke 0.80](http://marc.info/?l=bugtraq&m=111989223906484&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20401 - **State**: PUBLISHED - **Published Date**: July 17, 2024 at 16:26 UTC - **Last Updated**: August 01, 2024 at 21:59 UTC - **Reserved Date**: November 08, 2023 at 15:08 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the content scanning and message filtering features of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to overwrite arbitrary files on the underlying operating system. This vulnerability is due to improper handling of email attachments when file analysis and content filters are enabled. An attacker could exploit this vulnerability by sending an email that contains a crafted attachment through an affected device. A successful exploit could allow the attacker to replace any file on the underlying file system. The attacker could then perform any of the following actions: add users with root privileges, modify the device configuration, execute arbitrary code, or cause a permanent denial of service (DoS) condition on the affected device. Note: Manual intervention is required to recover from the DoS condition. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Cisco - Cisco Secure Email** Affected versions: - N/A (Status: affected) ### References 1. [cisco-sa-esa-afw-bGG2UsjH](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44989, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44989 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44989 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 17:20 UTC - **Last Updated**: August 06, 2024 at 15:18 UTC - **Reserved Date**: October 02, 2023 at 09:38 UTC - **Assigned By**: Patchstack ### Vulnerability Description Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **GSheetConnector - CF7 Google Sheets Connector** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/cf7-google-sheets-connector/wordpress-cf7-google-sheets-connector-plugin-5-0-5-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39371 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 16:41 UTC - **Last Updated**: May 19, 2025 at 16:56 UTC - **Reserved Date**: April 16, 2025 at 06:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Sanjeev Mohindra Author Box Plugin With Different Description allows Cross Site Request Forgery.This issue affects Author Box Plugin With Different Description: from n/a through 1.3.5. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Sanjeev Mohindra - Author Box Plugin With Different Description** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/author-box-with-different-description/vulnerability/wordpress-author-box-plugin-with-different-description-plugin-1-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - johska (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9500, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9500 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9500 - **State**: PUBLISHED - **Published Date**: January 16, 2020 at 20:35 UTC - **Last Updated**: August 04, 2024 at 21:54 UTC - **Reserved Date**: March 01, 2019 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. ### CVSS Metrics - **CVSS Base Score**: 7.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Broadcom - brcmfmac WiFi driver** Affected versions: - commit prior to 1b5e2423164b3670e8bc9174e4762d297990deff (Status: affected) ### References 1. [](https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html) 2. [](https://kb.cert.org/vuls/id/166939/) 3. [](https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36115 - **State**: PUBLISHED - **Published Date**: January 28, 2021 at 19:15 UTC - **Last Updated**: August 04, 2024 at 17:16 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stored Cross Site Scripting (XSS) vulnerability in EGavilan Media CRUD Operation with PHP, MySQL, Bootstrap, and Dompdf via First Name or Last Name parameter in the 'Add New Record Feature'. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/49484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30969 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 18:51 UTC - **Last Updated**: August 03, 2024 at 22:48 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A path handling issue was addressed with improved validation. This issue is fixed in Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. Processing a maliciously crafted URL may cause unexpected JavaScript execution from a file on disk. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212979) 2. [](https://support.apple.com/en-us/HT212981)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0339, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0339 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0339 - **State**: PUBLISHED - **Published Date**: March 18, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:17 UTC - **Reserved Date**: March 17, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ViewTopic.php in phpBB, possibly 2.0.6c and earlier, allows remote attackers to execute arbitrary script or HTML as other users via the postorder parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [phpbb-viewtopicphp-xss(15348)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15348) 2. [9765](http://www.securityfocus.com/bid/9765) 3. [20040228 New phpBB ViewTopic.php Cross Site Scripting Vulnerability](http://marc.info/?l=bugtraq&m=107799508130700&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0734 - **State**: PUBLISHED - **Published Date**: February 01, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Adobe ColdFusion before 9.0.1 CHF1 allows remote attackers to inject arbitrary web script or HTML via an id parameter containing a JavaScript onLoad event handler for a BODY element, related to a "tag body" attack. NOTE: this was originally reported as affecting 9.0.1 CHF1 and earlier. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [70778](http://osvdb.org/70778) 2. [](http://websecurity.com.ua/4879/) 3. [](http://kb2.adobe.com/cps/890/cpsid_89094.html) 4. [1025012](http://securitytracker.com/id?1025012) 5. [](http://www.adobe.com/support/security/bulletins/apsb11-04.html) 6. [20110128 Vulnerabilities in Adobe ColdFusion](http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0537.