System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5597 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 11:48 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The 9 Innings: 2014 Pro Baseball (aka com.com2us.nipb2013.normal.freefull.google.global.android.common) application 4.0.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) 3. [VU#824145](http://www.kb.cert.org/vuls/id/824145)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43528 - **State**: PUBLISHED - **Published Date**: October 08, 2024 at 17:35 UTC - **Last Updated**: January 29, 2025 at 23:50 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Secure Kernel Mode Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) ### References 1. [Windows Secure Kernel Mode Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43528)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36043 - **State**: PUBLISHED - **Published Date**: September 01, 2021 at 14:31 UTC - **Last Updated**: September 16, 2024 at 20:36 UTC - **Reserved Date**: June 30, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a blind SSRF vulnerability in the bundled dotmailer extension. An attacker with admin privileges could abuse this to achieve remote code execution should Redis be enabled. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **Adobe - Magento Commerce** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/magento/apsb21-64.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42458, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42458 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42458 - **State**: PUBLISHED - **Published Date**: December 07, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 14:22 UTC - **Reserved Date**: October 07, 2022 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Authentication bypass using an alternate path or channel vulnerability in bingo!CMS version1.7.4.1 and earlier allows a remote unauthenticated attacker to upload an arbitrary file. As a result, an arbitrary script may be executed and/or a file may be altered. ### Affected Products **Shift Tech Inc. - bingo!CMS** Affected versions: - version1.7.4.1 and earlier (Status: affected) ### References 1. [](https://www.bingo-cms.jp/information/20221011.html) 2. [](https://jvn.jp/en/jp/JVN74592196/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39914, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39914 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39914 - **State**: PUBLISHED - **Published Date**: September 13, 2023 at 14:17 UTC - **Last Updated**: September 12, 2024 at 13:22 UTC - **Reserved Date**: August 07, 2023 at 11:55 UTC - **Assigned By**: NLnet Labs ### Vulnerability Description NLnet Labs' bcder library up to and including version 0.7.2 panics while decoding certain invalid input data rather than rejecting the data with an error. This can affect both the actual decoding stage as well as accessing content of types that utilized delayed decoding. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-232: Security Weakness - CWE-240: Security Weakness ### Affected Products **NLnet Labs - bcder** Affected versions: - * (Status: affected) - 0.7.3 (Status: unaffected) ### References 1. [](https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt) ### Credits - Haya Shulman - Donika Mirdita - Niklas Vogel
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25654 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 00:00 UTC - **Last Updated**: March 14, 2025 at 00:32 UTC - **Reserved Date**: February 09, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure permissions for log files of AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS allow members (with local access to the UMP application server) to access credentials to authenticate to all services, and to decrypt sensitive data stored in the database. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25654)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2353 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BugPort before 1.099 stores its configuration file (conf/config.conf) under the web document root with a file extension that is not normally parsed by web servers, which allows remote attackers to obtain sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9542](http://www.securityfocus.com/bid/9542) 2. [bugport-obtain-information(15030)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15030) 3. [10785](http://secunia.com/advisories/10785/) 4. [](http://www.incogen.com/downloads/bugport/CHANGELOG.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32903 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9344, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9344 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9344 - **State**: PUBLISHED - **Published Date**: October 02, 2024 at 08:31 UTC - **Last Updated**: October 02, 2024 at 18:07 UTC - **Reserved Date**: September 30, 2024 at 16:14 UTC - **Assigned By**: Wordfence ### Vulnerability Description The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' parameter in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **thevisionofhamza - BerqWP – Automated All-In-One PageSpeed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/01d5e5b5-033c-4690-9857-3339e2831340?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3160806%40searchpro&new=3160806%40searchpro&sfp_email=&sfph_mail=) 3. [](https://plugins.trac.wordpress.org/browser/searchpro/trunk/simplehtmldom/example/scraping/example_scraping_general.php?rev=3138385) ### Credits - Dale Mavers
