System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50708
- **State**: PUBLISHED
- **Published Date**: December 22, 2023 at 18:25 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 11, 2023 at 17:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth1/2 `state` and OpenID Connect `nonce` is vulnerable for a `timing attack` since it is compared via regular string comparison (instead of `Yii::$app->getSecurity()->compareString()`). Version 2.2.15 contains a patch for the issue. No known workarounds are available.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**yiisoft - yii2-authclient**
Affected versions:
- < 2.2.15 (Status: affected)
### References
1. [https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-w8vh-p74j-x9xp](https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-w8vh-p74j-x9xp)
2. [https://github.com/yiisoft/yii2-authclient/commit/dabddf2154ab7e7703740205a069202554089248](https://github.com/yiisoft/yii2-authclient/commit/dabddf2154ab7e7703740205a069202554089248)
3. [https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158](https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158)
4. [https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121](https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121)
5. [https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420](https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6646
- **State**: PUBLISHED
- **Published Date**: January 16, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 05, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2014:0243](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html)
2. [](https://src.chromium.org/viewvc/chrome?revision=233367&view=revision)
3. [](http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html)
4. [](https://code.google.com/p/chromium/issues/detail?id=249502)
5. [DSA-2862](http://www.debian.org/security/2014/dsa-2862)
6. [](https://src.chromium.org/viewvc/chrome?revision=233099&view=revision) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2764
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 20:31 UTC
- **Last Updated**: August 02, 2024 at 13:57 UTC
- **Reserved Date**: March 21, 2024 at 15:17 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.48. This affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument endIP leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257601 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - AC10U**
Affected versions:
- 15.03.06.48 (Status: affected)
### References
1. [VDB-257601 | Tenda AC10U SetPptpServerCfg formSetPPTPServer stack-based overflow](https://vuldb.com/?id.257601)
2. [VDB-257601 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.257601)
3. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md)
### Credits
- yhryhryhr_miemie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3726
- **State**: PUBLISHED
- **Published Date**: September 20, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Double free vulnerability in ImageIO in Apple iOS before 6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
2. [](http://support.apple.com/kb/HT5503)
3. [apple-ios-imageio-cve20123726(78716)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2215
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11064
- **State**: PUBLISHED
- **Published Date**: August 29, 2019 at 00:19 UTC
- **Last Updated**: September 17, 2024 at 00:36 UTC
- **Reserved Date**: April 09, 2019 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
A vulnerability of remote credential disclosure was discovered in Advan VD-1 firmware versions up to 230. An attacker can export system configuration which is not encrypted to get the administrator’s account and password in plain text via cgibin/ExportSettings.cgi?Export=1 without any authentication.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**AndroVideo - Advan VD-1 firmware**
Affected versions:
- up to 230 (Status: affected)
### References
1. [](https://tvn.twcert.org.tw/taiwanvn/TVN-201906005)
2. [](http://surl.twcert.org.tw/gCDQN)
3. [](https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md)
### Credits
- Keniver Wang (CHT Security) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49078
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:54 UTC
- **Last Updated**: May 04, 2025 at 08:29 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
lz4: fix LZ4_decompress_safe_partial read out of bound
When partialDecoding, it is EOF if we've either filled the output buffer
or can't proceed with reading an offset for following match.
In some extreme corner cases when compressed data is suitably corrupted,
UAF will occur. As reported by KASAN [1], LZ4_decompress_safe_partial
may lead to read out of bound problem during decoding. lz4 upstream has
fixed it [2] and this issue has been disscussed here [3] before.
current decompression routine was ported from lz4 v1.8.3, bumping
lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd
better fix it first.
[1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/
[2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad#
[3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.189 (Status: unaffected)
- 5.10.111 (Status: unaffected)
- 5.15.34 (Status: unaffected)
- 5.16.20 (Status: unaffected)
- 5.17.3 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3)
2. [](https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253)
3. [](https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927)
4. [](https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235)
5. [](https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b)
6. [](https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53744, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53744
- **State**: PUBLISHED
- **Published Date**: December 01, 2024 at 21:29 UTC
- **Last Updated**: December 01, 2024 at 23:07 UTC
- **Reserved Date**: November 22, 2024 at 13:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Skybootstrap Elementor Image Gallery Plugin allows Stored XSS.This issue affects Elementor Image Gallery Plugin: from n/a through 1.0.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Skybootstrap - Elementor Image Gallery Plugin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/skyboot-portfolio-gallery/vulnerability/wordpress-elementor-image-gallery-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24212
- **State**: PUBLISHED
- **Published Date**: April 05, 2021 at 18:27 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Unknown - WooCommerce Help Scout**
Affected versions:
- 2.9.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/cf9305e8-f5bc-45c3-82db-0ef00fd46129)
2. [](http://dzv365zjfbd8v.cloudfront.net/changelogs/woocommerce-help-scout/changelog.txt)
### Credits
- Ville Korhonen / Seravo |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51779, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51779
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 09:23 UTC
- **Last Updated**: November 09, 2024 at 15:20 UTC
- **Reserved Date**: November 04, 2024 at 09:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Stranger Studios (WordCamp Philly) Don't Break The Code allows Reflected XSS.This issue affects Don't Break The Code: from n/a through .3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Stranger Studios (WordCamp Philly) - Don't Break The Code**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/dont-break-the-code/wordpress-don-t-break-the-code-plugin-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1183
- **State**: PUBLISHED
- **Published Date**: April 25, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Buffer overflow in the Intelligent Platform Management Interface (IPMI) functionality in the Manager component in Cisco Unified Computing System (UCS) 1.0 and 1.1 before 1.1(1j) and 1.2 before 1.2(1b) allows remote attackers to execute arbitrary code via malformed data in a UDP packet, aka Bug ID CSCtd32371.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130424 Multiple Vulnerabilities in Cisco Unified Computing System](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52735, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52735
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:22 UTC
- **Last Updated**: May 04, 2025 at 07:42 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.
[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.95 (Status: unaffected)
- 6.1.13 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f312367f5246e04df564d341044286e9e37a97ba)
2. [](https://git.kernel.org/stable/c/7499859881488da97589f3c79cc66fa75748ad49)
3. [](https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5348
- **State**: PUBLISHED
- **Published Date**: June 05, 2019 at 14:16 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
### Affected Products
**n/a - HPE Intelligent Management Center (IMC) PLAT**
Affected versions:
- 7.3 E0506P09 and earlier (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0759
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 05:12 UTC
- **Last Updated**: August 11, 2024 at 14:28 UTC
- **Reserved Date**: January 19, 2024 at 18:44 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as AnythingLLM.
