System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22779
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 14:26 UTC
- **Last Updated**: August 03, 2024 at 18:51 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
Authentication Bypass by Spoofing vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*), that could cause unauthorized access in read and write mode to the controller by spoofing the Modbus communication between the engineering software and the controller.
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**n/a - EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*)**
Affected versions:
- EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*) (Status: affected)
### References
1. [](http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57212
- **State**: PUBLISHED
- **Published Date**: January 10, 2025 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 15:26 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the opmode parameter in the action_reboot function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yanggao017/vuln/blob/main/TOTOLINK/A6000R/CI_10_action_reboot/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1899
- **State**: PUBLISHED
- **Published Date**: January 20, 2016 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 23:10 UTC
- **Reserved Date**: January 14, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in the ui-blob handler in CGit before 0.12 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks via CRLF sequences in the mimetype parameter, as demonstrated by a request to blob/cgit.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160114 CVE Request: CGit - Multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/01/14/3)
2. [openSUSE-SU-2016:0218](http://lists.opensuse.org/opensuse-updates/2016-01/msg00084.html)
3. [[CGit] 20160114 [ANNOUNCE] CGIT v0.12 Released](http://lists.zx2c4.com/pipermail/cgit/2016-January/002817.html)
4. [[CGit] 20160113 XSS in cgit](http://lists.zx2c4.com/pipermail/cgit/2016-January/002790.html)
5. [FEDORA-2016-e5a5fb196f](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176198.html)
6. [openSUSE-SU-2016:0196](http://lists.opensuse.org/opensuse-updates/2016-01/msg00067.html)
7. [](http://git.zx2c4.com/cgit/commit/?id=1c581a072651524f3b0d91f33e22a42c4166dd96)
8. [[oss-security] 20160114 Re: CVE Request: CGit - Multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/01/14/6)
9. [DSA-3545](http://www.debian.org/security/2016/dsa-3545)
10. [FEDORA-2016-215b507409](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176167.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1086
- **State**: PUBLISHED
- **Published Date**: April 12, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 03:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**redhat - pcs**
Affected versions:
- pcs 0.9.164 (Status: affected)
- pcs 0.10 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1086)
2. [RHSA-2018:1060](https://access.redhat.com/errata/RHSA-2018:1060)
3. [RHSA-2018:1927](https://access.redhat.com/errata/RHSA-2018:1927)
4. [DSA-4169](https://www.debian.org/security/2018/dsa-4169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4497
- **State**: PUBLISHED
- **Published Date**: May 10, 2025 at 07:00 UTC
- **Last Updated**: May 12, 2025 at 17:57 UTC
- **Reserved Date**: May 09, 2025 at 12:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Simple Banking System up to 1.0. It has been rated as critical. This issue affects some unknown processing of the component Sign In. The manipulation of the argument password2 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**code-projects - Simple Banking System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-308213 | code-projects Simple Banking System Sign In buffer overflow](https://vuldb.com/?id.308213)
2. [VDB-308213 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.308213)
3. [Submit #567082 | Banking_System Buffer Overflow in Password Handling Function v1.0 Buffer Overflow](https://vuldb.com/?submit.567082)
4. [](https://github.com/zzzxc643/cve/blob/main/Banking_System.md)
5. [](https://code-projects.org/)
### Credits
- zzzxc (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20744
- **State**: PUBLISHED
- **Published Date**: June 22, 2021 at 01:35 UTC
- **Last Updated**: August 03, 2024 at 17:53 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in EC-CUBE Category contents plugin (for EC-CUBE 3.0 series) versions prior to version 1.0.1 allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.
### Affected Products
**EC-CUBE CO.,LTD. - EC-CUBE Category contents plugin (for EC-CUBE 3.0 series)**
Affected versions:
- versions prior to version 1.0.1 (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN57524494/index.html)
2. [](https://www.ec-cube.net/products/detail.php?product_id=1070) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12364
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 11:56 UTC
- **Reserved Date**: April 28, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
### Affected Products
**n/a - Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and**
Affected versions:
- before version 26.20.100.7212 and before version Linux kernel version 5.5 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html)
2. [[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)](https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0720
- **State**: PUBLISHED
- **Published Date**: February 23, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 16, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Nullsoft Winamp 5.12 and 5.13 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060223 NSFOCUS SA2006-01 : Winamp m3u File Processing Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/425888/100/0/threaded)
2. [476](http://securityreason.com/securityalert/476)
3. [winamp-m3u-wma-bo(24740)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24740)
4. [](http://forums.winamp.com/showthread.php?threadid=238648)
5. [](http://www.nsfocus.com/english/homepage/research/0601.htm)
6. [16785](http://www.securityfocus.com/bid/16785)
7. [1015675](http://securitytracker.com/id?1015675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5640
- **State**: PUBLISHED
- **Published Date**: October 23, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654641)
2. [27234](http://secunia.com/advisories/27234)
3. [nortel-ipphone-register-dos(37254)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37254)
4. [41772](http://osvdb.org/41772)
5. [3274](http://securityreason.com/securityalert/3274)
6. [](http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt)
7. [20071018 Nortel IP Phone forced re-authentication](http://www.securityfocus.com/archive/1/482481/100/0/threaded)
8. [26124](http://www.securityfocus.com/bid/26124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4150
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0072
- **State**: PUBLISHED
- **Published Date**: April 17, 2020 at 18:20 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In rw_t2t_handle_tlv_detect_rsp of rw_t2t_ndef.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147310271
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-04-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-10017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-10017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-10017
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 10:26 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: January 06, 2023 at 10:25 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in HPI-Information-Systems ProLOD and classified as critical. This vulnerability affects unknown code. The manipulation of the argument this leads to sql injection. The name of the patch is 3f710905458d49c77530bd3cbcd8960457566b73. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217552.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**HPI-Information-Systems - ProLOD**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.217552)
2. [](https://vuldb.com/?ctiid.217552)
3. [](https://github.com/HPI-Information-Systems/ProLOD/commit/3f710905458d49c77530bd3cbcd8960457566b73)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1030
- **State**: PUBLISHED
- **Published Date**: April 09, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2016:1305](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html)
2. [openSUSE-SU-2016:1306](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html)