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40432, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40432 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40432 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 15:23 UTC - **Last Updated**: August 03, 2024 at 12:21 UTC - **Reserved Date**: September 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pypi.org/project/d8s-strings/) 2. [](https://pypi.org/project/democritus-hypothesis/) 3. [](https://github.com/democritus-project/d8s-strings/issues/21)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2304, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2304 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2304 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9489](http://www.securityfocus.com/bid/9489) 2. [](http://security.e-matters.de/advisories/022004.html) 3. [10973](http://secunia.com/advisories/10973) 4. [trillian-directim-bo(15303)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15303) 5. [1009220](http://securitytracker.com/id?1009220) 6. [20040224 Advisory 02/2004: Trillian remote overflows](http://lists.seifried.org/pipermail/security/2004-February/001869.html) 7. [4056](http://www.osvdb.org/4056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2709, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2709 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2709 - **State**: PUBLISHED - **Published Date**: June 21, 2012 at 15:00 UTC - **Last Updated**: August 06, 2024 at 23:08 UTC - **Reserved Date**: July 11, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20110721 CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization](http://www.openwall.com/lists/oss-security/2011/07/21/3) 2. [](https://bugzilla.novell.com/show_bug.cgi?id=694598) 3. [FEDORA-2012-7971](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html) 4. [45075](http://secunia.com/advisories/45075) 5. [48490](http://www.securityfocus.com/bid/48490) 6. [](http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz) 7. [[oss-security] 20110722 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization](http://www.openwall.com/lists/oss-security/2011/07/22/4) 8. [FEDORA-2012-8067](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html) 9. [[oss-security] 20110812 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization](http://www.openwall.com/lists/oss-security/2011/08/12/10) 10. [50785](http://secunia.com/advisories/50785) 11. [50973](http://secunia.com/advisories/50973) 12. [SUSE-SU-2011:0696](http://lwn.net/Alerts/449415/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25603 - **State**: PUBLISHED - **Published Date**: February 21, 2024 at 02:09 UTC - **Last Updated**: August 20, 2024 at 19:57 UTC - **Reserved Date**: February 08, 2024 at 13:57 UTC - **Assigned By**: Liferay ### Vulnerability Description Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module's DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter. ### CVSS Metrics - **CVSS Base Score**: 9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Liferay - Portal** Affected versions: - 7.2.0 (Status: affected) **Liferay - DXP** Affected versions: - 7.4.13 (Status: affected) - 7.3.10 (Status: affected) - 7.2.10 (Status: affected) ### References 1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25603)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39943 - **State**: PUBLISHED - **Published Date**: February 04, 2025 at 22:15 UTC - **Last Updated**: February 05, 2025 at 19:40 UTC - **Reserved Date**: August 10, 2023 at 19:30 UTC - **Assigned By**: icscert ### Vulnerability Description In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Ashlar-Vellum - Cobalt** Affected versions: - 0 (Status: affected) **Ashlar-Vellum - Cobalt Share** Affected versions: - 0 (Status: affected) **Ashlar-Vellum - Xenon** Affected versions: - 0 (Status: affected) **Ashlar-Vellum - Argon** Affected versions: - 0 (Status: affected) **Ashlar-Vellum - Lithium** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03) ### Credits - Michael Heinzl reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9313, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9313 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9313 - **State**: PUBLISHED - **Published Date**: October 03, 2024 at 11:04 UTC - **Last Updated**: November 22, 2024 at 19:03 UTC - **Reserved Date**: September 27, 2024 at 23:20 UTC - **Assigned By**: canonical ### Vulnerability Description Authd PAM module before version 0.3.5 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Canonical Ltd. - Authd** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787) 2. [](https://www.cve.org/CVERecord?id=CVE-2024-9313) ### Credits - Marco Trevisan - Didier Roche-Tolomelli - Mark Esler
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14988, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14988 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14988 - **State**: PUBLISHED - **Published Date**: October 02, 2017 at 05:00 UTC - **Last Updated**: August 05, 2024 at 19:42 UTC - **Reserved Date**: October 02, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openexr/openexr/issues/248) 2. [openSUSE-SU-2019:1954](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26987 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 14:16 UTC - **Last Updated**: February 25, 2025 at 19:33 UTC - **Reserved Date**: February 17, 2025 at 11:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shabti Kaplan Frontend Admin by DynamiApps allows Reflected XSS. This issue affects Frontend Admin by DynamiApps: from n/a through 3.25.17. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Shabti Kaplan - Frontend Admin by DynamiApps** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/acf-frontend-form-element/vulnerability/wordpress-frontend-admin-by-dynamiapps-plugin-3-25-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32954 - **State**: PUBLISHED - **Published Date**: June 18, 2021 at 13:53 UTC - **Last Updated**: August 03, 2024 at 23:33 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to a directory traversal, which may allow an attacker to remotely read arbitrary files on the file system. ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **n/a - Advantech WebAccess/SCADA** Affected versions: - WebAccess/SCADA Versions 9.0.1 and prior (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-168-03)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2191 - **State**: PUBLISHED - **Published Date**: June 07, 2010 at 20:00 UTC - **Last Updated**: August 07, 2024 at 02:25 UTC - **Reserved Date**: June 07, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The (1) parse_str, (2) preg_match, (3) unpack, and (4) pack functions; the (5) ZEND_FETCH_RW, (6) ZEND_CONCAT, and (7) ZEND_ASSIGN_CONCAT opcodes; and the (8) ArrayObject::uasort method in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler. NOTE: vectors 2 through 4 are related to the call time pass by reference feature. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.php-security.org/2010/05/31/mops-2010-051-php-unpack-interruption-information-leak-vulnerability/index.html) 2. [](http://www.php-security.org/2010/05/31/mops-2010-052-php-pack-interruption-information-leak-vulnerability/index.html) 3. [HPSBOV02763](http://marc.info/?l=bugtraq&m=133469208622507&w=2) 4. [](http://www.php-security.org/2010/05/31/mops-2010-053-php-zend_fetch_rw-opcode-interruption-information-leak-vulnerability/index.html) 5. [php-parsestr-info-disclosure(59221)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59221) 6. [SSRT100826](http://marc.info/?l=bugtraq&m=133469208622507&w=2) 7. [](http://www.php-security.org/2010/05/31/mops-2010-049-php-parse_str-interruption-memory-corruption-vulnerability/index.html) 8. [SUSE-SR:2010:017](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html) 9. [](http://www.php-security.org/2010/05/31/mops-2010-050-php-preg_match-interruption-information-leak-vulnerability/index.html) 10. [](http://www.php-security.org/2010/05/31/mops-2010-055-php-arrayobjectuasort-interruption-memory-corruption-vulnerability/index.html) 11. [SUSE-SR:2010:018](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html) 12. [](http://www.php-security.org/2010/05/31/mops-2010-054-php-zend_concatzend_assign_concat-opcode-interruption-information-leak-and-memory-corruption-vulnerability/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0107 - **State**: PUBLISHED - **Published Date**: April 18, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: February 08, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Linux apcd program allows local attackers to modify arbitrary files via a symlink attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [958](http://www.securityfocus.com/bid/958) 2. [20000201](http://www.debian.org/security/2000/20000201)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4428 - **State**: PUBLISHED - **Published Date**: January 11, 2023 at 16:49 UTC - **Last Updated**: April 09, 2025 at 13:43 UTC - **Reserved Date**: December 12, 2022 at 16:15 UTC - **Assigned By**: cloudflare ### Vulnerability Description support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients). ### CVSS Metrics - **CVSS Base Score**: 8.9/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cloudflare - WARP** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/cloudflare/advisories/security/advisories/GHSA-h3j3-fhqg-66rh) ### Credits - CyberGeeGee (bug bounty)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38651 - **State**: PUBLISHED - **Published Date**: January 08, 2024 at 14:47 UTC - **Last Updated**: February 13, 2025 at 17:02 UTC - **Reserved Date**: July 21, 2023 at 18:46 UTC - **Assigned By**: talos ### Vulnerability Description Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero. ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-190: Security Weakness ### Affected Products **GTKWave - GTKWave** Affected versions: - 3.3.115 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814) 2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html) ### Credits - Discovered by Claudio Bozzato of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1548, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1548 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1548 - **State**: PUBLISHED - **Published Date**: April 18, 2023 at 16:42 UTC - **Last Updated**: February 05, 2025 at 21:14 UTC - **Reserved Date**: March 21, 2023 at 13:01 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products: EcoStruxure Control Expert (V15.1 and above) ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Schneider Electric - EcoStruxure Control Expert** Affected versions: - V15.1 and above (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-03.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10162 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:58 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Siebel Core - Server Framework component of Oracle Siebel CRM (subcomponent: Services). Supported versions that are affected are 16.0 and 17.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel Core - Server Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel Core - Server Framework accessible data as well as unauthorized read access to a subset of Siebel Core - Server Framework accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Siebel Core - Server Framework** Affected versions: - 16.0 (Status: affected) - 17.0 (Status: affected) ### References 1. [101416](http://www.securityfocus.com/bid/101416) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45361 - **State**: PUBLISHED - **Published Date**: October 09, 2024 at 00:00 UTC - **Last Updated**: March 13, 2025 at 20:13 UTC - **Reserved Date**: October 09, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in VectorComponentUserLinks.php in the Vector Skin component in MediaWiki before 1.39.5 and 1.40.x before 1.40.1. vector-intro-page MalformedTitleException is uncaught if it is not a valid title, leading to incorrect web pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://phabricator.wikimedia.org/T340220) 2. [](https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/skins/Vector/+/2a452b7e2562cba32b8a17bc91dc5abb531f0a1c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24911 - **State**: PUBLISHED - **Published Date**: February 06, 2025 at 13:46 UTC - **Last Updated**: February 06, 2025 at 14:11 UTC - **Reserved Date**: February 01, 2024 at 15:19 UTC - **Assigned By**: checkpoint ### Vulnerability Description In rare scenarios, the cpca process on the Security Management Server / Domain Management Server may exit unexpectedly, creating a core dump file. When the cpca process is down, VPN and SIC connectivity issues may occur if the CRL is not present in the Security Gateway's CRL cache. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **checkpoint - Multi-Domain Security Management, Quantum Security Management** Affected versions: - Quantum Security Management R81 (EOS), R81.10, R81.20 (Status: affected) ### References 1. [](https://support.checkpoint.com/results/sk/sk183101)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18485 - **State**: PUBLISHED - **Published Date**: October 18, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 19:40 UTC - **Reserved Date**: October 18, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in PHPSHE 1.7. admin.php?mod=db&act=del allows remote attackers to delete arbitrary files via directory traversal sequences in the dbname parameter. This can be leveraged to reload the product by deleting install.lock. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/koyshe/phpshe/issues/INOG4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40499 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:11 UTC - **Last Updated**: September 18, 2024 at 18:29 UTC - **Reserved Date**: August 14, 2023 at 21:06 UTC - **Assigned By**: zdi ### Vulnerability Description LG Simple Editor mkdir Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mkdir command implemented in the makeDetailContent method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. . Was ZDI-CAN-19926. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **LG - Simple Editor** Affected versions: - LG Simple Editor 3.21.0 (Status: affected) ### References 1. [ZDI-23-1205](https://www.zerodayinitiative.com/advisories/ZDI-23-1205/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33646 - **State**: PUBLISHED - **Published Date**: August 09, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 23:58 UTC - **Reserved Date**: May 28, 2021 at 00:00 UTC - **Assigned By**: openEuler ### Vulnerability Description The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak. ### Weakness Classification (CWE) - CWE-401: Security Weakness ### Affected Products **n/a - libtar** Affected versions: - <1.2.21 (Status: affected) ### References 1. [](https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1807) 2. [FEDORA-2022-fe1a4e3cf0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YSHZY753R7XW6CIKJVAWI373WW3YRRJ/) 3. [FEDORA-2022-50e8a1b51d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD4HEBSTI22FNYKOKK7W3X6ZQE6FV3XC/) 4. [FEDORA-2022-44a20bba43](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7Q26QDNOJDOFYWMJWEIK5XR62M2FF6IJ/) 5. [FEDORA-2022-88772d0a2d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4PJRCJLEAWN2EKXGLSOBTL7O57V7NC/) 6. [FEDORA-2022-ccc68b06cc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WX5YE66CT7Y5C2HTHXSFDKQWYWYWJ2T/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27695 - **State**: PUBLISHED - **Published Date**: May 08, 2025 at 19:06 UTC - **Last Updated**: May 08, 2025 at 19:16 UTC - **Reserved Date**: March 05, 2025 at 07:33 UTC - **Assigned By**: dell ### Vulnerability Description Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure. ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-290: Security Weakness ### Affected Products **Dell - Wyse Management Suite** Affected versions: - N/A (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135) ### Credits - Dell Technologies would like to thank Alain Mowat from Orange Cyberdefense Switzerland's
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0392, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0392 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0392 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 01:33 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 12, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [102039](http://osvdb.org/102039) 2. [56477](http://secunia.com/advisories/56477) 3. [1029623](http://www.securitytracker.com/id/1029623) 4. [64758](http://www.securityfocus.com/bid/64758) 5. [64874](http://www.securityfocus.com/bid/64874) 6. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8970 - **State**: PUBLISHED - **Published Date**: March 24, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 07:10 UTC - **Reserved Date**: March 24, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42) 2. [](https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.1-relnotes.txt) 3. [](https://boringssl.googlesource.com/boringssl/+/e759a9cd84198613199259dbed401f4951747cff)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25960, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25960 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25960 - **State**: PUBLISHED - **Published Date**: November 03, 2023 at 12:23 UTC - **Last Updated**: September 05, 2024 at 15:52 UTC - **Reserved Date**: February 17, 2023 at 13:47 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Zendrop - Zendrop – Global Dropshipping** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/zendrop-dropshipping-and-fulfillment/wordpress-zendrop-global-dropshipping-plugin-1-0-0-arbitrary-code-execution?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12570 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 11:30 UTC - **Last Updated**: December 17, 2024 at 04:56 UTC - **Reserved Date**: December 12, 2024 at 11:30 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.4.6, from 17.5 prior to 17.5.4, and from 17.6 prior to 17.6.2. It may have been possible for an attacker with a victim's `CI_JOB_TOKEN` to obtain a GitLab session token belonging to the victim. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-270: Security Weakness ### Affected Products **GitLab - GitLab** Affected versions: - 13.7 (Status: affected) - 17.5 (Status: affected) - 17.6 (Status: affected) ### References 1. [GitLab Issue #494694](https://gitlab.com/gitlab-org/gitlab/-/issues/494694) 2. [HackerOne Bug Bounty Report #2724948](https://hackerone.com/reports/2724948) ### Credits - Thanks [yvvdwf](https://hackerone.com/yvvdwf) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39620, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39620 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39620 - **State**: PUBLISHED - **Published Date**: August 29, 2024 at 14:14 UTC - **Last Updated**: August 29, 2024 at 14:27 UTC - **Reserved Date**: June 26, 2024 at 21:17 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CridioStudio ListingPro allows SQL Injection.This issue affects ListingPro: from n/a through 2.9.4. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **CridioStudio - ListingPro** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/listingpro-plugin/wordpress-listingpro-plugin-2-9-3-sql-injection-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2537 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3575 - **State**: PUBLISHED - **Published Date**: August 07, 2023 at 14:31 UTC - **Last Updated**: April 23, 2025 at 16:19 UTC - **Reserved Date**: July 10, 2023 at 09:02 UTC - **Assigned By**: WPScan ### Vulnerability Description The Quiz And Survey Master WordPress plugin before 8.1.11 does not properly sanitize and escape question titles, which could allow users with the Contributor role and above to perform Stored Cross-Site Scripting attacks ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Quiz And Survey Master** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/6f884688-2c0d-4844-bd31-ef7085edf112) 2. [](https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins) ### Credits - Andreas Damen - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20150 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 16:07 UTC - **Last Updated**: April 16, 2025 at 18:06 UTC - **Reserved Date**: October 10, 2024 at 19:15 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to enumerate LDAP user accounts. This vulnerability is due to the improper handling of LDAP authentication requests. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow an attacker to determine which usernames are valid LDAP user accounts. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **Cisco - Cisco Nexus Dashboard** Affected versions: - 2.1(1d) (Status: affected) - 2.1(1e) (Status: affected) - 2.0(2g) (Status: affected) - 2.0(1b) (Status: affected) - 2.0(2h) (Status: affected) - 2.1(2d) (Status: affected) - 2.0(1d) (Status: affected) - 2.2(1h) (Status: affected) - 2.2(1e) (Status: affected) - 2.2(2d) (Status: affected) - 2.1(2f) (Status: affected) - 2.3(1c) (Status: affected) - 2.3(2b) (Status: affected) - 2.3(2c) (Status: affected) - 2.3(2d) (Status: affected) - 2.3(2e) (Status: affected) - 3.0(1f) (Status: affected) - 3.0(1i) (Status: affected) - 3.1(1k) (Status: affected) - 3.1(1l) (Status: affected) - 3.2(1e) (Status: affected) - 3.2(1i) (Status: affected) ### References 1. [cisco-sa-nd-unenum-2xFFh472](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-unenum-2xFFh472)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7457 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Electronics For You (aka com.magzter.electronicsforyou) application 3.02 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#382737](http://www.kb.cert.org/vuls/id/382737) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4946 - **State**: PUBLISHED - **Published Date**: October 09, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 21:57 UTC - **Reserved Date**: October 09, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in product_info.php in ALLPC 2.5 allows remote attackers to execute arbitrary SQL commands via the products_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15128](http://www.exploit-db.com/exploits/15128)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34183 - **State**: REJECTED - **Published Date**: June 25, 2021 at 14:52 UTC - **Last Updated**: December 08, 2021 at 13:02 UTC - **Reserved Date**: June 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1826 - **State**: PUBLISHED - **Published Date**: May 04, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 21, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open redirect vulnerability in the Administrative Console in CA Arcot WebFort Versatile Authentication Server (VAS) before 6.2.