This would require the attacker also be able to guess these internal IPs as `/*` ranging is not possible, but could be brute forced.
There is a duty of care that other services on the same network would not be fully open and accessible via a simple CuRL with zero authentication as it is not possible to set headers or access via the link collector.
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**mintplex-labs - mintplex-labs/anything-llm**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/9a978edd-ac94-41fc-8e3e-c35441bdd12b)
2. [](https://github.com/mintplex-labs/anything-llm/commit/0db6c3b2aa1787a7054ffdaba975474f122c20eb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4276
- **State**: PUBLISHED
- **Published Date**: August 21, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in Tutti Nova 1.6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the TNLIB_DIR parameter to novalib/class.novaEdit.mysql.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tuttinova-tnlib-file-include(28471)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28471)
2. [28028](http://www.osvdb.org/28028)
3. [2220](https://www.exploit-db.com/exploits/2220)
4. [21572](http://secunia.com/advisories/21572)
5. [19612](http://www.securityfocus.com/bid/19612)
6. [ADV-2006-3335](http://www.vupen.com/english/advisories/2006/3335) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0228
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 20:00 UTC
- **Last Updated**: November 29, 2024 at 15:18 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the ingress flow creation functionality of Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the CPU to increase upwards of 100% utilization, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to incorrect handling of an internal software lock that could prevent other system processes from getting CPU cycles, causing a high CPU condition. An attacker could exploit this vulnerability by sending a steady stream of malicious IP packets that can cause connections to be created on the targeted device. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition during which traffic through the device could be delayed. This vulnerability applies to either IPv4 or IPv6 ingress traffic. This vulnerability affects Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliances (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliances (ASAv), Firepower 2100 Series Security Appliances, Firepower 4110 Security Appliances, Firepower 9300 ASA Security Modules. Cisco Bug IDs: CSCvf63718.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Cisco Adaptive Security Appliance**
Affected versions:
- Cisco Adaptive Security Appliance (Status: affected)
### References
1. [1040724](http://www.securitytracker.com/id/1040724)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa2)
3. [104220](http://www.securityfocus.com/bid/104220)
4. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5639
- **State**: PUBLISHED
- **Published Date**: June 05, 2025 at 05:31 UTC
- **Last Updated**: June 05, 2025 at 14:07 UTC
- **Reserved Date**: June 04, 2025 at 11:37 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Notice Board System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Notice Board System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311126 | PHPGurukul Notice Board System forgot-password.php sql injection](https://vuldb.com/?id.311126)
2. [VDB-311126 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311126)
3. [Submit #589812 | PHPGurukul Notice Board System 1.0 SQL Injection](https://vuldb.com/?submit.589812)
4. [](https://github.com/f1rstb100d/myCVE/issues/40)
5. [](https://phpgurukul.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48009
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 16:22 UTC
- **Last Updated**: May 21, 2025 at 16:46 UTC
- **Reserved Date**: May 14, 2025 at 17:45 UTC
- **Assigned By**: drupal
### Vulnerability Description
Missing Authorization vulnerability in Drupal Single Content Sync allows Functionality Misuse.This issue affects Single Content Sync: from 0.0.0 before 1.4.12.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Drupal - Single Content Sync**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2025-060)
### Credits
- Dezső Biczó (mxr576)
- Dave Long (longwave)
- Dezső Biczó (mxr576)
- Oleksandr Kuzava (nginex)
- Greg Knaddison (greggles)
- Juraj Nemec (poker10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16632
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 23:20 UTC
- **Last Updated**: August 04, 2024 at 13:45 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ky-j/dedecms/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9140
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 16:58 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 617, SD 650/52, SD 800, SD 808, SD 810, and SDX20, unauthorized memory access possible in online memory dump feature.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear, Small Cell SoC**
Affected versions:
- FSM9055, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 617, SD 650/52, SD 800, SD 808, SD 810, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000142
- **State**: PUBLISHED
- **Published Date**: November 03, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 21:53 UTC
- **Reserved Date**: November 02, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mahara 1.8 before 1.8.7 and 1.9 before 1.9.5 and 1.10 before 1.10.3 and 15.04 before 15.04.0 are vulnerable to users being able to delete their submitted page through URL manipulation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/mahara/+bug/1425306) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3380
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:20 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Advanced Outbound Telephony**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [95531](http://www.securityfocus.com/bid/95531)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14737
- **State**: PUBLISHED
- **Published Date**: July 29, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: July 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libpbc.a in cloudwu PBC through 2017-03-02. A NULL pointer dereference can occur in pbc_wmessage_string in wmessage.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cloudwu/pbc/issues/122#issuecomment-407303005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6478
- **State**: PUBLISHED
- **Published Date**: March 05, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 05, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96584](http://www.securityfocus.com/bid/96584)
2. [](https://github.com/paintballrefjosh/MaNGOSWebV4/issues/15)
3. [](https://github.com/paintballrefjosh/MaNGOSWebV4/releases/tag/4.0.8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3518
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:50 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3040-1](http://www.ubuntu.com/usn/USN-3040-1)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
3. [91967](http://www.securityfocus.com/bid/91967)
4. [1036362](http://www.securitytracker.com/id/1036362)
5. [91787](http://www.securityfocus.com/bid/91787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26284
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 22:40 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 01, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**gohugoio - hugo**
Affected versions:
- < 0.79.1 (Status: affected)
### References
1. [](https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq)
2. [](https://github.com/golang/go/issues/38736) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2426
- **State**: PUBLISHED
- **Published Date**: July 10, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35546](http://secunia.com/advisories/35546)
2. [[or-announce] 20090625 Tor 0.2.0.35 is released](http://archives.seul.org/or/announce/Jun-2009/msg00000.html)
3. [tor-connectionedge-spoofing(51377)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51377)
4. [ADV-2009-1716](http://www.vupen.com/english/advisories/2009/1716)
5. [35505](http://www.securityfocus.com/bid/35505)
6. [55341](http://www.osvdb.org/55341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0809
- **State**: PUBLISHED
- **Published Date**: February 01, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 18:38 UTC
- **Reserved Date**: January 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201203-06](http://security.gentoo.org/glsa/glsa-201203-06.xml)
2. [](http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt)
3. [20120130 Advisory: sudo 1.8 Format String Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html)
4. [](http://www.sudo.ws/sudo/alerts/sudo_debug.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4445
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0567
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 20:51 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access.