3. [RHSA-2016:0610](http://rhn.redhat.com/errata/RHSA-2016-0610.html)
4. [1035509](http://www.securitytracker.com/id/1035509)
5. [](https://helpx.adobe.com/security/products/flash-player/apsb16-10.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6972
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 14:06 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf)
2. [](https://twitter.com/MalFuzzer/status/1141269335685652480?s=19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27828
- **State**: PUBLISHED
- **Published Date**: June 01, 2021 at 11:24 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 01, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection in In4Suite ERP 3.2.74.1370 allows attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.in4velocity.com/in4suite-erp.html)
2. [](https://www.exploit-db.com/exploits/49884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33733
- **State**: PUBLISHED
- **Published Date**: June 05, 2023 at 00:00 UTC
- **Last Updated**: January 08, 2025 at 18:40 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/c53elyas/CVE-2023-33733)
2. [FEDORA-2023-553fe307dc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ALE727IRACYBTTOFIFG57RS4OA2SHIJ/)
3. [FEDORA-2023-3b82f4aa86](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21054
- **State**: PUBLISHED
- **Published Date**: May 20, 2021 at 15:31 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.7 allows remote malicious users to inject arbitrary web script or HTML via an unsanitized "f" variable in app\vars\vars_textarea.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://resp3ctblog.wordpress.com/2019/10/28/fusionpbx-xss-21/)
2. [](https://github.com/fusionpbx/fusionpbx/commit/2489004c7b7e0b14e21cd86cedaab87fed209415) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0796
- **State**: PUBLISHED
- **Published Date**: February 15, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in threads.php in Nuboard 0.5 allows remote attackers to execute arbitrary SQL commands via the ssid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5115](https://www.exploit-db.com/exploits/5115) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000457
- **State**: PUBLISHED
- **Published Date**: January 02, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Help.aspx in mojoPortal version 2.5.0.0 allows remote attackers to inject arbitrary web script or HTML via the helpkey parameter. Exploitation requires authenticated reflected cross-site scripting for user accounts assigned either the "Administrators" or "Content Administrators" role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mojoportal.com/mojoportal-2-6)
2. [](https://github.com/i7MEDIA/mojoportal/commit/5ea8129f74c80cbf1f68b9083c745cc8a685485d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9455
- **State**: PUBLISHED
- **Published Date**: October 07, 2019 at 14:25 UTC
- **Last Updated**: August 06, 2024 at 08:51 UTC
- **Reserved Date**: September 26, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The buddypress-activity-plus plugin before 1.6.2 for WordPress has CSRF with resultant directory traversal via the wp-admin/admin-ajax.php bpfb_photos[] parameter in a bpfb_remove_temp_images action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.dxw.com/advisories/csrf-and-arbitrary-file-deletion-in-buddypress-activity-plus-1-5/)
2. [](https://wordpress.org/plugins/buddypress-activity-plus/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23069
- **State**: PUBLISHED
- **Published Date**: August 18, 2021 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Path Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/48312) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7053
- **State**: PUBLISHED
- **Published Date**: August 24, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LogMeIn Remote Access Utility ActiveX control (RACtrl.dll) allows remote attackers to cause a denial of service (crash) by setting the fgcolor and bgcolor properties to certain long values that trigger memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6326](https://www.exploit-db.com/exploits/6326)
2. [](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7053)
3. [logmein-ractrl-bo(44843)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44843)
4. [30923](http://www.securityfocus.com/bid/30923)
5. [](http://packetstorm.foofus.com/0808-exploits/logmein-activex.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2133
- **State**: PUBLISHED
- **Published Date**: June 19, 2009 at 17:32 UTC
- **Last Updated**: August 07, 2024 at 05:36 UTC
- **Reserved Date**: June 19, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Pivot 1.40.4 and 1.40.7 allow remote attackers to inject arbitrary web script or HTML via the (1) menu or (2) sort parameter to pivot/index.php, (3) the value of a check array parameter in a delete action to pivot/index.php, (4) the element name in a check array parameter in a delete action to pivot/index.php, (5) the edituser parameter in an edituser action to pivot/index.php, (6) the edit parameter in a templates action to pivot/index.php, (7) the blog parameter in a blog_edit1 action to pivot/index.php, (8) the cat parameter in a cat_edit action to pivot/index.php, (9) a certain form field in a doaction=1 request to pivot/index.php, (10) the url field in a my_weblog edit_prefs action to pivot/user.php, or (11) the username (aka name) field in a my_weblog reg_user action to pivot/user.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8941](https://www.exploit-db.com/exploits/8941)
2. [35363](http://www.securityfocus.com/bid/35363)
3. [](http://forum.intern0t.net/intern0t-advisories/1119-intern0t-pivot-1-40-4-7-multiple-vulnerabilities.html)
4. [pivot-index-xss(51098)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51098)
5. [35363](http://secunia.com/advisories/35363)
6. [pivot-visitor-xss(51099)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51099)
7. [55085](http://osvdb.org/55085)
8. [55086](http://osvdb.org/55086)
9. [20090612 [InterN0T] Pivot 1.40.4-7 - Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/504300/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32742
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 10:02 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 17, 2024 at 12:35 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V3.0). The affected device contains an unrestricted USB port. An attacker with local access to the device could potentially misuse the port for booting another operating system and gain complete read/write access to the filesystem.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-1326: Security Weakness
### Affected Products
**Siemens - SIMATIC CN 4100**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-273900.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0911
- **State**: PUBLISHED
- **Published Date**: February 13, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24606](http://secunia.com/advisories/24606)
2. [20070209 PHP 5.2.1 crash bug](http://www.securityfocus.com/archive/1/459856/100/0/threaded)
3. [33952](http://osvdb.org/33952)
4. [[php-dev] 20070209 PHP 5.2.1 crashing Apache/IIS...](http://marc.info/?l=php-dev&m=117104930526516&w=2)
5. [24514](http://secunia.com/advisories/24514)
6. [GLSA-200703-21](http://security.gentoo.org/glsa/glsa-200703-21.xml)
7. [SUSE-SA:2007:020](http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html)
8. [22505](http://www.securityfocus.com/bid/22505)
9. [[php-dev] 20070210 Re: PHP 5.2.1 crashing Apache/IIS...](http://marc.info/?l=php-dev&m=117106751715609&w=2)
10. [](http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47229
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:19 UTC
- **Last Updated**: May 04, 2025 at 07:06 UTC
- **Reserved Date**: April 10, 2024 at 18:59 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
PCI: aardvark: Fix kernel panic during PIO transfer
Trying to start a new PIO transfer by writing value 0 in PIO_START register
when previous transfer has not yet completed (which is indicated by value 1
in PIO_START) causes an External Abort on CPU, which results in kernel
panic:
SError Interrupt on CPU0, code 0xbf000002 -- SError
Kernel panic - not syncing: Asynchronous SError Interrupt
To prevent kernel panic, it is required to reject a new PIO transfer when
previous one has not finished yet.
If previous PIO transfer is not finished yet, the kernel may issue a new
PIO request only if the previous PIO transfer timed out.