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ca-arcotwebfort-admin-console-spoofing(67105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67105) 2. [44317](http://secunia.com/advisories/44317) 3. [72125](http://osvdb.org/72125) 4. [1025444](http://www.securitytracker.com/id?1025444) 5. [47588](http://www.securityfocus.com/bid/47588) 6. [](https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BA71F5839-D214-4719-B918-4476E4537998%7D) 7. [20110426 CA20110426-01: Security Notice for CA Arcot WebFort Versatile Authentication Server](http://www.securityfocus.com/archive/1/517702/100/0/threaded) 8. [ADV-2011-1114](http://www.vupen.com/english/advisories/2011/1114)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12088 - **State**: PUBLISHED - **Published Date**: June 10, 2018 at 23:00 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: June 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description S3QL before 2.27 mishandles checksumming, and consequently allows replay attacks in which an attacker who controls the backend can present old versions of the filesystem metadata database as up-to-date, temporarily inject zero-valued bytes into files, or temporarily hide parts of files. This is related to the checksum_basic_mapping function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bitbucket.org/nikratio/s3ql/issues/272/t3_verifypy-test_retrieve-sometimes-fails) 2. [](https://groups.google.com/forum/#%21topic/s3ql/4TzCVIMkA4o) 3. [](https://bitbucket.org/nikratio/s3ql/commits/85aba5c2d5c81453a73a50ed638adaeef0521020)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4501 - **State**: PUBLISHED - **Published Date**: October 08, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 08, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in the FTP server in Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to overwrite or create arbitrary files via a ..\ (dot dot backslash) in the RNTO command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-2746](http://www.vupen.com/english/advisories/2008/2746) 2. [6661](https://www.exploit-db.com/exploits/6661) 3. [32150](http://secunia.com/advisories/32150) 4. [4378](http://securityreason.com/securityalert/4378)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14967, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14967 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14967 - **State**: PUBLISHED - **Published Date**: June 22, 2020 at 11:19 UTC - **Last Updated**: August 04, 2024 at 13:00 UTC - **Reserved Date**: June 22, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the jsrsasign package before 8.0.18 for Node.js. Its RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification by prepending '\0' bytes to ciphertexts (it decrypts modified ciphertexts without error). An attacker might prepend these bytes with the goal of triggering memory corruption issues. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kjur.github.io/jsrsasign/) 2. [](https://www.npmjs.com/package/jsrsasign) 3. [](https://github.com/kjur/jsrsasign/releases/tag/8.0.18) 4. [](https://github.com/kjur/jsrsasign/releases/tag/8.0.17) 5. [](https://github.com/kjur/jsrsasign/issues/439) 6. [](https://security.netapp.com/advisory/ntap-20200724-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0152, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0152 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0152 - **State**: PUBLISHED - **Published Date**: March 26, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: March 19, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in bonsai Mozilla CVS query tool allows remote attackers to execute arbitrary commands as the www-data user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-265](http://www.debian.org/security/2003/dsa-265) 2. [7162](http://www.securityfocus.com/bid/7162)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1461 - **State**: PUBLISHED - **Published Date**: April 28, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: April 28, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Create New Page form in razorCMS 0.3 RC2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Page Title field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090416 [follow-up] razorCMS - Multiple Vulnerabilities](http://marc.info/?l=full-disclosure&m=123998062108561&w=2) 2. [](http://razorcms.co.uk/support/viewtopic.php?f=13&t=325) 3. [razorcms-createnewpage-xss(50357)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50357) 4. [34854](http://www.securityfocus.com/bid/34854)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31210 - **State**: PUBLISHED - **Published Date**: April 04, 2024 at 22:59 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 14:16 UTC - **Assigned By**: GitHub_M ### Vulnerability Description WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **WordPress - wordpress-develop** Affected versions: - >= 6.4.0, < 6.4.3 (Status: affected) - >= 6.3.0, < 6.3.3 (Status: affected) - >= 6.2.0, < 6.2.4 (Status: affected) - >= 6.1.0, < 6.1.5 (Status: affected) - >= 6.0.0, < 6.0.7 (Status: affected) - >= 5.9.0, < 5.9.9 (Status: affected) - >= 5.8.0, < 5.8.9 (Status: affected) - >= 5.7.0, < 5.7.11 (Status: affected) - >= 5.6.0, < 5.6.13 (Status: affected) - >= 5.5.0, < 5.5.14 (Status: affected) - >= 5.4.0, < 5.4.15 (Status: affected) - >= 5.3.0, < 5.3.17 (Status: affected) - >= 5.2.0, < 5.2.20 (Status: affected) - >= 5.1.0, < 5.1.18 (Status: affected) - >= 5.0.0, < 5.0.21 (Status: affected) - >= 4.9.0, < 4.9.25 (Status: affected) - >= 4.8.0, < 4.8.24 (Status: affected) - >= 4.7.0, < 4.7.28 (Status: affected) - >= 4.6.0, < 4.6.28 (Status: affected) - >= 4.5.0, < 4.5.31 (Status: affected) - >= 4.4.0, < 4.4.32 (Status: affected) - >= 4.3.0, < 4.3.33 (Status: affected) - >= 4.2.0, < 4.2.37 (Status: affected) - < 4.1.40 (Status: affected) ### References 1. [https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50860 - **State**: PUBLISHED - **Published Date**: December 28, 2023 at 10:14 UTC - **Last Updated**: August 02, 2024 at 22:23 UTC - **Reserved Date**: December 14, 2023 at 17:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TMS Booking for Appointments and Events Calendar – Amelia allows Stored XSS.This issue affects Booking for Appointments and Events Calendar – Amelia: from n/a through 1.0.85. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **TMS - Booking for Appointments and Events Calendar – Amelia** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-85-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41083 - **State**: PUBLISHED - **Published Date**: September 20, 2021 at 21:30 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any mailing list password, as well as the Dada Mail Root Password - which could effectively shut out actual list owners of the mailing list and allow the bad actor complete and unfettered control of your mailing list. This vulnerability also affects profile logins. For this vulnerability to work, the target of the bad actor would need to be logged into the list control panel themselves. This CSRF vulnerability in Dada Mail affects all versions of Dada Mail v11.15.1 and below. Although we know of no known CSRF exploits that have happened in the wild, this vulnerability has been confirmed by our testing, and by a third party. Users are advised to update to version 11.16.0. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **justingit - dada-mail** Affected versions: - < 11.16.0 (Status: affected) ### References 1. [](https://github.com/justingit/dada-mail/security/advisories/GHSA-344m-p829-2r38) 2. [](https://github.com/justingit/dada-mail/commit/d4d3d86d08c816b4da75a5ef45abc12188772459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4399, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4399 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4399 - **State**: PUBLISHED - **Published Date**: December 22, 2009 at 23:00 UTC - **Last Updated**: September 17, 2024 at 02:36 UTC - **Reserved Date**: December 22, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Parish of the Holy Spirit Religious Art Gallery (hs_religiousartgallery) extension 0.1.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1385 - **State**: PUBLISHED - **Published Date**: March 24, 2021 at 20:07 UTC - **Last Updated**: November 08, 2024 at 17:54 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Cisco - Cisco IOS** Affected versions: - n/a (Status: affected) ### References 1. [20210324 Cisco IOx Application Environment Path Traversal Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-pt-hWGcPf7g) 2. [](https://github.com/orangecertcc/security-research/security/advisories/GHSA-hhfw-6cm2-v3w5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17770 - **State**: PUBLISHED - **Published Date**: September 09, 2020 at 18:55 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ptsecurity.com/ww-en/analytics/threatscape/) 2. [](https://ingenico.us/smart-terminals/telium2) 3. [](https://youtu.be/gtbS3Gr264w) 4. [](https://youtu.be/oyUD7RDJsJs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51811, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51811 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51811 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 15:01 UTC - **Reserved Date**: November 04, 2024 at 09:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hussam Hussien Popup Image allows Stored XSS.This issue affects Popup Image: from n/a through 1.0.1. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Hussam Hussien - Popup Image** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/popup-image/wordpress-popup-image-plugin-1-0-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18552 - **State**: PUBLISHED - **Published Date**: August 19, 2019 at 01:50 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=780e982905bef61d13496d9af5310bf4af3a64d3) 2. [](https://support.f5.com/csp/article/K02460950) 3. [](https://support.f5.com/csp/article/K02460950?utm_source=f5support&amp%3Butm_medium=RSS)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30261 - **State**: PUBLISHED - **Published Date**: June 26, 2023 at 00:00 UTC - **Last Updated**: December 03, 2024 at 17:20 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Command Injection vulnerability in OpenWB 1.6 and 1.7 allows remote attackers to run arbitrary commands via crafted GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/snaptec/openWB/issues/2672) 2. [](https://github.com/snaptec/openWB/pull/2673) 3. [](https://eldstal.se/advisories/230329-openwb.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3520 - **State**: PUBLISHED - **Published Date**: August 26, 2020 at 16:15 UTC - **Last Updated**: November 13, 2024 at 18:13 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, local attacker to obtain confidential information from an affected device. The vulnerability is due to insufficient protection of confidential information on an affected device. An attacker at any privilege level could exploit this vulnerability by accessing local filesystems and extracting sensitive information from them. A successful exploit could allow the attacker to view sensitive data, which they could use to elevate their privilege. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Cisco - Cisco Data Center Network Manager** Affected versions: - n/a (Status: affected) ### References 1. [20200819 Cisco Data Center Network Manager Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-infordisc-DOAXVvFV)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7402, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7402 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7402 - **State**: PUBLISHED - **Published Date**: April 03, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 03, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41784](https://www.exploit-db.com/exploits/41784/) 2. [](http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2562, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2562 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2562 - **State**: PUBLISHED - **Published Date**: March 01, 2016 at 11:00 UTC - **Last Updated**: August 05, 2024 at 23:32 UTC - **Reserved Date**: February 25, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The checkHTTP function in libraries/Config.class.php in phpMyAdmin 4.5.x before 4.5.5.1 does not verify X.509 certificates from api.github.com SSL servers, which allows man-in-the-middle attackers to spoof these servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2016-65da02b95c](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html) 2. [](https://github.com/phpmyadmin/phpmyadmin/commit/e42b7e3aedd29dd0f7a48575f20bfc5aca0ff976) 3. [](https://www.phpmyadmin.net/security/PMASA-2016-13/) 4. [FEDORA-2016-02ee5b4002](http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1873 - **State**: PUBLISHED - **Published Date**: June 12, 2012 at 22:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 22, 2012 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 7 through 9 does not properly create and initialize string data, which allows remote attackers to obtain sensitive information from process memory via a crafted HTML document, aka "Null Byte Information Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA12-164A](http://www.us-cert.gov/cas/techalerts/TA12-164A.html) 2. [MS12-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037) 3. [oval:org.mitre.oval:def:15026](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15026)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46746 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 16:50 UTC - **Last Updated**: October 31, 2024 at 13:57 UTC - **Reserved Date**: March 31, 2022 at 16:50 UTC - **Assigned By**: AMD ### Vulnerability Description Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, potentially leading to a denial of service. ### CVSS Metrics - **CVSS Base Score**: 5.