### Affected Products
**Intel - Intel(R) Graphics Drivers**
Affected versions:
- before version 26.20.100.7212 (Status: affected)
- See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html)
2. [](https://security.netapp.com/advisory/ntap-20200320-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1525
- **State**: PUBLISHED
- **Published Date**: February 13, 2016 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 07, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.rapid7.com/db/modules/exploit/windows/http/netgear_nms_rce)
2. [20160204 [CERT 777024 / CVE-2016-1524/5]: RCE and file download in Netgear NMS300](http://www.securityfocus.com/archive/1/537446/100/0/threaded)
3. [20160204 [CERT 777024 / CVE-2016-1524/5]: RCE and file download in Netgear NMS300](http://seclists.org/fulldisclosure/2016/Feb/30)
4. [39515](https://www.exploit-db.com/exploits/39515/)
5. [](http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html)
6. [](http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html)
7. [39412](https://www.exploit-db.com/exploits/39412/)
8. [VU#777024](http://www.kb.cert.org/vuls/id/777024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1128
- **State**: PUBLISHED
- **Published Date**: March 12, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: March 12, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XMMS.pm in X2 XMMS Remote, as obtained from the vendor server between 4 AM 11 AM PST on May 7, 2003, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to TCP port 8086.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8775](http://secunia.com/advisories/8775)
2. [VU#583020](http://www.kb.cert.org/vuls/id/583020)
3. [](http://www.x2studios.com/index.php?page=kb&id=16)
4. [7534](http://www.securityfocus.com/bid/7534)
5. [xmms-remote-command-execution(12139)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12139) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45701
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 21:49 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2021-0111.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2834
- **State**: PUBLISHED
- **Published Date**: June 27, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Integer overflow in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted data in the Matroska container format.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2012:0813](https://hermes.opensuse.org/messages/15075728)
2. [](http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html)
3. [oval:org.mitre.oval:def:15444](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15444)
4. [](http://code.google.com/p/chromium/issues/detail?id=132779) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3876
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 18:00 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 16, 2024 at 10:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in Tenda F1202 1.2.0.20(408). Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-260910 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - F1202**
Affected versions:
- 1.2.0.20(408) (Status: affected)
### References
1. [VDB-260910 | Tenda F1202 VirtualSer fromVirtualSer stack-based overflow](https://vuldb.com/?id.260910)
2. [VDB-260910 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.260910)
3. [Submit #312818 | Tenda F1202 V1.2.0.20(408) buffer overflow](https://vuldb.com/?submit.312818)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md)
### Credits
- wxhwxhwxh_mie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33226
- **State**: PUBLISHED
- **Published Date**: November 01, 2023 at 15:31 UTC
- **Last Updated**: September 05, 2024 at 19:34 UTC
- **Reserved Date**: May 18, 2023 at 17:07 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**SolarWinds - Network Configuration Manager**
Affected versions:
- 2023.3.1 and previous versions (Status: affected)
### References
1. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-33226)
2. [](https://documentation.solarwinds.com/en/success_center/ncm/content/release_notes/ncm_2023-4_release_notes.htm)
### Credits
- Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35592
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 14:06 UTC
- **Last Updated**: February 13, 2025 at 15:59 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the Upload function of Box-IM v2.0 allows attackers to execute arbitrary code via uploading a crafted PDF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Joying-C/Cross-site-scripting-vulnerability/blob/main/BOX-IM_Cross_site%20_scripting%20_vulnerability/BOX-IM_Cross_site%20_scripting%20_vulnerability.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0283
- **State**: PUBLISHED
- **Published Date**: January 15, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in /aides/index.php in DomPHP 0.81 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4883](https://www.exploit-db.com/exploits/4883)
2. [27226](http://www.securityfocus.com/bid/27226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9115
- **State**: PUBLISHED
- **Published Date**: October 30, 2016 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: October 30, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201710-26](https://security.gentoo.org/glsa/201710-26)
2. [93977](http://www.securityfocus.com/bid/93977)
3. [](https://github.com/uclouvain/openjpeg/issues/858) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30601
- **State**: PUBLISHED
- **Published Date**: August 26, 2021 at 17:40 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1234009)
3. [FEDORA-2021-78b9d84299](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/)
4. [FEDORA-2021-6225d60814](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/)
5. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38992, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38992 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38992
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 17:56 UTC
- **Last Updated**: August 03, 2024 at 11:10 UTC
- **Reserved Date**: August 29, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
### References
1. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845)
2. [](https://consumer.huawei.com/en/support/bulletin/2022/9/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8157
- **State**: PUBLISHED
- **Published Date**: May 02, 2020 at 15:19 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
UniFi Cloud Key firmware <= v1.1.10 for Cloud Key gen2 and Cloud Key gen2 Plus contains a vulnerability that allows unrestricted root access through the serial interface (UART).