In the past the root cause of this issue was incorrectly identified (as it
often happens during link retraining or after link down event) and special
hack was implemented in Trusted Firmware to catch all SError events in EL3,
to ignore errors with code 0xbf000002 and not forwarding any other errors
to kernel and instead throw panic from EL3 Trusted Firmware handler.
Links to discussion and patches about this issue:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50
https://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/
https://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/
https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541
But the real cause was the fact that during link retraining or after link
down event the PIO transfer may take longer time, up to the 1.44s until it
times out. This increased probability that a new PIO transfer would be
issued by kernel while previous one has not finished yet.
After applying this change into the kernel, it is possible to revert the
mentioned TF-A hack and SError events do not have to be caught in TF-A EL3.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.14.240 (Status: unaffected)
- 4.19.198 (Status: unaffected)
- 5.4.128 (Status: unaffected)
- 5.10.46 (Status: unaffected)
- 5.12.13 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a)
2. [](https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a)
3. [](https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d)
4. [](https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867)
5. [](https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a)
6. [](https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5871
- **State**: PUBLISHED
- **Published Date**: December 11, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:10171](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10171)
2. [23361](http://secunia.com/advisories/23361)
3. [25683](http://secunia.com/advisories/25683)
4. [DSA-1237](http://www.us.debian.org/security/2006/dsa-1237)
5. [23370](http://secunia.com/advisories/23370)
6. [DSA-1233](http://www.debian.org/security/2006/dsa-1233)
7. [21523](http://www.securityfocus.com/bid/21523)
8. [23395](http://secunia.com/advisories/23395)
9. [SUSE-SA:2007:035](http://www.novell.com/linux/security/advisories/2007_35_kernel.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36060
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 20:37 UTC
- **Last Updated**: February 18, 2025 at 19:56 UTC
- **Reserved Date**: July 15, 2022 at 23:52 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. Events sent with special strings in key places can temporarily disrupt or impede the matrix-react-sdk from functioning properly, such as by causing room or event tile crashes. The remainder of the application can appear functional, though certain rooms/events will not be rendered. This issue has been fixed in matrix-react-sdk 3.53.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-1321: Security Weakness
### Affected Products
**matrix-org - matrix-react-sdk**
Affected versions:
- < 3.53.0 (Status: affected)
### References
1. [https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2987
- **State**: PUBLISHED
- **Published Date**: February 15, 2017 at 06:11 UTC
- **Last Updated**: August 05, 2024 at 14:09 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable integer overflow vulnerability related to Flash Broker COM. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Flash Player 24.0.0.194 and earlier.**
Affected versions:
- Adobe Flash Player 24.0.0.194 and earlier. (Status: affected)
### References
1. [96194](http://www.securityfocus.com/bid/96194)
2. [GLSA-201702-20](https://security.gentoo.org/glsa/201702-20)
3. [RHSA-2017:0275](http://rhn.redhat.com/errata/RHSA-2017-0275.html)
4. [1037815](http://www.securitytracker.com/id/1037815)
5. [](https://helpx.adobe.com/security/products/flash-player/apsb17-04.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1496
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 05:04 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: January 30, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/IO, a different vulnerability than CVE-2013-1498.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:19164](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19164)
2. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html)
3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24707, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24707
- **State**: PUBLISHED
- **Published Date**: February 01, 2022 at 12:21 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Learning Courses WordPress plugin before 5.0 does not sanitise and escape the Email PDT identity token settings, which could allow high privilege users to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/0be5e06e-4ff1-43d2-8ba7-2530519d517e)
### Credits
- dhananjaygarg192002 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52220
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 09:33 UTC
- **Last Updated**: August 02, 2024 at 22:55 UTC
- **Reserved Date**: December 29, 2023 at 13:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in MonsterInsights Google Analytics by Monster Insights.This issue affects Google Analytics by Monster Insights: from n/a through 8.21.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**MonsterInsights - Google Analytics by Monster Insights**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/google-analytics-for-wordpress/wordpress-monsterinsights-plugin-8-21-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4763
- **State**: PUBLISHED
- **Published Date**: September 13, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Lotus Domino Web Access (DWA) 7.0.1 does not expire a client's Lightweight Third-Party Authentication token (LtpaToken) upon logout, which allows remote attackers to obtain a user's privileges by intercepting the LtpaToken cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [domino-token-session-hijack(28881)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28881)
2. [20060912 Session Token Remains Valid After Logout in IBM Lotus Domino Web Access](http://www.securityfocus.com/archive/1/445821/100/0/threaded)
3. [20060912 Session Token Remains Valid After Logout in IBM Lotus Domino Web Access](http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049408.html)
4. [](http://www.fishnetsecurity.com/csirt/disclosure/ibm)
5. [19966](http://www.securityfocus.com/bid/19966)
6. [1571](http://securityreason.com/securityalert/1571)
7. [](http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21245589) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1603
- **State**: PUBLISHED
- **Published Date**: March 22, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
admin/contest.php in Weekly Drawing Contest 0.0.1 allows remote attackers to bypass authentication, and insert new contest information into a database, via a direct POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070313 Re: Weekly Drawing Contest <= (check_vote.php) Remote File Disclosure Vuln](http://www.securityfocus.com/archive/1/462702/100/100/threaded)
2. [2453](http://securityreason.com/securityalert/2453) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33850
- **State**: PUBLISHED
- **Published Date**: June 10, 2024 at 00:00 UTC
- **Last Updated**: November 21, 2024 at 20:04 UTC
- **Reserved Date**: April 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.pexip.com/admin/security_bulletins.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7660
- **State**: PUBLISHED
- **Published Date**: March 07, 2019 at 22:00 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PHPMyWind 5.5. The username parameter of the /install/index.php page has a stored Cross-site Scripting (XSS) vulnerability, as demonstrated by admin/login.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/0xUhaw/CVE-Bins/tree/master/PHPMyWind/XSS-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2271
- **State**: PUBLISHED
- **Published Date**: March 07, 2024 at 23:31 UTC
- **Last Updated**: August 12, 2024 at 13:58 UTC
- **Reserved Date**: March 07, 2024 at 14:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in keerti1924 Online-Book-Store-Website 1.0. This affects an unknown part of the file /shop.php of the component HTTP POST Request Handler. The manipulation of the argument product_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256041 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**keerti1924 - Online-Book-Store-Website**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-256041 | keerti1924 Online-Book-Store-Website HTTP POST Request shop.php sql injection](https://vuldb.com/?id.256041)