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H` ### Affected Products **AMD - AMD EPYC™ 7001 Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ 7002 Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ 7003 Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ 9004 Processors** Affected versions: - various (Status: affected) **AMD - AMD Ryzen™ 3000 Series Desktop Processors** Affected versions: - ComboAM4PI 1.0.0.9 (Status: unaffected) - ComboAM4 V2 PI 1.2.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 5000 Series Desktop Processors** Affected versions: - ComboAM4V2 PI 1.2.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics** Affected versions: - ComboAM4v2 PI 1.2.0.5 (Status: unaffected) **AMD - AMD Ryzen™ 7000 Series Desktop Processors** Affected versions: - ComboAM5 1.0.8.0 (Status: affected) **AMD - AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics** Affected versions: - ComboAM4PI 1.0.0.9 (Status: unaffected) - ComboAM4v2 PI 1.2.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics** Affected versions: - ComboAM4v2 PI 1.2.0.5 (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ 3000 Series Processors** Affected versions: - CastlePeakPI-SP3r3 1.0.0.7 (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors** Affected versions: - ChagallWSPI-sWRX8 1.0.0.2 (Status: unaffected) - CastlePeakWSPI-sWRX8 1.0.0.9 (Status: unaffected) **AMD - AMD Ryzen™ Threadripper™ PRO 5000WX Processors** Affected versions: - ChagallWSPI-sWRX8 1.0.0.2 (Status: unaffected) **AMD - AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics** Affected versions: - PicassoPI-FP5 1.0.0.E (Status: unaffected) **AMD - AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics** Affected versions: - PollockPI-FT5 1.0.0.4 (Status: affected) **AMD - AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics** Affected versions: - PicassoPI-FP5 1.0.0.E (Status: unaffected) **AMD - AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics** Affected versions: - RenoirPI-FP6 1.0.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics** Affected versions: - CezannePI-FP6 1.0.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics** Affected versions: - CezannePI-FP6 1.0.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics** Affected versions: - MendocinoPI-FT6 1.0.0.6 (Status: unaffected) **AMD - AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics** Affected versions: - RembrandtPI-FP7 1.0.0.5 (Status: unaffected) **AMD - AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics** Affected versions: - RembrandtPI-FP7 1.0.0.5 (Status: unaffected) **AMD - AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics** Affected versions: - CezannePI-FP6 1.0.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics** Affected versions: - CezannePI-FP6 1.0.0.8 (Status: unaffected) **AMD - AMD Ryzen™ 7045 Series Mobile Processors** Affected versions: - DragonRangeFL1PI 1.0.0.3b (Status: unaffected) **AMD - AMD EPYC™ Embedded 3000 Series Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ Embedded 7002 Series Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ Embedded 7003 Series Processors** Affected versions: - various (Status: affected) **AMD - AMD EPYC™ Embedded 9003 Series Processors** Affected versions: - various (Status: affected) **AMD - AMD Ryzen™ Embedded R1000 Series Processors** Affected versions: - EmbeddedPI-FP5 1.2.0.A (Status: unaffected) **AMD - AMD Ryzen™ Embedded R2000 Series Processors** Affected versions: - EmbeddedR2KPI-FP5 1.0.0.2 (Status: unaffected) **AMD - AMD Ryzen™ Embedded 5000 Series Processors** Affected versions: - EmbAM4PI 1.0.0.2 (Status: unaffected) **AMD - AMD Ryzen™ Embedded 7000 Series Processors** Affected versions: - EmbeddedAM5PI 1.0.0.0 (Status: unaffected) **AMD - AMD Ryzen™ Embedded V1000 Series Processors** Affected versions: - EmbeddedPI-FP5 1.2.0.A (Status: unaffected) **AMD - AMD Ryzen™ Embedded V2000 Series Processors** Affected versions: - EmbeddedPI-FP6 1.0.0.6 (Status: unaffected) **AMD - AMD Ryzen™ Embedded V3000 Series Processors** Affected versions: - EmbeddedPI-FP7r2 1.0.0.2 (Status: unaffected) ### References 1. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29511, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29511 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29511 - **State**: PUBLISHED - **Published Date**: December 19, 2022 at 10:00 UTC - **Last Updated**: April 15, 2025 at 18:38 UTC - **Reserved Date**: June 09, 2022 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A directory traversal vulnerability exists in the KnowledgebasePageActions.aspx ImportArticles functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Lansweeper - lansweeper** Affected versions: - 10.1.1.0 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0831, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0831 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0831 - **State**: PUBLISHED - **Published Date**: February 01, 2024 at 01:41 UTC - **Last Updated**: February 13, 2025 at 17:27 UTC - **Reserved Date**: January 23, 2024 at 17:42 UTC - **Assigned By**: HashiCorp ### Vulnerability Description Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`. ### CVSS Metrics - **CVSS Base Score**: 4.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **HashiCorp - Vault** Affected versions: - 1.15.0 (Status: affected) **HashiCorp - Vault Enterprise** Affected versions: - 1.15.0 (Status: affected) ### References 1. [](https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311) 2. [](https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration) 3. [](https://security.netapp.com/advisory/ntap-20240223-0005/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5494 - **State**: PUBLISHED - **Published Date**: November 30, 2007 at 02:00 UTC - **Last Updated**: August 07, 2024 at 15:31 UTC - **Reserved Date**: October 17, 2007 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28162](http://secunia.com/advisories/28162) 2. [RHSA-2007:1104](http://www.redhat.com/support/errata/RHSA-2007-1104.html) 3. [44153](http://osvdb.org/44153) 4. [27824](http://secunia.com/advisories/27824) 5. [](https://bugzilla.redhat.com/show_bug.cgi?id=315051) 6. [1019017](http://www.securitytracker.com/id?1019017) 7. [oval:org.mitre.oval:def:10884](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10884) 