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - UniFi Cloud Key Gen2, Cloud Key Gen2 plus**
Affected versions:
- Fixed in v1.1.11 (Status: affected)
### References
1. [](https://community.ui.com/releases/Security-advisory-bulletin-008-008/5f66ca4c-10d6-4ca5-9620-37d5a4f22413)
2. [](https://community.ui.com/releases/UniFi-Cloud-Key-Firmware-1-1-11/a24e55e1-6d90-46d7-92e2-01539ec8c79d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22166
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 00:21 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP update message is received over an established BGP session where a BGP SR-TE policy tunnel attribute is malformed and BGP update tracing flag is enabled, the rpd will core. This issue can happen with any BGP session as long as the previous conditions are met. This issue can not propagate as the crash occurs as soon as the malformed update is received. This issue affects Juniper Networks Junos OS: 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1284: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- unspecified (Status: unaffected)
- 20.4 (Status: affected)
- 21.1 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11274) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13125
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 22, 2017 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40492
- **State**: PUBLISHED
- **Published Date**: July 17, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Heartbeat Chat v.15.2.1 allows a remote attacker to execute arbitrary code via the setname function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/minendie/POC_CVE-2024-40492) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46326
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 20:45 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ZStack Cloud version 3.10.38 and before allows unauthenticated API access to the list of active job UUIDs and the session ID for each of these. This leads to privilege escalation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zstackio/zstack/security/advisories/GHSA-w2rv-x3pp-h67q) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29171
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 14:23 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin/wp-security-blacklist-menu.php in the Tips and Tricks HQ All In One WP Security & Firewall (all-in-one-wp-security-and-firewall) plugin before 4.4.6 for WordPress.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tipsandtricks-hq.com/wordpress-security-and-firewall-plugin)
2. [](https://github.com/Arsenal21/all-in-one-wordpress-security/commit/4130906bc049b195467b4fc6980d6d304fbe28d5)
3. [](https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27956
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 17:01 UTC
- **Last Updated**: August 02, 2024 at 14:03 UTC
- **Reserved Date**: February 28, 2024 at 16:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ValvePress - Automatic**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-automatic/wordpress-automatic-plugin-3-92-0-unauthenticated-arbitrary-sql-execution-vulnerability?_s_id=cve)
2. [](https://patchstack.com/articles/critical-vulnerabilities-patched-in-wordpress-automatic-plugin?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1570
- **State**: PUBLISHED
- **Published Date**: February 10, 2015 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 19:19 UTC
- **Reserved Date**: February 10, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Endpoint Control protocol implementation in Fortinet FortiClient 5.2.3.091 for Android and 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof servers via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf)
2. [20150129 Fortinet FortiClient Multiple Vulnerabilities](http://seclists.org/fulldisclosure/2015/Jan/124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4410
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 8 and Apple TV before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-09-17-1 and APPLE-SA-2014-09-17-2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69966](http://www.securityfocus.com/bid/69966)
2. [](http://support.apple.com/kb/HT6441)
3. [](https://support.apple.com/kb/HT6537)
4. [1030866](http://www.securitytracker.com/id/1030866)
5. [apple-cve20144410-code-exec(96030)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96030)
6. [](http://support.apple.com/kb/HT6442)
7. [61318](http://secunia.com/advisories/61318)
8. [APPLE-SA-2014-09-17-2](http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html)
9. [69881](http://www.securityfocus.com/bid/69881)
10. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html)
11. [](http://support.apple.com/kb/HT6440)
12. [61306](http://secunia.com/advisories/61306) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11118
- **State**: PUBLISHED
- **Published Date**: July 31, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 17:57 UTC
- **Reserved Date**: July 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ExifImageFile::readImage function in ExifImageFileRead.cpp in OpenExif 2.1.4 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted jpg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/openexif/bugs/18/)
2. [](http://seclists.org/fulldisclosure/2017/Jul/77) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0532
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 10:42 UTC
- **Last Updated**: March 28, 2025 at 15:37 UTC
- **Reserved Date**: January 27, 2023 at 10:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/disapprove_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219601 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Online Tours & Travels Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.219601)
2. [](https://vuldb.com/?ctiid.219601)
3. [](https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_disapprove_user_id.md)
### Credits
- haicheng.zhang (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23117
- **State**: PUBLISHED
- **Published Date**: March 01, 2025 at 01:52 UTC
- **Last Updated**: March 05, 2025 at 15:26 UTC
- **Reserved Date**: January 11, 2025 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An Insufficient Firmware Update Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system.
### Affected Products
**Ubiquiti Inc - UniFi Protect Cameras**
Affected versions:
- 4.74.106 (Status: affected)
### References
1. [](https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2861
- **State**: PUBLISHED
- **Published Date**: September 17, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 20, 2011 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html)
2. [oval:org.mitre.oval:def:14677](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14677)
3. [75563](http://osvdb.org/75563)
4. [chrome-string-code-execution(69888)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69888)
5. [](http://code.google.com/p/chromium/issues/detail?id=93596) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47357
- **State**: PUBLISHED
- **Published Date**: October 06, 2024 at 09:58 UTC
- **Last Updated**: October 07, 2024 at 13:53 UTC
- **Reserved Date**: September 24, 2024 at 13:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from n/a through 3.12.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Leevio - Happy Addons for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-12-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Robert DeVore (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11537
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:49 UTC
- **Last Updated**: November 22, 2024 at 21:35 UTC
- **Reserved Date**: November 20, 2024 at 21:54 UTC
- **Assigned By**: zdi
### Vulnerability Description
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24620.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**IrfanView - IrfanView**
Affected versions:
- 4.67.0.0 (Status: affected)
### References
1. [ZDI-24-1582](https://www.zerodayinitiative.com/advisories/ZDI-24-1582/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4288
- **State**: PUBLISHED
- **Published Date**: July 29, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:11 UTC
- **Reserved Date**: June 04, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The LDAP implementation on the Cisco Web Security Appliance (WSA) 8.5.0-000, Email Security Appliance (ESA) 8.5.7-042, and Content Security Management Appliance (SMA) 8.3.6-048 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCuo29561, CSCuv40466, and CSCuv40470.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150724 Multiple Cisco Products LDAP Server SSL Certificate Validation Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3773
- **State**: PUBLISHED
- **Published Date**: September 24, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:46 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPDevShell 3.0.0-Beta-4b allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by gzip.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
2. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPDevShell-V3.0.0-Beta-4b)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README)
4. [phpdevshell-gzip-path-disclosure(70599)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70599) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8080
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 17:24 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.4 and 6.3 have a stored cross site scripting vulnerability. Successful exploitation could lead to privilege escalation.
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 6.4, 6.3 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb19-48.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43475
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 13:17 UTC
- **Last Updated**: January 27, 2025 at 18:00 UTC
- **Reserved Date**: November 07, 2022 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insecure storage of sensitive information in the Intel(R) DCM software before version 5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-922: Security Weakness
### Affected Products
**n/a - Intel(R) DCM software**
Affected versions:
- before version 5.1 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38939
- **State**: PUBLISHED
- **Published Date**: August 07, 2023 at 00:00 UTC
- **Last Updated**: October 11, 2024 at 14:20 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda F1202 V1.2.0.9 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the mit_ssid parameter in the formWrlsafeset function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/formWrlsafeset) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8618
- **State**: PUBLISHED
- **Published Date**: December 12, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8617, CVE-2018-8624, CVE-2018-8629.