2. [VDB-256041 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.256041)
3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md)
### Credits
- Joshua Lictan
- nochizplz (VulDB User)
- nochizplz (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14289
- **State**: PUBLISHED
- **Published Date**: July 27, 2019 at 18:39 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 27, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Xpdf 4.01.01. There is an integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the "multiple bytes per line" case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01)
2. [](https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3233
- **State**: PUBLISHED
- **Published Date**: September 15, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in __swift/thirdparty/PHPExcel/PHPExcel/Shared/JAMA/docs/download.php in Kayako Fusion 4.40.1148, and possibly before 4.50.1581, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wiki.kayako.com/display/DOCS/4.50.1581)
2. [](https://www.htbridge.com/advisory/HTB23095)
3. [55417](http://www.securityfocus.com/bid/55417)
4. [50366](http://secunia.com/advisories/50366)
5. [](http://wiki.kayako.com/display/DOCS/4.50.1619)
6. [85189](http://osvdb.org/85189)
7. [kayakofusion-download-xss(78314)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78314)
8. [20120905 Cross-Site Scripting (XSS) in Kayako Fusion](http://archives.neohapsis.com/archives/bugtraq/2012-09/0022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2700
- **State**: PUBLISHED
- **Published Date**: January 18, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:31 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - Hospitality Cruise Fleet Management**
Affected versions:
- 9.0.4.0 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
2. [102559](http://www.securityfocus.com/bid/102559) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39836
- **State**: PUBLISHED
- **Published Date**: September 29, 2021 at 15:37 UTC
- **Last Updated**: September 16, 2024 at 17:22 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb21-55.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1884
- **State**: PUBLISHED
- **Published Date**: April 18, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 08:40 UTC
- **Reserved Date**: April 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in Wikepage Opus 13 2007.2 allows remote attackers to read arbitrary files via directory traversal sequences in the wiki parameter, a different vector than CVE-2006-4418.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28664](http://www.securityfocus.com/bid/28664)
2. [20080407 Wikepage Opus 13 2007.2 Directory Traversal Vulnerbility](http://archives.neohapsis.com/archives/bugtraq/2008-04/0082.html)
3. [29699](http://secunia.com/advisories/29699)
4. [wikepage-index-multiple-file-include(41688)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41688) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4898
- **State**: PUBLISHED
- **Published Date**: January 07, 2021 at 17:40 UTC
- **Last Updated**: September 16, 2024 at 17:59 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Emptoris Strategic Supply Management 10.1.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190989.
### Affected Products
**IBM - Emptoris Strategic Supply Management**
Affected versions:
- 10.1.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6398278)
2. [ibm-emptoris-cve20204898-info-disc (190989)](https://exchange.xforce.ibmcloud.com/vulnerabilities/190989) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32821
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 02:05 UTC
- **Last Updated**: September 23, 2024 at 15:25 UTC
- **Reserved Date**: May 16, 2023 at 03:04 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In video, there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08013430; Issue ID: ALPS08013433.
### Affected Products
**MediaTek, Inc. - MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6853, MT6873, MT6885**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/October-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2198
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 17:43 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Download Provider, there is a possible SQL injection vulnerability. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135270103
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 Android-8.1 Android-9 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7589
- **State**: PUBLISHED
- **Published Date**: August 11, 2024 at 03:15 UTC
- **Last Updated**: August 16, 2024 at 17:02 UTC
- **Reserved Date**: August 07, 2024 at 13:25 UTC
- **Assigned By**: freebsd
### Vulnerability Description
A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges.
This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD.
As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- 14.1-RELEASE (Status: affected)
- 14.0-RELEASE (Status: affected)
- 13.3-RELEASE (Status: affected)
### References
1. [](https://security.freebsd.org/advisories/FreeBSD-SA-24:08.openssh.asc)
2. [](https://www.cve.org/CVERecord?id=CVE-2006-5051)
3. [](https://www.cve.org/CVERecord?id=CVE-2024-6387) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3990
- **State**: PUBLISHED
- **Published Date**: January 30, 2023 at 18:52 UTC
- **Last Updated**: March 28, 2025 at 14:22 UTC
- **Reserved Date**: November 14, 2022 at 15:42 UTC
- **Assigned By**: hp
### Vulnerability Description
HPSFViewer might allow Escalation of Privilege. This potential vulnerability was remediated on July 29th, 2022. Customers who opted for automatic updates should have already received the remediation.
### Affected Products
**HP Inc. - HPSFViewer**
Affected versions:
- See HP Security Bulletin reference for affected versions. (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_7256634-7256658-16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39395
- **State**: PUBLISHED
- **Published Date**: November 10, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:38 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. In Vela Server and Vela Worker prior to version 0.16.0 and Vela UI prior to version 0.17.0, some default configurations for Vela allow exploitation and container breakouts. Users should upgrade to Server 0.16.0, Worker 0.16.0, and UI 0.17.0 to fix the issue. After upgrading, Vela administrators will need to explicitly change the default settings to configure Vela as desired. Some of the fixes will interrupt existing workflows and will require Vela administrators to modify default settings. However, not applying the patch (or workarounds) will continue existing risk exposure. Some workarounds are available. Vela administrators can adjust the worker's `VELA_RUNTIME_PRIVILEGED_IMAGES` setting to be explicitly empty, leverage the `VELA_REPO_ALLOWLIST` setting on the server component to restrict access to a list of repositories that are allowed to be enabled, and/or audit enabled repositories and disable pull_requests if they are not needed.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**go-vela - server**
Affected versions:
- < 0.16.0 (Status: affected)
- < 0.17.0 (Status: affected)
### References
1. [](https://github.com/go-vela/server/security/advisories/GHSA-5m7g-pj8w-7593)
2. [](https://github.com/go-vela/ui/security/advisories/GHSA-xf39-98m2-889v)
3. [](https://github.com/go-vela/worker/security/advisories/GHSA-2w78-ffv6-p46w)
4. [](https://github.com/go-vela/server/commit/05558ee99d70f7d6f83bed7c8f78ac0b35fa26f4)
5. [](https://docs.docker.com/engine/security/#docker-daemon-attack-surface)
6. [](https://github.com/go-vela/server/releases/tag/v0.16.0)
7. [](https://github.com/go-vela/ui/releases/tag/v0.17.0)
8. [](https://github.com/go-vela/worker/releases/tag/v0.16.0)
9. [](https://go-vela.github.io/docs/installation/server/reference/#vela_repo_allowlist)
10. [](https://go-vela.github.io/docs/installation/worker/reference/#vela_runtime_privileged_images) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26351
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 00:00 UTC
- **Last Updated**: November 01, 2024 at 18:38 UTC
- **Reserved Date**: February 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /core/tools/update_place.php