8. [RHSA-2007:0993](http://www.redhat.com/support/errata/RHSA-2007-0993.html) 9. [26657](http://www.securityfocus.com/bid/26657) 10. [rhel-content-accelerator-dos(38823)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38823)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12023, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12023 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12023 - **State**: REJECTED - **Published Date**: June 01, 2020 at 14:55 UTC - **Last Updated**: June 01, 2020 at 14:55 UTC - **Reserved Date**: May 13, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5099 - **State**: PUBLISHED - **Published Date**: September 23, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 20:58 UTC - **Reserved Date**: September 23, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in list.php in PHPB2B 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the q parameter in a search action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/files/view/108280/phpb2b-xss.txt) 2. [phpb2b-list-xss(72082)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72082) 3. [51221](http://www.securityfocus.com/bid/51221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50703 - **State**: PUBLISHED - **Published Date**: December 30, 2024 at 00:00 UTC - **Last Updated**: December 30, 2024 at 16:41 UTC - **Reserved Date**: October 28, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TeamPass before 3.1.3.1 does not properly prevent a user from acting with the privileges of a different user_id. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-472: Security Weakness ### Affected Products **TeamPass - TeamPass** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/nilsteampassnet/TeamPass/compare/3.1.3...3.1.3.1) 2. [](https://github.com/nilsteampassnet/TeamPass/compare/3.1.2...3.1.3.1) 3. [](https://github.com/nilsteampassnet/TeamPass/commit/c7f7f809071eaa9e04505ee79cec7049a42959e9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25268, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25268 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25268 - **State**: PUBLISHED - **Published Date**: May 05, 2022 at 18:05 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 15, 2021 at 00:00 UTC - **Assigned By**: Sophos ### Vulnerability Description Multiple XSS vulnerabilities in Webadmin allow for privilege escalation from MySophos admin to SFOS admin in Sophos Firewall older than version 19.0 GA. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H` ### Affected Products **Sophos - Sophos Firewall** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.sophos.com/en-us/security-advisories/sophos-sa-20220505-sfos-19-0-0) ### Credits - Gaetano Sapia
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1723 - **State**: PUBLISHED - **Published Date**: March 13, 2024 at 15:27 UTC - **Last Updated**: August 01, 2024 at 18:48 UTC - **Reserved Date**: February 21, 2024 at 19:39 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 1.58.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected parameters include: $instance['fonts']['title_options']['tag'], $headline_tag, $sub_headline_tag, $feature['icon']. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **gpriday - SiteOrigin Widgets Bundle** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e63c566d-744b-42f5-9ba6-9007cc60313a?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.58.6/widgets/features/tpl/default.php#L90) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044174%40so-widgets-bundle%2Ftrunk&old=3040814%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20590, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20590 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20590 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 18:54 UTC - **Last Updated**: August 03, 2024 at 17:45 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used. ### Affected Products **n/a - GOT2000 series GT27 model** Affected versions: - VNC server version 01.39.010 and prior (Status: affected) **n/a - GOT2000 series GT25 model** Affected versions: - VNC server version 01.39.010 and prior (Status: affected) **n/a - GOT2000 series GT21 model GT2107-WTBD** Affected versions: - VNC server version 01.40.000 and prior (Status: affected) **n/a - GOT2000 series GT21 model GT2107-WTSD** Affected versions: - VNC server version 01.40.000 and prior (Status: affected) **n/a - GOT SIMPLE series GS21 model GS2110-WTBD-N** Affected versions: - VNC server version 01.40.000 and prior (Status: affected) **n/a - GOT SIMPLE series GS21 model GS2107-WTBD-N** Affected versions: - VNC server version 01.40.000 and prior (Status: affected) ### References 1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf) 2. [](https://jvn.jp/vu/JVNVU97615777/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5601 - **State**: PUBLISHED - **Published Date**: October 30, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 26, 2013 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.mozilla.org/security/announce/2013/mfsa2013-100.html) 2. [openSUSE-SU-2013:1633](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html) 3. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01) 4. [RHSA-2013:1480](http://rhn.redhat.com/errata/RHSA-2013-1480.html) 5. [RHSA-2013:1476](http://rhn.redhat.com/errata/RHSA-2013-1476.html) 6. [openSUSE-SU-2013:1634](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html) 7. [DSA-2788](http://www.debian.org/security/2013/dsa-2788) 8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=916685) 9. [SUSE-SU-2013:1678](http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html) 10. [DSA-2797](http://www.debian.org/security/2013/dsa-2797) 11. [oval:org.mitre.oval:def:18495](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18495)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49073 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:13 UTC - **Last Updated**: June 06, 2025 at 16:07 UTC - **Reserved Date**: May 30, 2025 at 14:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Deserialization of Untrusted Data vulnerability in Axiomthemes Sweet Dessert allows Object Injection.This issue affects Sweet Dessert: from n/a before 1.1.13. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Axiomthemes - Sweet Dessert** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/sweet-dessert/vulnerability/wordpress-sweet-dessert-1-1-13-php-object-injection-vulnerability?_s_id=cve) ### Credits - Tran Nguyen Bao Khanh VCI - VNPT (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0761, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0761 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0761 - **State**: PUBLISHED - **Published Date**: February 15, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 18, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [79241](http://osvdb.org/79241) 2. [](http://www.adobe.com/support/security/bulletins/apsb12-02.html) 3. [adobe-shockwave-3d-code-exec(73174)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73174) 4. [52001](http://www.securityfocus.com/bid/52001)