### Affected Products
**Microsoft - Microsoft Edge**
Affected versions:
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows Server 2019 (Status: affected)
**Microsoft - ChakraCore**
Affected versions:
- ChakraCore (Status: affected)
### References
1. [106113](http://www.securityfocus.com/bid/106113)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8618) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35152
- **State**: PUBLISHED
- **Published Date**: February 02, 2021 at 23:35 UTC
- **Last Updated**: September 16, 2024 at 22:25 UTC
- **Reserved Date**: December 11, 2020 at 00:00 UTC
- **Assigned By**: cloudflare
### Vulnerability Description
Cloudflare WARP for Windows allows privilege escalation due to an unquoted service path. A malicious user or process running with non-administrative privileges can become an administrator by abusing the unquoted service path issue. Since version 1.2.2695.1, the vulnerability was fixed by adding quotes around the service's binary path. This issue affects Cloudflare WARP for Windows, versions prior to 1.2.2695.1.
### CVSS Metrics
- **CVSS Base Score**: 4.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**Cloudflare - Cloudflare WARP for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/cloudflare/advisories/security/advisories/GHSA-qc57-v5q8-f22h)
### Credits
- James Tan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8369
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 11:30 UTC
- **Last Updated**: September 10, 2024 at 13:19 UTC
- **Reserved Date**: August 31, 2024 at 22:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access to Private or Password-protected events due to missing authorization checks in all versions up to, and including, 4.0.4.3. This makes it possible for unauthenticated attackers to view private or password-protected events.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**metagauss - EventPrime – Events Calendar, Bookings and Tickets**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/97174ec0-a2b7-455e-9bf8-b6f51546beee?source=cve)
2. [](https://wordpress.org/plugins/eventprime-event-calendar-management/)
### Credits
- Miguel Santareno |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27635
- **State**: PUBLISHED
- **Published Date**: March 05, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 15:54 UTC
- **Reserved Date**: March 05, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
debmany in debian-goodies 0.88.1 allows attackers to execute arbitrary shell commands (because of an eval call) via a crafted .deb file. (The path is shown to the user before execution.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/1031267) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21181
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 22:40 UTC
- **Last Updated**: March 27, 2025 at 16:53 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39948
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 03:40 UTC
- **Last Updated**: July 31, 2024 at 18:54 UTC
- **Reserved Date**: July 05, 2024 at 03:08 UTC
- **Assigned By**: dahua
### Vulnerability Description
A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Dahua - NVR4XXX**
Affected versions:
- NVR4XXX Versions which Build time before 2023/12/13 (Status: affected)
### References
1. [](https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31913
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 12:09 UTC
- **Last Updated**: August 03, 2024 at 23:10 UTC
- **Reserved Date**: April 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In JetBrains TeamCity before 2020.2.3, insufficient checks of the redirect_uri were made during GitHub SSO token exchange.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com)
2. [](https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25608
- **State**: PUBLISHED
- **Published Date**: September 13, 2023 at 12:28 UTC
- **Last Updated**: September 24, 2024 at 20:00 UTC
- **Reserved Date**: February 08, 2023 at 13:42 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-792: Cross-site Scripting (XSS)
### Affected Products
**Fortinet - FortiAP-W2**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.3 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
**Fortinet - FortiAP-C**
Affected versions:
- 5.4.0 (Status: affected)
- 5.2.0 (Status: affected)
**Fortinet - FortiAP**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.3 (Status: affected)
- 6.0.0 (Status: affected)
**Fortinet - FortiAP-U**
Affected versions:
- 7.0.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
- 5.4.3 (Status: affected)
- 5.4.0 (Status: affected)
**Fortinet - FortiAP-S**
Affected versions:
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
- 6.0.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-22-120](https://fortiguard.com/psirt/FG-IR-22-120) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26644
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 15:17 UTC
- **Last Updated**: May 04, 2025 at 08:52 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
If the source file descriptor to the snapshot ioctl refers to a deleted
subvolume, we get the following abort:
BTRFS: Transaction aborted (error -2)
WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]
Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c
CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]
RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027
RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840
RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998
R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe
R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80
FS: 00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0
Call Trace:
<TASK>
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? __warn+0x81/0x130
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? report_bug+0x171/0x1a0
? handle_bug+0x3a/0x70
? exc_invalid_op+0x17/0x70
? asm_exc_invalid_op+0x1a/0x20
? create_pending_snapshot+0x1040/0x1190 [btrfs]
? create_pending_snapshot+0x1040/0x1190 [btrfs]
create_pending_snapshots+0x92/0xc0 [btrfs]
btrfs_commit_transaction+0x66b/0xf40 [btrfs]
btrfs_mksubvol+0x301/0x4d0 [btrfs]
btrfs_mksnapshot+0x80/0xb0 [btrfs]
__btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]
btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]
btrfs_ioctl+0x8a6/0x2650 [btrfs]
? kmem_cache_free+0x22/0x340
? do_sys_openat2+0x97/0xe0
__x64_sys_ioctl+0x97/0xd0
do_syscall_64+0x46/0xf0
entry_SYSCALL_64_after_hwframe+0x6e/0x76
RIP: 0033:0x7fe20abe83af
RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af
RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003
RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58
</TASK>
---[ end trace 0000000000000000 ]---
BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry
BTRFS info (device vdc: state EA): forced readonly
BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.
BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry
This happens because create_pending_snapshot() initializes the new root
item as a copy of the source root item. This includes the refs field,
which is 0 for a deleted subvolume. The call to btrfs_insert_root()
therefore inserts a root with refs == 0. btrfs_get_new_fs_root() then
finds the root and returns -ENOENT if refs == 0, which causes
create_pending_snapshot() to abort.