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Icycu123/cms/blob/main/4.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1656
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:00 UTC
- **Reserved Date**: February 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in Comersus Shopping Cart 5.0991 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the redirecturl parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040901 ADVISORY: http response splitting hole in Comersus shopping cart](http://marc.info/?l=bugtraq&m=109405777905519&w=2)
2. [comersus-cart-response-splitting(17201)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17201)
3. [11083](http://www.securityfocus.com/bid/11083) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4736
- **State**: PUBLISHED
- **Published Date**: March 19, 2006 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 23:36 UTC
- **Reserved Date**: March 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM DB2 Universal Database (UDB) 820 before 8.2 FP10 allows remote authenticated users to cause a denial of service (disk consumption) via a hash join (hsjn) that triggers an infinite loop in sqlri_hsjnFlushBlocks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15126](http://www.securityfocus.com/bid/15126)
2. [IY70561](http://www-1.ibm.com/support/docview.wss?uid=swg1IY70561)
3. [17031](http://secunia.com/advisories/17031) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19141
- **State**: PUBLISHED
- **Published Date**: December 19, 2019 at 22:28 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 20, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Camera Upload functionality in Plex Media Server through 1.18.2.2029 allows remote authenticated users to write files anywhere the user account running the Plex Media Server has permissions. This allows remote code execution via a variety of methods, such as (on a default Ubuntu installation) creating a .ssh folder in the plex user's home directory via directory traversal, uploading an SSH authorized_keys file there, and logging into the host as the Plex user via SSH.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forums.plex.tv/t/security-camera-upload/507289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3266
- **State**: PUBLISHED
- **Published Date**: August 24, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:29 UTC
- **Reserved Date**: August 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49377](http://www.securityfocus.com/bid/49377)
2. [wireshark-prototreeadditem-dos(69411)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69411)
3. [MDVSA-2011:138](http://www.mandriva.com/security/advisories?name=MDVSA-2011:138)
4. [](http://www.wireshark.org/security/wnpa-sec-2011-13.html)
5. [8351](http://securityreason.com/securityalert/8351)
6. [openSUSE-SU-2011:1263](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html)
7. [20110728 Wireshark 1.6.1 Malformed IKE Packet Denial of Service](http://www.securityfocus.com/archive/1/519049/100/0/threaded)
8. [oval:org.mitre.oval:def:15042](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15042)
9. [1025875](http://securitytracker.com/id?1025875)
10. [SUSE-SU-2011:1262](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8595
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210118)
2. [](https://support.apple.com/HT210119)
3. [](https://support.apple.com/HT210120)
4. [](https://support.apple.com/HT210123)
5. [](https://support.apple.com/HT210124)
6. [](https://support.apple.com/HT210125)
7. [](https://support.apple.com/HT210212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46698
- **State**: PUBLISHED
- **Published Date**: December 15, 2022 at 00:00 UTC
- **Last Updated**: April 21, 2025 at 13:47 UTC
- **Reserved Date**: December 07, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may disclose sensitive user information.
### Affected Products
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213535)
2. [](https://support.apple.com/en-us/HT213532)
3. [](https://support.apple.com/en-us/HT213538)
4. [](https://support.apple.com/en-us/HT213530)
5. [](https://support.apple.com/en-us/HT213536)
6. [](https://support.apple.com/en-us/HT213537)
7. [20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2](http://seclists.org/fulldisclosure/2022/Dec/20)
8. [20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1](http://seclists.org/fulldisclosure/2022/Dec/23)
9. [20221220 APPLE-SA-2022-12-13-7 tvOS 16.2](http://seclists.org/fulldisclosure/2022/Dec/26)
10. [20221220 APPLE-SA-2022-12-13-9 Safari 16.2](http://seclists.org/fulldisclosure/2022/Dec/28)
11. [20221220 APPLE-SA-2022-12-13-8 watchOS 9.2](http://seclists.org/fulldisclosure/2022/Dec/27)
12. [](https://security.gentoo.org/glsa/202305-32) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21494
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 05:00 UTC
- **Last Updated**: April 24, 2025 at 15:12 UTC
- **Reserved Date**: December 22, 2023 at 12:33 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P`
### Affected Products
**n/a - github.com/greenpau/caddy-security**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859)
2. [](https://github.com/greenpau/caddy-security/issues/266)
3. [](https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/)
### Credits
- Maciej Domanski
- Travis Peters
- David Pokora |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27320
- **State**: PUBLISHED
- **Published Date**: February 28, 2023 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 20:49 UTC
- **Reserved Date**: February 28, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2023/02/28/1)
2. [](https://www.sudo.ws/releases/stable/#1.9.13p2)
3. [[oss-security] 20230301 Re: sudo: double free with per-command chroot sudoers rules](http://www.openwall.com/lists/oss-security/2023/03/01/8)
4. [FEDORA-2023-d2d6ec2a32](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/)
5. [FEDORA-2023-11c9d868ca](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/)
6. [FEDORA-2023-cb5df36beb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/)
7. [](https://security.netapp.com/advisory/ntap-20230413-0009/)
8. [GLSA-202309-12](https://security.gentoo.org/glsa/202309-12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1065
- **State**: PUBLISHED
- **Published Date**: March 12, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple buffer overflows in iCloud Keychain in Apple iOS before 8.2 and Apple OS X through 10.10.2 allow man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream during keychain recovery.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-03-09-3](http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html)
2. [73007](http://www.securityfocus.com/bid/73007)
3. [](https://support.apple.com/HT204413)
4. [APPLE-SA-2015-03-09-1](http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html)
5. [1031864](http://www.securitytracker.com/id/1031864)
6. [](https://support.apple.com/kb/HT204563)
7. [](https://support.apple.com/HT204423) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4105
- **State**: PUBLISHED
- **Published Date**: September 10, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 12, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4104, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, CVE-2014-4110, and CVE-2014-4111.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1030818](http://www.securitytracker.com/id/1030818)
2. [69613](http://www.securityfocus.com/bid/69613)
3. [MS14-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0027
- **State**: PUBLISHED
- **Published Date**: March 17, 2023 at 16:52 UTC
- **Last Updated**: February 26, 2025 at 18:36 UTC
- **Reserved Date**: December 29, 2022 at 14:01 UTC
- **Assigned By**: Rockwell
### Vulnerability Description
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Rockwell Automation - Modbus TCP Server Add On Instructions**
Affected versions:
- 2.00.00 - 2.00.03 (Status: affected)
### References
1. [](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138766)
### Credits
- Parul Sindhwad and Dr. Faruk Kazi of CoE CNDS lab, VJTI, Mumbai, India reported this to Rockwell Automation. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23402
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 09:48 UTC
- **Last Updated**: March 11, 2025 at 14:29 UTC
- **Reserved Date**: January 15, 2025 at 14:20 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files.
An attacker could leverage this vulnerability to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Siemens - Teamcenter Visualization V14.3**
Affected versions:
- 0 (Status: affected)
**Siemens - Teamcenter Visualization V2312**
Affected versions:
- 0 (Status: affected)
**Siemens - Teamcenter Visualization V2406**
Affected versions:
- 0 (Status: affected)
**Siemens - Teamcenter Visualization V2412**
Affected versions:
- 0 (Status: affected)
**Siemens - Tecnomatix Plant Simulation V2302**
Affected versions:
- 0 (Status: affected)
**Siemens - Tecnomatix Plant Simulation V2404**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-050438.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47642
- **State**: PUBLISHED
- **Published Date**: October 05, 2024 at 12:59 UTC
- **Last Updated**: October 07, 2024 at 13:21 UTC
- **Reserved Date**: September 30, 2024 at 11:17 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Keap Keap Official Opt-in Forms allows Stored XSS.This issue affects Keap Official Opt-in Forms: from n/a through 2.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Keap - Keap Official Opt-in Forms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/infusionsoft-official-opt-in-forms/wordpress-keap-official-opt-in-forms-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11022
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 12:13 UTC
- **Last Updated**: December 06, 2024 at 18:18 UTC
- **Reserved Date**: November 08, 2024 at 10:39 UTC
- **Assigned By**: SICK AG
### Vulnerability Description
The authentication process to the web server uses a challenge response procedure which
inludes the nonce and additional information. This challenge can be used several times for login and is
therefore vulnerable for a replay attack.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-323: Security Weakness
### Affected Products
**SICK AG - SICK InspectorP61x**
Affected versions:
- all versions (Status: affected)
**SICK AG - SICK InspectorP62x**
Affected versions:
- all versions (Status: affected)
### References
1. [](https://sick.com/psirt)
2. [](https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF)
3. [](https://www.cisa.gov/resources-tools/resources/ics-recommended-practices)
4. [](https://www.first.org/cvss/calculator/3.1)
5. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.pdf)
6. [](https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.json)
### Credits
- Manuel Stotz
- Tobias Jaeger |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9400
- **State**: PUBLISHED
- **Published Date**: February 22, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 17, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201705-13](https://security.gentoo.org/glsa/201705-13)
2. [](https://www.teeworlds.com/?page=news&id=12086)
3. [FEDORA-2016-7470a63cd1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C4JNSBXXPE7O32ZMFK7D7YL6EKLG7PRV/)
4. [94381](http://www.securityfocus.com/bid/94381)
5. [[oss-security] 20161116 CVE Request: teeworlds: possible remote code execution on teeworlds client](http://www.openwall.com/lists/oss-security/2016/11/16/8)
6. [[oss-security] 20161117 Re: CVE Request: teeworlds: possible remote code execution on teeworlds client](http://www.openwall.com/lists/oss-security/2016/11/17/8)
7. [](https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30314
- **State**: PUBLISHED
- **Published Date**: January 13, 2022 at 11:40 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 07, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Lack of validation for third party application accessing the service can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- QCA6390, QCA6391, QCA6426, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS603, QCS605, QCS610, QCS6490, Qualcomm215, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SD 8 Gen1 5G, SD205, SD210, SD460, SD480, SD662, SD665, SD765, SD765G, SD768G, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDA429W, SDX55M, SDXR2 5G, SM6225, SM6375, SM7250P, SM7315, SM7325P, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8442
- **State**: PUBLISHED
- **Published Date**: January 30, 2020 at 00:34 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 30, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ossec/ossec-hids/issues/1820)
2. [](https://github.com/ossec/ossec-hids/issues/1821)
3. [](https://www.ossec.net/)
4. [GLSA-202007-33](https://security.gentoo.org/glsa/202007-33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22473
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 16:25 UTC
- **Last Updated**: September 16, 2024 at 16:28 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console data. This information could be used in further attacks against the system. IBM X-Force ID: 225347.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6603421)
2. [ibm-websphere-cve202222473-info-disc (225347)](https://exchange.xforce.ibmcloud.com/vulnerabilities/225347) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2682
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 20:21 UTC
- **Last Updated**: April 15, 2025 at 13:59 UTC
- **Reserved Date**: August 05, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in SourceCodester Alphaware Simple E-Commerce System. Affected by this issue is some unknown functionality of the file stockin.php. The manipulation of the argument id with the input '"><script>alert(/xss/)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-205670 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Alphaware Simple E-Commerce System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/895515845/Alphaware-E-Commerce-System/blob/main/Alphaware_xss.md)
2. [](https://vuldb.com/?id.205670) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3058
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 09, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to obtain sensitive information from process memory via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/reader/apsb15-10.html)
2. [74618](http://www.securityfocus.com/bid/74618)
3. [1032284](http://www.securitytracker.com/id/1032284)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-15-211) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6138
- **State**: PUBLISHED
- **Published Date**: December 12, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The IBM WebSphere DataPower XC10 appliance 2.1 and 2.5 before FP4 allows remote authenticated users to bypass intended grid-data access restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21691035)
2. [IT04614](http://www-01.ibm.com/support/docview.wss?uid=swg1IT04614)
3. [ibm-xc10-cve20146138-sec-bypass(96852)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96852) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46633
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 02, 2025 at 14:52 UTC
- **Reserved Date**: October 24, 2023 at 13:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in TCBarrett Glossary allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Glossary: from n/a through 3.1.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**TCBarrett - Glossary**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-glossary/vulnerability/wordpress-wp-glossary-plugin-3-1-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9298
- **State**: PUBLISHED
- **Published Date**: May 29, 2017 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 03:43 UTC
- **Reserved Date**: May 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerability in Hitachi Device Manager before 8.5.2-01 and Hitachi Replication Manager before 8.5.2-00 allows authenticated remote users to execute arbitrary JavaScript code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0944