Fix it by checking the source root's refs before attempting the
snapshot, but after locking subvol_sem to avoid racing with deletion.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10.210 (Status: unaffected)
- 5.15.149 (Status: unaffected)
- 6.1.76 (Status: unaffected)
- 6.6.15 (Status: unaffected)
- 6.7.3 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2bdf872bcfe629a6202ffd6641615a8ed00e8464)
2. [](https://git.kernel.org/stable/c/0877497dc97834728e1b528ddf1e1c484292c29c)
3. [](https://git.kernel.org/stable/c/6e6bca99e8d88d989a7cde4c064abea552d5219b)
4. [](https://git.kernel.org/stable/c/ec794a7528199e1be6d47bec03f4755aa75df256)
5. [](https://git.kernel.org/stable/c/d8680b722f0ff6d7a01ddacc1844e0d52354d6ff)
6. [](https://git.kernel.org/stable/c/7081929ab2572920e94d70be3d332e5c9f97095a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1343
- **State**: PUBLISHED
- **Published Date**: April 27, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 02:01 UTC
- **Reserved Date**: January 06, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CVS 1.12 and earlier on Debian GNU/Linux does not properly handle when a mapping for the current repository does not exist in the cvs-repouids file, which allows remote attackers to cause a denial of service (server crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-715](http://www.debian.org/security/2005/dsa-715) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4223
- **State**: PUBLISHED
- **Published Date**: December 14, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple "potential" SQL injection vulnerabilities in Utopia News Pro (UNP) 1.1.4 might allow remote attackers to execute arbitrary SQL commands via (1) the newsid parameter in editnews.php, (2) the catid and question parameters in faq.php, (3) the poster parameter in postnews.php, (4) the tempid parameter in templates.php, and (5) the userid and groupid parameters in users.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20051211 [PHP-CHECKER] 99 potential SQL injection vulnerabilities](http://www.securityfocus.com/archive/1/419280/100/0/threaded)
2. [21649](http://www.osvdb.org/21649)
3. [ADV-2005-2859](http://www.vupen.com/english/advisories/2005/2859)
4. [](http://glide.stanford.edu/yichen/research/sec.pdf)
5. [17988](http://secunia.com/advisories/17988/)
6. [20051212 [PHP-CHECKER] 99 potential SQL injection vulnerabilities](http://www.securityfocus.com/archive/1/419487/100/0/threaded)
7. [21647](http://www.osvdb.org/21647)
8. [21648](http://www.osvdb.org/21648)
9. [21645](http://www.osvdb.org/21645)
10. [21646](http://www.osvdb.org/21646)
11. [utopianewspro-editnews-sql-injection(23564)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23564) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19454
- **State**: PUBLISHED
- **Published Date**: May 18, 2020 at 16:40 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: November 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file download was found in the "Download Log" functionality of Wowza Streaming Engine <= 4.x.x. This issue was resolved in Wowza Streaming Engine 4.8.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wowza.com/docs/wowza-streaming-engine-4-8-0-release-notes)
2. [](https://www.gruppotim.it/redteam)
3. [](https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2019-19454.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3942
- **State**: PUBLISHED
- **Published Date**: December 16, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:26 UTC
- **Reserved Date**: October 14, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for copies from user mode, which allows local users to gain privileges via a crafted application, aka "Win32k WriteAV Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA10-348A](http://www.us-cert.gov/cas/techalerts/TA10-348A.html)
2. [MS10-098](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-098)
3. [1024880](http://www.securitytracker.com/id?1024880)
4. [oval:org.mitre.oval:def:11762](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11762) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18344
- **State**: PUBLISHED
- **Published Date**: December 11, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 15, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://crbug.com/866426)
2. [](https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html)
3. [RHSA-2018:3803](https://access.redhat.com/errata/RHSA-2018:3803)
4. [DSA-4352](https://www.debian.org/security/2018/dsa-4352)
5. [106084](http://www.securityfocus.com/bid/106084)
6. [GLSA-201908-18](https://security.gentoo.org/glsa/201908-18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5533
- **State**: PUBLISHED
- **Published Date**: October 23, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 06:50 UTC
- **Reserved Date**: July 16, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in counter-options.php in the Count Per Day plugin before 3.4.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the cpd_keep_month parameter to wp-admin/options-general.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB23267)
2. [](http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html)
3. [](https://plugins.trac.wordpress.org/changeset/1190683/count-per-day)
4. [37707](https://www.exploit-db.com/exploits/37707/)
5. [](https://wpvulndb.com/vulnerabilities/8110)
6. [20150722 SQL Injection in Count Per Day WordPress Plugin](http://www.securityfocus.com/archive/1/536056/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1411
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 10:30 UTC
- **Last Updated**: August 03, 2024 at 00:03 UTC
- **Reserved Date**: April 20, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Unrestructed file upload in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. Attacker can send malicious files to the victims is able to retrieve the stored data from the web application without that data being made safe to render in the browser and steals victim's cookie leads to account takeover.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**yetiforcecompany - yetiforcecompany/yetiforcecrm**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/75c7cf09-d118-4f91-9686-22b142772529)
2. [](https://github.com/yetiforcecompany/yetiforcecrm/commit/bf69c427260011ffca42f7b6935bb54080c54124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0453
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 12, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676373)
2. [59022](http://secunia.com/advisories/59022)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680750)
4. [USN-2187-1](http://www.ubuntu.com/usn/USN-2187-1)
5. [RHSA-2014:0675](http://rhn.redhat.com/errata/RHSA-2014-0675.html)
6. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414)
7. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
8. [59324](http://secunia.com/advisories/59324)
9. [USN-2191-1](http://www.ubuntu.com/usn/USN-2191-1)
10. [](http://www-01.ibm.com/support/docview.wss?uid=swg21679610)
11. [59733](http://secunia.com/advisories/59733)
12. [61050](http://secunia.com/advisories/61050)
13. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676672)
14. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698)
15. [HPSBUX03091](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
16. [](http://www-01.ibm.com/support/docview.wss?uid=swg21672080)
17. [](http://www-01.ibm.com/support/docview.wss?uid=swg21681047)
18. [](http://www-01.ibm.com/support/docview.wss?uid=swg21675945)
19. [RHSA-2014:0413](https://access.redhat.com/errata/RHSA-2014:0413)
20. [SSRT101667](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
21. [HPSBUX03092](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
22. [61264](http://secunia.com/advisories/61264)
23. [59194](http://secunia.com/advisories/59194)
24. [60498](http://secunia.com/advisories/60498)
25. [RHSA-2014:0685](http://rhn.redhat.com/errata/RHSA-2014-0685.html)
26. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096132)
27. [](http://www-01.ibm.com/support/docview.wss?uid=swg21678113)
28. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677294)
29. [59436](http://secunia.com/advisories/59436)
30. [59653](http://secunia.com/advisories/59653)
31. [59071](http://secunia.com/advisories/59071)
32. [DSA-2912](http://www.debian.org/security/2014/dsa-2912)
33. [66914](http://www.securityfocus.com/bid/66914)
34. [60117](http://secunia.com/advisories/60117)
35. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html)
36. [](http://www-01.ibm.com/support/docview.wss?uid=swg21681256)
37. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680387)