- **State**: PUBLISHED
- **Published Date**: February 28, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: October 12, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 generates easily predictable web session IDs, which allows remote attackers to hijack other sessions via the parentsessionid cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.corsaire.com/advisories/c040817-002.txt)
2. [](http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en)
3. [](http://www.mitel.com/DocController?documentId=14223) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19410
- **State**: PUBLISHED
- **Published Date**: November 21, 2018 at 16:00 UTC
- **Last Updated**: February 04, 2025 at 17:20 UTC
- **Reserved Date**: November 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-24/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1307
- **State**: PUBLISHED
- **Published Date**: April 02, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2014-04-22-2](http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html)
2. [](https://support.apple.com/kb/HT6537)
3. [APPLE-SA-2014-04-22-3](http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html)
4. [APPLE-SA-2014-04-01-1](http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0020
- **State**: REJECTED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: February 04, 2005 at 00:00 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26600
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 15:55 UTC
- **Last Updated**: May 16, 2025 at 23:03 UTC
- **Reserved Date**: February 12, 2025 at 14:12 UTC
- **Assigned By**: redhat
### Vulnerability Description
A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
- 22.0.0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 10**
Affected versions:
- 0:24.1.5-3.el10_0 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7 Extended Lifecycle Support**
Affected versions:
- 0:1.8.0-36.el7_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7 Extended Lifecycle Support**
Affected versions:
- 0:1.20.4-30.el7_9 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:1.13.1-15.el8_10 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.2 Advanced Update Support**
Affected versions:
- 0:1.9.0-15.el8_2.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support**
Affected versions:
- 0:1.11.0-8.el8_4.12 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Telecommunications Update Service**
Affected versions:
- 0:1.11.0-8.el8_4.12 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions**
Affected versions:
- 0:1.11.0-8.el8_4.12 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support**
Affected versions:
- 0:1.12.0-6.el8_6.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Telecommunications Update Service**
Affected versions:
- 0:1.12.0-6.el8_6.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions**
Affected versions:
- 0:1.12.0-6.el8_6.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 8.8 Extended Update Support**
Affected versions:
- 0:1.12.0-15.el8_8.12 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:1.14.1-1.el9_5.1 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:1.20.11-28.el9_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:23.2.7-3.el9_6 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions**
Affected versions:
- 0:1.11.0-22.el9_0.13 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.2 Extended Update Support**
Affected versions:
- 0:1.12.0-14.el9_2.10 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.4 Extended Update Support**
Affected versions:
- 0:1.13.1-8.el9_4.5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 6**
**Red Hat - Red Hat Enterprise Linux 8**
**Red Hat - Red Hat Enterprise Linux 8**
### References
1. [RHSA-2025:2500](https://access.redhat.com/errata/RHSA-2025:2500)
2. [RHSA-2025:2502](https://access.redhat.com/errata/RHSA-2025:2502)
3. [RHSA-2025:2861](https://access.redhat.com/errata/RHSA-2025:2861)
4. [RHSA-2025:2862](https://access.redhat.com/errata/RHSA-2025:2862)
5. [RHSA-2025:2865](https://access.redhat.com/errata/RHSA-2025:2865)
6. [RHSA-2025:2866](https://access.redhat.com/errata/RHSA-2025:2866)
7. [RHSA-2025:2873](https://access.redhat.com/errata/RHSA-2025:2873)
8. [RHSA-2025:2874](https://access.redhat.com/errata/RHSA-2025:2874)
9. [RHSA-2025:2875](https://access.redhat.com/errata/RHSA-2025:2875)
10. [RHSA-2025:2879](https://access.redhat.com/errata/RHSA-2025:2879)
11. [RHSA-2025:2880](https://access.redhat.com/errata/RHSA-2025:2880)
12. [RHSA-2025:7163](https://access.redhat.com/errata/RHSA-2025:7163)
13. [RHSA-2025:7165](https://access.redhat.com/errata/RHSA-2025:7165)
14. [RHSA-2025:7458](https://access.redhat.com/errata/RHSA-2025:7458)
15. [](https://access.redhat.com/security/cve/CVE-2025-26600)
16. [RHBZ#2345252](https://bugzilla.redhat.com/show_bug.cgi?id=2345252) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4267
- **State**: PUBLISHED
- **Published Date**: July 15, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco Identity Services Engine (ISE) 1.2(0.793), 1.3(0.876), 1.4(0.109), 2.0(0.147), and 2.0(0.169) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus09940.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032929](http://www.securitytracker.com/id/1032929)
2. [20150715 Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39872) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0345
- **State**: PUBLISHED
- **Published Date**: February 28, 2022 at 09:06 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Customize WordPress Emails and Alerts WordPress plugin before 1.8.7 does not have authorisation and CSRF check in its bnfw_search_users AJAX action, allowing any authenticated users to call it and query for user e-mail prefixes (finding the first letter, then the second one, then the third one etc.).
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Customize WordPress Emails and Alerts**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19)
### Credits
- Krzysztof Zając
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1192
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in BTT Software SNMP Trap Watcher 1.16 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string trap.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.bttsoftware.co.uk/snmptrap.html)
2. [](http://www.securiteam.com/windowsntfocus/5ZP0C000KC.html)
3. [985](http://www.securityfocus.com/bid/985) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42440
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 16:44 UTC
- **Last Updated**: August 14, 2024 at 18:06 UTC
- **Reserved Date**: August 01, 2024 at 19:13 UTC
- **Assigned By**: Zoom
### Vulnerability Description
Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Zoom Communications Inc. - Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS**
Affected versions:
- before version 6.1.5 (Status: affected)
### References
1. [](https://www.zoom.com/en/trust/security-bulletin/zsb-24034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25984
- **State**: PUBLISHED
- **Published Date**: March 11, 2024 at 18:55 UTC
- **Last Updated**: October 27, 2024 at 00:55 UTC
- **Reserved Date**: February 13, 2024 at 19:54 UTC
- **Assigned By**: Google_Devices
### Vulnerability Description
In dumpBatteryDefend of dump_power.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2024-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27671
- **State**: PUBLISHED
- **Published Date**: April 12, 2022 at 16:11 UTC
- **Last Updated**: August 03, 2024 at 05:32 UTC
- **Reserved Date**: March 23, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
A CSRF token visible in the URL may possibly lead to information disclosure vulnerability.