38. [60574](http://secunia.com/advisories/60574)
39. [59722](http://secunia.com/advisories/59722)
40. [58415](http://secunia.com/advisories/58415)
41. [59104](http://secunia.com/advisories/59104)
42. [59675](http://secunia.com/advisories/59675)
43. [SSRT101668](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
44. [59438](http://secunia.com/advisories/59438)
45. [](http://www-01.ibm.com/support/docview.wss?uid=swg21674539)
46. [](http://www-01.ibm.com/support/docview.wss?uid=swg21683484)
47. [](http://www-01.ibm.com/support/docview.wss?uid=swg21673836)
48. [](https://www.ibm.com/support/docview.wss?uid=swg21674530)
49. [](http://www.ibm.com/support/docview.wss?uid=swg21677387)
50. [59023](http://secunia.com/advisories/59023)
51. [59307](http://secunia.com/advisories/59307)
52. [](http://www-01.ibm.com/support/docview.wss?uid=swg21679713)
53. [](http://www.ibm.com/support/docview.wss?uid=swg21675343)
54. [59082](http://secunia.com/advisories/59082)
55. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676703)
56. [59250](http://secunia.com/advisories/59250)
57. [60580](http://secunia.com/advisories/60580)
58. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml)
59. [59255](http://secunia.com/advisories/59255)
60. [](http://www-01.ibm.com/support/docview.wss?uid=swg21681018)
61. [60111](http://secunia.com/advisories/60111)
62. [60003](http://secunia.com/advisories/60003)
63. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676190)
64. [](http://www.ibm.com/support/docview.wss?uid=swg21675588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29973
- **State**: PUBLISHED
- **Published Date**: August 05, 2021 at 19:46 UTC
- **Last Updated**: August 03, 2024 at 22:24 UTC
- **Reserved Date**: April 01, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Password autofill was enabled without user interaction on insecure websites on Firefox for Android. This was corrected to require user interaction with the page before a user's password would be entered by the browser's autofill functionality *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-28/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1701932) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4571
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 16:19 UTC
- **Last Updated**: February 28, 2025 at 11:03 UTC
- **Reserved Date**: August 28, 2023 at 21:04 UTC
- **Assigned By**: Splunk
### Vulnerability Description
In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed.
The vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Affected Products
**Splunk - Splunk ITSI**
Affected versions:
- 4.13 (Status: affected)
- 4.15 (Status: affected)
- 4.17 (Status: affected)
### References
1. [](https://advisory.splunk.com/advisories/SVD-2023-0810)
### Credits
- STÖK / Fredrik Alexandersson |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27154
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 13:53 UTC
- **Last Updated**: February 27, 2025 at 14:29 UTC
- **Reserved Date**: February 19, 2025 at 16:30 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Spotipy is a lightweight Python library for the Spotify Web API. The `CacheHandler` class creates a cache file to store the auth token. Prior to version 2.25.1, the file created has `rw-r--r--` (644) permissions by default, when it could be locked down to `rw-------` (600) permissions. This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token. Version 2.25.1 tightens the cache file permissions.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**spotipy-dev - spotipy**
Affected versions:
- < 2.25.1 (Status: affected)
### References
1. [https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599](https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599)
2. [https://github.com/spotipy-dev/spotipy/commit/1ca453f6ef87a2a9e9876f52b6cb38d13532ccf2](https://github.com/spotipy-dev/spotipy/commit/1ca453f6ef87a2a9e9876f52b6cb38d13532ccf2)
3. [https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98](https://github.com/spotipy-dev/spotipy/blob/master/spotipy/cache_handler.py#L93-L98)
4. [https://github.com/spotipy-dev/spotipy/releases/tag/2.25.1](https://github.com/spotipy-dev/spotipy/releases/tag/2.25.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8829
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:53 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6.1, tvOS 13.2, iOS 13.2 and iPadOS 13.2. An application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210722)
2. [](https://support.apple.com/en-us/HT210721)
3. [](https://support.apple.com/en-us/HT210723)
4. [](https://support.apple.com/en-us/HT210724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24118
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 23:53 UTC
- **Reserved Date**: January 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1289
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 05:40 UTC
- **Reserved Date**: March 09, 2023 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - ImageMagick**
Affected versions:
- Fixed-in ImageMagick v7.1.1-0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2176858)
2. [](https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr)
3. [](https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4)
4. [[debian-lts-announce] 20240222 [SECURITY] [DLA 3737-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38190
- **State**: PUBLISHED
- **Published Date**: October 21, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 20:39 UTC
- **Reserved Date**: July 13, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/security-advisories/)
2. [](https://herolab.usd.de/security-advisories/usd-2023-0014/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22964
- **State**: PUBLISHED
- **Published Date**: January 20, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 15:07 UTC
- **Reserved Date**: January 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine ServiceDesk Plus MSP before 10611, and 13x before 13004, is vulnerable to authentication bypass when LDAP authentication is enabled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://manageengine.com)
2. [](https://www.manageengine.com/products/service-desk-msp/cve-2023-22964.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43314
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:17 UTC
- **Last Updated**: November 04, 2024 at 16:26 UTC
- **Reserved Date**: August 09, 2024 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Gabe Livan Asset CleanUp: Page Speed Booster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Asset CleanUp: Page Speed Booster: from n/a through 1.3.9.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Gabe Livan - Asset CleanUp: Page Speed Booster**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-asset-clean-up/wordpress-asset-cleanup-page-speed-booster-plugin-1-3-9-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7396
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:47 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The PocketKnife Bravo Super (aka com.wPocketKnifeBravo) application 0.54.13345.33028 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#902025](http://www.kb.cert.org/vuls/id/902025)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26125
- **State**: PUBLISHED
- **Published Date**: March 03, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 04:56 UTC
- **Reserved Date**: February 25, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - FRRouting**
Affected versions:
- through 8.1.0 (Status: affected)
### References
1. [](https://github.com/FRRouting/frr/issues/10507)
2. [[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update](https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20959
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: February 21, 2025 at 15:26 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In AddSupervisedUserActivity, guest users are not prevented from starting the activity due to missing permissions checks. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-249057848
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8036
- **State**: PUBLISHED
- **Published Date**: July 24, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 21, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
An issue was discovered in the Cloud Controller API in Cloud Foundry Foundation CAPI-release version 1.33.0 (only). The original fix for CVE-2017-8033 included in CAPI-release 1.33.0 introduces a regression that allows a space developer to execute arbitrary code on the Cloud Controller VM by pushing a specially crafted application.