### Weakness Classification (CWE)
- CWE-201: Improper Input Validation
### Affected Products
**SAP SE - SAP BusinessObjects Business Intelligence Platform**
Affected versions:
- 420 (Status: affected)
- 430 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3130497) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35116, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35116
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 09:51 UTC
- **Last Updated**: August 04, 2024 at 00:33 UTC
- **Reserved Date**: June 21, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
APK can load a crafted model into the CDSP which can lead to a compromise of CDSP and other APK`s data executing there in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8009W, APQ8096AU, AQT1000, CSRB31024, MDM9607, MDM9626, MDM9628, MDM9640, MSM8909W, MSM8937, MSM8996AU, PM8937, QCA6174A, QCA6310, QCA6320, QCA6390, QCA6391, QCA6420, QCA6430, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA9377, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS603, QCS605, QCS6490, SA415M, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 675, SD 8 Gen1 5G, SD429, SD460, SD480, SD660, SD662, SD665, SD675, SD678, SD680, SD690 5G, SD695, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD820, SD835, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDW2500, SDX12, SDX50M, SDX55, SDX55M, SDX65, SM4125, SM6250, SM7250P, SM7315, SM7325P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9762
- **State**: PUBLISHED
- **Published Date**: June 19, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 17:18 UTC
- **Reserved Date**: June 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The cmd_info function in libr/core/cmd_info.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted binary file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/radare/radare2/issues/7726)
2. [99140](http://www.securityfocus.com/bid/99140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45385
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 10:30 UTC
- **Last Updated**: January 14, 2025 at 14:33 UTC
- **Reserved Date**: August 28, 2024 at 13:08 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Industrial Edge Management OS (IEM-OS) (All versions). Affected components are vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Siemens - Industrial Edge Management OS (IEM-OS)**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-416411.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16632
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 20:11 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SapphireIMS 4097_1, the password in the database is stored in Base64 format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuln.shellcoder.party/tags/sapphireims/)
2. [](https://vuln.shellcoder.party/2020/07/18/cve-2017-16632-sapphireims-insecure-storage-of-password/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7218
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 21:00 UTC
- **Last Updated**: August 02, 2024 at 08:57 UTC
- **Reserved Date**: January 07, 2024 at 08:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Totolink - N350RT**
Affected versions:
- 9.3.5u.6139_B202012 (Status: affected)
### References
1. [](https://vuldb.com/?id.249852)
2. [](https://vuldb.com/?ctiid.249852)
3. [](https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N350RT/4/README.md)
### Credits
- jylsec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22189
- **State**: PUBLISHED
- **Published Date**: April 14, 2022 at 15:50 UTC
- **Last Updated**: September 16, 2024 at 23:36 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
- CWE-708: Security Weakness
### Affected Products
**Juniper Networks - Contrail Service Orchestration**
Affected versions:
- 6.0.0 (Status: affected)
**Juniper Networks - Contrail Service Orchestration**
Affected versions:
- unspecified (Status: unaffected)
### References
1. [](https://kb.juniper.net/JSA69498) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2378
- **State**: PUBLISHED
- **Published Date**: August 15, 2022 at 08:37 UTC
- **Last Updated**: August 03, 2024 at 00:39 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Easy Student Results WordPress plugin through 2.2.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Easy Student Results**
Affected versions:
- 2.2.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596)
### Credits
- Raad Haddad |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8870
- **State**: PUBLISHED
- **Published Date**: July 27, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:48 UTC
- **Reserved Date**: May 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in AudioCoder 0.8.46 allows remote attackers to execute arbitrary code via a crafted .m3u file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42385](https://www.exploit-db.com/exploits/42385/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17920
- **State**: PUBLISHED
- **Published Date**: December 29, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 21:06 UTC
- **Reserved Date**: December 26, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1139
- **State**: PUBLISHED
- **Published Date**: April 12, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201209-25](http://security.gentoo.org/glsa/glsa-201209-25.xml)
2. [39206](http://secunia.com/advisories/39206)
3. [[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://lists.vmware.com/pipermail/security-announce/2010/000090.html)
4. [39407](http://www.securityfocus.com/bid/39407)
5. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html)
6. [](http://www.vmware.com/security/advisories/VMSA-2010-0007.html)
7. [63606](http://osvdb.org/63606)
8. [39201](http://secunia.com/advisories/39201)
9. [39215](http://secunia.com/advisories/39215)
10. [1023835](http://www.securitytracker.com/id?1023835)
11. [20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues](http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23153
- **State**: PUBLISHED
- **Published Date**: June 25, 2024 at 03:26 UTC
- **Last Updated**: January 28, 2025 at 17:46 UTC
- **Reserved Date**: January 11, 2024 at 21:51 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted MODEL file, when parsed in libodx.dll through Autodesk applications, can force an Out-of-Bounds Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Autodesk - AutoCAD**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Architecture**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Electrical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Mechanical**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD MEP**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD Plant 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Civil 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Advance Steel**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - AutoCAD MAP 3D**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27912
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 13:20 UTC
- **Reserved Date**: March 10, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Datalust Seq before 2024.3.13545. Missing Content-Type validation can lead to CSRF when (1) Entra ID or OpenID Connect authentication is in use and a user visits a compromised/malicious site, or (2) when username/password or Active Directory authentication is in use and a user visits a compromised/malicious site under the same effective top-level domain as the Seq server. Exploitation of the vulnerability allows the attacker to conduct impersonation attacks and perform actions in Seq on behalf of the targeted user.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Datalust - Seq**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://datalust.co/seq)
2. [](https://github.com/datalust/seq-tickets/issues/2366) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0818
- **State**: PUBLISHED
- **Published Date**: November 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: November 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow the '\s' console command in MDBMS 0.99b9 and earlier allows remote attackers to execute arbitrary commands by sending the command a large amount of data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2867](http://www.securityfocus.com/bid/2867)
2. [mdbms-query-display-bo(6700)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6700)
3. [20010612 Remote buffer overflow in MDBMS.](http://www.securityfocus.com/archive/1/190933) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8386
- **State**: PUBLISHED
- **Published Date**: September 03, 2024 at 12:32 UTC
- **Last Updated**: November 21, 2024 at 15:06 UTC
- **Reserved Date**: September 03, 2024 at 06:39 UTC
- **Assigned By**: mozilla
### Vulnerability Description
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1907032)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1909163)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1909529)
4. [](https://www.mozilla.org/security/advisories/mfsa2024-39/)
5. [](https://www.mozilla.org/security/advisories/mfsa2024-40/)
6. [](https://www.mozilla.org/security/advisories/mfsa2024-43/)
### Credits
- Shaheen Fazim, Hafiizh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3104
- **State**: PUBLISHED
- **Published Date**: August 20, 2010 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 01:51 UTC
- **Reserved Date**: August 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in DeskShare AutoFTP Manager 4.31, and probably earlier versions, allows remote FTP servers to write arbitrary files via a "..\" (dot dot backslash) in a filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.htbridge.ch/advisory/directory_traversal_in_autoftp_manager.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3509
- **State**: PUBLISHED
- **Published Date**: November 06, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in JPortal allow remote attackers to execute arbitrary SQL commands via (1) banner.php or the id parameter to (2) print.php, (3) comment.php, and (4) news.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://foro.elhacker.net/index.php?topic=93436.0)
2. [15324](http://www.securityfocus.com/bid/15324)
3. [ADV-2005-2310](http://www.vupen.com/english/advisories/2005/2310)
4. [](http://www.security.nnov.ru/Kdocument105.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22122
- **State**: PUBLISHED
- **Published Date**: October 17, 2023 at 21:03 UTC
- **Last Updated**: September 13, 2024 at 16:14 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L`
### Affected Products
**Oracle Corporation - Banking Trade Finance**
Affected versions:
- 14.5 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2023.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.