### Affected Products
**n/a - Cloud Controller API CAPI-release version 1.33.0 only**
Affected versions:
- Cloud Controller API CAPI-release version 1.33.0 only (Status: affected)
### References
1. [](https://www.cloudfoundry.org/cve-2017-8036/)
2. [100002](http://www.securityfocus.com/bid/100002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34642
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 18:22 UTC
- **Last Updated**: May 05, 2025 at 18:49 UTC
- **Reserved Date**: June 10, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Smart Email Alerts WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the api_key in the ~/views/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.10.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Followistic - Smart Email Alerts**
Affected versions:
- 1.0.10 (Status: affected)
### References
1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34642)
2. [](https://plugins.trac.wordpress.org/browser/smart-email-alerts/trunk/views/settings.php#L38)
### Credits
- p7e4 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42365
- **State**: PUBLISHED
- **Published Date**: November 27, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 19:16 UTC
- **Reserved Date**: September 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A use-after-free vulnerability was discovered in BusyBox v.1.36.1 via a crafted awk pattern in the awk.c copyvar function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.busybox.net/show_bug.cgi?id=15871) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23915
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 13:53 UTC
- **Last Updated**: September 18, 2024 at 15:27 UTC
- **Reserved Date**: January 23, 2024 at 15:02 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routines fluid_msg::of13::InstructionSet::unpack.
This issue affects libfluid: 0.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-690: Security Weakness
### Affected Products
**Open Networking Foundation (ONF) - libfluid**
Affected versions:
- 0.1.0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23915) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17166
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei DP300 V500R002C00, Secospace USG6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, TP3206 V100R002C00, VP9660 V500R002C00, V500R002C10 have a resource exhaustion vulnerability. The software does not process certain field of H.323 message properly, a remote unauthenticated attacker could send crafted H.323 message to the device, successful exploit could cause certain service unavailable since the stack memory is exhausted.
### Affected Products
**Huawei Technologies Co., Ltd. - DP300, Secospace USG6300,Secospace USG6500,Secospace USG6600,TP3206, VP9660**
Affected versions:
- DP300 V500R002C00,Secospace USG6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,TP3206 V100R002C00,VP9660 V500R002C00, V500R002C10 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-h323-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25169
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 13:30 UTC
- **Last Updated**: March 03, 2025 at 17:34 UTC
- **Reserved Date**: February 03, 2025 at 13:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Authors Autocomplete Meta Box allows Reflected XSS. This issue affects Authors Autocomplete Meta Box: from n/a through 1.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - Authors Autocomplete Meta Box**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/authors-autocomplete-meta-box/vulnerability/wordpress-authors-autocomplete-meta-box-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5195
- **State**: PUBLISHED
- **Published Date**: September 06, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in Roxio MyDVD 9 allows local users to gain privileges via a Trojan horse HomeUtils9.dll file in the current working directory, as demonstrated by a directory that contains a .dmsd or .dmsm file. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14781](http://www.exploit-db.com/exploits/14781/)
2. [41152](http://secunia.com/advisories/41152) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46447
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:09 UTC
- **Last Updated**: April 24, 2025 at 19:59 UTC
- **Reserved Date**: April 24, 2025 at 14:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFable Fable Extra allows DOM-Based XSS. This issue affects Fable Extra: from n/a through 1.0.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPFable - Fable Extra**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/fable-extra/vulnerability/wordpress-fable-extra-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- timomangcut (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21983
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 15:47 UTC
- **Last Updated**: May 04, 2025 at 07:26 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
Currently kvfree_rcu() APIs use a system workqueue which is
"system_unbound_wq" to driver RCU machinery to reclaim a memory.
Recently, it has been noted that the following kernel warning can
be observed:
<snip>
workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work
WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120
Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...
CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1
Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023
Workqueue: nvme-wq nvme_scan_work
RIP: 0010:check_flush_dependency+0x112/0x120
Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...
RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082
RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027
RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88
RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd
R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400
R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000
CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0
PKRU: 55555554
Call Trace:
<TASK>
? __warn+0xa4/0x140
? check_flush_dependency+0x112/0x120
? report_bug+0xe1/0x140
? check_flush_dependency+0x112/0x120
? handle_bug+0x5e/0x90
? exc_invalid_op+0x16/0x40
? asm_exc_invalid_op+0x16/0x20
? timer_recalc_next_expiry+0x190/0x190
? check_flush_dependency+0x112/0x120
? check_flush_dependency+0x112/0x120
__flush_work.llvm.1643880146586177030+0x174/0x2c0
flush_rcu_work+0x28/0x30
kvfree_rcu_barrier+0x12f/0x160
kmem_cache_destroy+0x18/0x120
bioset_exit+0x10c/0x150
disk_release.llvm.6740012984264378178+0x61/0xd0
device_release+0x4f/0x90
kobject_put+0x95/0x180
nvme_put_ns+0x23/0xc0
nvme_remove_invalid_namespaces+0xb3/0xd0
nvme_scan_work+0x342/0x490
process_scheduled_works+0x1a2/0x370
worker_thread+0x2ff/0x390
? pwq_release_workfn+0x1e0/0x1e0
kthread+0xb1/0xe0
? __kthread_parkme+0x70/0x70
ret_from_fork+0x30/0x40
? __kthread_parkme+0x70/0x70
ret_from_fork_asm+0x11/0x20
</TASK>
---[ end trace 0000000000000000 ]---
<snip>
To address this switch to use of independent WQ_MEM_RECLAIM
workqueue, so the rules are not violated from workqueue framework
point of view.
Apart of that, since kvfree_rcu() does reclaim memory it is worth
to go with WQ_MEM_RECLAIM type of wq because it is designed for
this purpose.
### Affected Products
**Linux - Linux**
Affected versions:
- 6c6c47b063b593785202be158e61fe5c827d6677 (Status: affected)
- 6c6c47b063b593785202be158e61fe5c827d6677 (Status: affected)
- 6c6c47b063b593785202be158e61fe5c827d6677 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 6.12.20 (Status: unaffected)
- 6.13.8 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63)
2. [](https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241)
3. [](https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10608
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 00:10 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
robot-js is a module for native system automation for node.js. robot-js downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - robot-js node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/201) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.