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-41414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-41414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-41414 - **State**: PUBLISHED - **Published Date**: May 07, 2025 at 22:04 UTC - **Last Updated**: May 08, 2025 at 13:06 UTC - **Reserved Date**: April 23, 2025 at 22:28 UTC - **Assigned By**: f5 ### Vulnerability Description When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **F5 - BIG-IP** Affected versions: - 17.5.0 (Status: unaffected) - 17.1.0 (Status: affected) - 16.1.0 (Status: affected) - 15.1.0 (Status: affected) **F5 - BIG-IP Next SPK** Affected versions: - 1.8.0 (Status: affected) - 1.7.0 (Status: affected) **F5 - BIG-IP Next CNF** Affected versions: - 2.0.0 (Status: unaffected) - 1.1.0 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000140968) ### Credits - F5
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24625 - **State**: PUBLISHED - **Published Date**: March 24, 2023 at 00:00 UTC - **Last Updated**: February 21, 2025 at 17:46 UTC - **Reserved Date**: January 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Faveo 5.0.1 allows remote attackers to obtain sensitive information via a modified user ID in an Insecure Direct Object Reference (IDOR) attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.faveohelpdesk.com/servicedesk/) 2. [](https://medium.com/%40cupc4k3/vulnerabilities-in-faveo-service-desk-37a63f53d896) 3. [](https://cupc4k3.lol/cve-2023-24625-idor-in-faveo-service-desk-37a63f53d896)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22191 - **State**: PUBLISHED - **Published Date**: January 16, 2024 at 21:57 UTC - **Last Updated**: October 21, 2024 at 12:03 UTC - **Reserved Date**: January 08, 2024 at 04:59 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Avo is a framework to create admin panels for Ruby on Rails apps. A stored cross-site scripting (XSS) vulnerability was found in the key_value field of Avo v3.2.3 and v2.46.0. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the victim's browser. The value of the key_value is inserted directly into the HTML code. In the current version of Avo (possibly also older versions), the value is not properly sanitized before it is inserted into the HTML code. This vulnerability could be used to steal sensitive information from victims that could be used to hijack victims' accounts or redirect them to malicious websites. Avo 3.2.4 and 2.47.0 include a fix for this issue. Users are advised to upgrade. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **avo-hq - avo** Affected versions: - >= 3.0.0.beta1, < 3.2.4 (Status: affected) - < 2.47.0 (Status: affected) ### References 1. [https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h](https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h) 2. [https://github.com/avo-hq/avo/commit/51bb80b181cd8e31744bdc4e7f9b501c81172347](https://github.com/avo-hq/avo/commit/51bb80b181cd8e31744bdc4e7f9b501c81172347) 3. [https://github.com/avo-hq/avo/commit/fc92a05a8556b1787c8694643286a1afa6a71258](https://github.com/avo-hq/avo/commit/fc92a05a8556b1787c8694643286a1afa6a71258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36142 - **State**: PUBLISHED - **Published Date**: June 04, 2021 at 15:03 UTC - **Last Updated**: August 04, 2024 at 17:23 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BloofoxCMS 0.5.2.1 allows Directory traversal vulnerability by inserting '../' payloads within the 'fileurl' parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18479 - **State**: REJECTED - **Published Date**: October 28, 2019 at 14:42 UTC - **Last Updated**: October 28, 2019 at 14:42 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7298 - **State**: PUBLISHED - **Published Date**: October 26, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 07:43 UTC - **Reserved Date**: September 21, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://owncloud.org/security/advisory/?id=oc-sa-2015-016)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39677 - **State**: PUBLISHED - **Published Date**: July 08, 2024 at 14:52 UTC - **Last Updated**: August 02, 2024 at 04:26 UTC - **Reserved Date**: June 27, 2024 at 18:44 UTC - **Assigned By**: GitHub_M ### Vulnerability Description NHibernate is an object-relational mapper for the .NET framework. A SQL injection vulnerability exists in some types implementing ILiteralType.ObjectToSQLString. Callers of these methods are exposed to the vulnerability, which includes mappings using inheritance with discriminator values; HQL queries referencing a static field of the application; users of the SqlInsertBuilder and SqlUpdateBuilder utilities, calling their AddColumn overload taking a literal value; and any direct use of the ObjectToSQLString methods for building SQL queries on the user side. This vulnerability is fixed in 5.4.9 and 5.5.2. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **nhibernate - nhibernate-core** Affected versions: - < 5.4.9 (Status: affected) - >= 5.5.0, < 5.5.2 (Status: affected) ### References 1. [https://github.com/nhibernate/nhibernate-core/security/advisories/GHSA-fg4q-ccq8-3r5q](https://github.com/nhibernate/nhibernate-core/security/advisories/GHSA-fg4q-ccq8-3r5q) 2. [https://github.com/nhibernate/nhibernate-core/issues/3516](https://github.com/nhibernate/nhibernate-core/issues/3516) 3. [https://github.com/nhibernate/nhibernate-core/pull/3517](https://github.com/nhibernate/nhibernate-core/pull/3517) 4. [https://github.com/nhibernate/nhibernate-core/pull/3547](https://github.com/nhibernate/nhibernate-core/pull/3547) 5. [https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9](https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12527 - **State**: PUBLISHED - **Published Date**: January 11, 2025 at 07:21 UTC - **Last Updated**: January 13, 2025 at 17:09 UTC - **Reserved Date**: December 11, 2024 at 14:03 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Perfect Portal Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'perfect_portal_intake_form' shortcode in all versions up to, and including, 3.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **alanperfectportal - Perfect Portal Widgets** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bded6765-e994-46a4-8c88-c324a4fd6ee6?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/perfect-portal-widgets/tags/3.0.3/perfect-portal-widgets.php#L330) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8138 - **State**: REJECTED - **Published Date**: March 01, 2021 at 23:08 UTC - **Last Updated**: March 01, 2021 at 23:08 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25937 - **State**: PUBLISHED - **Published Date**: June 23, 2023 at 09:40 UTC - **Last Updated**: November 08, 2024 at 14:06 UTC - **Reserved Date**: February 17, 2023 at 06:15 UTC - **Assigned By**: dell ### Vulnerability Description Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable. ### CVSS Metrics - **CVSS Base Score**: 5.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Dell - CPG BIOS** Affected versions: - All Versions (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1871, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1871 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1871 - **State**: PUBLISHED - **Published Date**: August 10, 2011 at 21:16 UTC - **Last Updated**: August 06, 2024 at 22:46 UTC - **Reserved Date**: May 04, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Tcpip.sys in the TCP/IP stack in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a series of crafted ICMP messages, aka "ICMP Denial of Service Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:12971](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12971) 2. [MS11-064](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-064) 3. [TA11-221A](http://www.us-cert.gov/cas/techalerts/TA11-221A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4911 - **State**: PUBLISHED - **Published Date**: October 08, 2011 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:02 UTC - **Reserved Date**: October 07, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in classi/detail.php in PHP Classifieds Ads allows remote attackers to execute arbitrary SQL commands via the sid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.org/1009-exploits/phpclassifiedsads-sql.txt) 2. [8447](http://securityreason.com/securityalert/8447) 3. [phpclassifiedsads-detail-sql-injection(61601)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61601) 4. [14891](http://www.exploit-db.com/exploits/14891)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7400 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12108 - **State**: PUBLISHED - **Published Date**: April 24, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 00:51 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable integer overflow vulnerability exists in the xls_preparseWorkSheet function of libxls 1.4 when handling a MULBLANK record. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability. ### Affected Products **libxls - libxls** Affected versions: - 1.4 readxl package 1.0.0 for R (tested using Microsoft R 4.3.1) (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0460)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3522 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 15:13 UTC - **Last Updated**: October 16, 2024 at 15:02 UTC - **Reserved Date**: July 06, 2023 at 07:20 UTC - **Assigned By**: TR-CERT ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **a2 - License Portal System** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.usom.gov.tr/bildirim/tr-23-0445) ### Credits - Resul Melih MACIT
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2560 - **State**: PUBLISHED - **Published Date**: August 02, 2017 at 19:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Manage Engine Desktop Central 9 before build 90135 allows remote attackers to change passwords of users with the Administrator role via an addOrModifyUser operation to servlets/DCOperationsServlet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.manageengine.com/products/desktop-central/unauthorized-admin-credential-modification.html) 2. [](http://packetstormsecurity.com/files/131062/Manage-Engine-Desktop-Central-9-Unauthorized-Administrative-Password-Reset.html) 3. [20150327 Manage Engine Desktop Central 9 - CVE-2015-2560 - Unauthorised administrative password reset](http://www.securityfocus.com/archive/1/535004/100/1400/threaded) 4. [73380](http://www.securityfocus.com/bid/73380)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-24946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-24946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-24946 - **State**: PUBLISHED - **Published Date**: May 28, 2024 at 15:30 UTC - **Last Updated**: February 13, 2025 at 17:40 UTC - **Reserved Date**: February 01, 2024 at 20:28 UTC - **Assigned By**: talos ### Vulnerability Description A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **AutomationDirect - P3-550E** Affected versions: - 1.2.10.9 (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937) 2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1937) ### Credits - Discovered by Matt Wiseman of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43482, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43482 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43482 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 16:53 UTC - **Last Updated**: December 31, 2024 at 23:02 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Outlook for iOS Information Disclosure Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Microsoft - Outlook for iOS** Affected versions: - 1.0.0 (Status: affected) ### References 1. [Microsoft Outlook for iOS Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45336, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45336 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45336 - **State**: PUBLISHED - **Published Date**: November 02, 2023 at 13:26 UTC - **Last Updated**: August 02, 2024 at 20:21 UTC - **Reserved Date**: October 06, 2023 at 21:35 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Projectworlds Pvt. Limited - Online Food Ordering System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/hann) 2. [](https://projectworlds.in/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10135 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 19:00 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - Java** Affected versions: - Java SE: 6u151 (Status: affected) - 7u141 (Status: affected) - 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 (Status: affected) ### References 1. [RHSA-2017:1791](https://access.redhat.com/errata/RHSA-2017:1791) 2. [RHSA-2017:1790](https://access.redhat.com/errata/RHSA-2017:1790) 3. [](https://security.netapp.com/advisory/ntap-20170720-0001/) 4. [RHSA-2017:1789](https://access.redhat.com/errata/RHSA-2017:1789) 5. [](https://cert.vde.com/en-us/advisories/vde-2017-002) 6. [RHSA-2017:2424](https://access.redhat.com/errata/RHSA-2017:2424) 7. [1038931](http://www.securitytracker.com/id/1038931) 8. [99839](http://www.securityfocus.com/bid/99839) 9. [RHSA-2017:1792](https://access.redhat.com/errata/RHSA-2017:1792) 10. [GLSA-201709-22](https://security.gentoo.org/glsa/201709-22) 11. [DSA-3919](http://www.debian.org/security/2017/dsa-3919) 12. [DSA-3954](http://www.debian.org/security/2017/dsa-3954) 13. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38606, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38606 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38606 - **State**: PUBLISHED - **Published Date**: July 26, 2023 at 23:55 UTC - **Last Updated**: October 23, 2024 at 13:56 UTC - **Reserved Date**: July 20, 2023 at 15:04 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. ### Affected Products **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213846) 2. [](https://support.apple.com/en-us/HT213841) 3. [](https://support.apple.com/en-us/HT213843) 4. [](https://support.apple.com/en-us/HT213842) 5. [](https://support.apple.com/en-us/HT213845) 6. [](https://support.apple.com/en-us/HT213844) 7. [](https://support.apple.com/en-us/HT213848)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0150 - **State**: PUBLISHED - **Published Date**: March 22, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:05 UTC - **Reserved Date**: February 16, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#328867](http://www.kb.cert.org/vuls/id/328867) 2. [4417](http://www.osvdb.org/4417) 3. [979](http://www.securityfocus.com/bid/979)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1387 - **State**: PUBLISHED - **Published Date**: May 30, 2022 at 08:35 UTC - **Last Updated**: August 03, 2024 at 00:03 UTC - **Reserved Date**: April 18, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The No Future Posts WordPress plugin through 1.4 does not escape its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - No Future Posts** Affected versions: - 1.4 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347) ### Credits - Vinay Varma Mudunuri - Krishna Harsha Kondaveeti
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8927, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8927 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8927 - **State**: PUBLISHED - **Published Date**: June 14, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 17:34 UTC - **Reserved Date**: March 22, 2018 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Improper authorization vulnerability in SYNO.Cal.Event in Calendar before 2.1.2-0511 allows remote authenticated users to create arbitrary events via the (1) cal_id or (2) original_cal_id parameter. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Synology - Calendar** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/en-global/support/security/Synology_SA_18_16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21176 - **State**: PUBLISHED - **Published Date**: February 18, 2022 at 17:50 UTC - **Last Updated**: April 16, 2025 at 16:45 UTC - **Reserved Date**: January 21, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input, which may allow an attacker to perform a SQL injection and obtain sensitive information. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Airspan Networks - MMP** Affected versions: - unspecified (Status: affected) **Airspan Networks - PTP C-series** Affected versions: - unspecified (Status: affected) **Airspan Networks - PTMP C-series and A5x** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-034-02) ### Credits - Noam Moshe of Claroty reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33611 - **State**: PUBLISHED - **Published Date**: November 02, 2021 at 10:06 UTC - **Last Updated**: September 17, 2024 at 02:32 UTC - **Reserved Date**: May 27, 2021 at 00:00 UTC - **Assigned By**: Vaadin ### Vulnerability Description Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Vaadin - Vaadin** Affected versions: - 14.0.0 (Status: affected) - unspecified (Status: affected) **Vaadin - vaadin-menu-bar** Affected versions: - 1.0.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://vaadin.com/security/cve-2021-33611) 2. [](https://github.com/vaadin/vaadin-menu-bar/pull/126)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3293 - **State**: PUBLISHED - **Published Date**: July 24, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 09:37 UTC - **Reserved Date**: July 24, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in download.php in EZWebAlbum allows remote attackers to read arbitrary files via the dlfilename parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080720 EZWebAlbum (dlfilename) Remote File Disclosure Vulnerability](http://www.securityfocus.com/archive/1/494573/100/0/threaded) 2. [ezwebalbum-download-file-disclosure(43920)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43920) 3. [4034](http://securityreason.com/securityalert/4034) 4. [6112](https://www.exploit-db.com/exploits/6112) 5. [30311](http://www.securityfocus.com/bid/30311) 6. [ADV-2008-2160](http://www.vupen.com/english/advisories/2008/2160/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36582 - **State**: PUBLISHED - **Published Date**: June 17, 2024 at 00:00 UTC - **Last Updated**: August 19, 2024 at 16:55 UTC - **Reserved Date**: May 30, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description alexbinary object-deep-assign 1.0.11 is vulnerable to Prototype Pollution via the extend() method of Module.deepAssign (/src/index.js) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/mestrtee/9fe4d3a862c62ce6b2b0d20d4c5fd346)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18505 - **State**: PUBLISHED - **Published Date**: August 12, 2019 at 15:35 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: August 12, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The twitter-plugin plugin before 2.55 for WordPress has XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/twitter-plugin/#developers)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51846 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 16:31 UTC - **Last Updated**: November 20, 2024 at 15:09 UTC - **Reserved Date**: November 04, 2024 at 09:58 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Simpson Community Yard Sale allows Stored XSS.This issue affects Community Yard Sale: from n/a through 1.1.11. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Michael Simpson - Community Yard Sale** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/community-yard-sale/wordpress-community-yard-sale-plugin-1-1-11-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0866, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0866 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0866 - **State**: PUBLISHED - **Published Date**: March 26, 2024 at 03:08 UTC - **Last Updated**: August 02, 2024 at 16:16 UTC - **Reserved Date**: January 24, 2024 at 17:50 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Check & Log Email plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 1.0.9 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **checkemail - Check & Log Email** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae9307c-680c-43c7-8246-a3e6149c1fb6?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3050794%40check-email&new=3050794%40check-email&sfp_email=&sfph_mail=) ### Credits - Sean Murphy
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4944 - **State**: PUBLISHED - **Published Date**: July 29, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 16:59 UTC - **Reserved Date**: July 29, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [buddypressextfriendshipreq-adminajax-xss(85416)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85416) 2. [54048](http://secunia.com/advisories/54048) 3. [](http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/) 4. [94807](http://osvdb.org/94807)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29546, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29546 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29546 - **State**: PUBLISHED - **Published Date**: April 25, 2022 at 02:54 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HtmlUnit NekoHtml Parser before 2.61.0 suffers from a denial of service vulnerability. Crafted input associated with the parsing of Processing Instruction (PI) data leads to heap memory consumption. This is similar to CVE-2022-28366 but affects a much later version of the product. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5906 - **State**: PUBLISHED - **Published Date**: June 10, 2025 at 00:31 UTC - **Last Updated**: June 10, 2025 at 15:19 UTC - **Reserved Date**: June 09, 2025 at 08:01 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R` ### Weakness Classification (CWE) - CWE-306: Security Weakness - CWE-287: Improper Authentication ### Affected Products **code-projects - Laundry System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-311679 | code-projects Laundry System data missing authentication](https://vuldb.com/?id.311679) 2. [VDB-311679 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.311679) 3. [Submit #592266 | code-projects Laundry System 1.0 Improper Authentication](https://vuldb.com/?submit.592266) 4. [](https://github.com/tuooo/CVE/issues/11) 5. [](https://code-projects.org/) ### Credits - DS_Leo (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1824, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1824 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1824 - **State**: PUBLISHED - **Published Date**: May 25, 2012 at 19:00 UTC - **Last Updated**: September 16, 2024 at 19:19 UTC - **Reserved Date**: March 21, 2012 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Untrusted search path vulnerability in Measuresoft ScadaPro Client before 4.0.0 and ScadaPro Server before 4.0.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.measuresoft.net/downloads/Measuresoft%20SCADA%204.4.6/issue_disks/Client/DOCUMENTATION/ReleaseNotes.doc) 2. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-01.pdf) 3. [](http://www.measuresoft.net/downloads/Measuresoft%20SCADA%204.4.6/issue_disks/Server/DOCUMENTATION/ReleaseNotes.doc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7455 - **State**: PUBLISHED - **Published Date**: April 14, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 05, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20170411 Moxa MXview v2.8 Remote Private Key Disclosure](http://seclists.org/fulldisclosure/2017/Apr/49) 2. [](http://hyp3rlinx.altervista.org/advisories/MOXA-MXVIEW-v2.8-REMOTE-PRIVATE-KEY-DISCLOSURE.txt) 3. [41850](https://www.exploit-db.com/exploits/41850/) 4. [](http://packetstormsecurity.com/files/142074/Moxa-MXview-2.8-Private-Key-Disclosure.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3577 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 18:40 UTC - **Last Updated**: November 13, 2024 at 17:47 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the ingress packet processing path of Cisco Firepower Threat Defense (FTD) Software for interfaces that are configured either as Inline Pair or in Passive mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation when Ethernet frames are processed. An attacker could exploit this vulnerability by sending malicious Ethernet frames through an affected device. A successful exploit could allow the attacker do either of the following: Fill the /ngfw partition on the device: A full /ngfw partition could result in administrators being unable to log in to the device (including logging in through the console port) or the device being unable to boot up correctly. Note: Manual intervention is required to recover from this situation. Customers are advised to contact the Cisco Technical Assistance Center (TAC) to help recover a device in this condition. Cause a process crash: The process crash would cause the device to reload. No manual intervention is necessary to recover the device after the reload. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Cisco - Cisco Firepower Threat Defense Software** Affected versions: - n/a (Status: affected) ### References 1. [20201021 Cisco Firepower Threat Defense Software Inline Pair/Passive Mode Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-inline-dos-nXqUyEqM)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6979 - **State**: PUBLISHED - **Published Date**: December 23, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 17:53 UTC - **Reserved Date**: December 05, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The VTY authentication implementation in Cisco IOS XE 03.02.xxSE and 03.03.xxSE incorrectly relies on the Linux-IOS internal-network configuration, which allows remote attackers to bypass authentication by leveraging access to a 192.168.x.2 source IP address, aka Bug ID CSCuj90227. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cisco-iosxe-cve20136979-sec-bypass(89901)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89901) 2. [1029537](http://www.securitytracker.com/id/1029537) 3. [101351](http://osvdb.org/101351) 4. [64502](http://www.securityfocus.com/bid/64502) 5. [20131223 Cisco IOS XE Software Telnet Authentication Bypass Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6979)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50837, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50837 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50837 - **State**: PUBLISHED - **Published Date**: December 29, 2023 at 11:43 UTC - **Last Updated**: August 02, 2024 at 22:23 UTC - **Reserved Date**: December 14, 2023 at 17:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown – Protect Login Form.This issue affects Login Lockdown – Protect Login Form: from n/a through 2.06. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **WebFactory Ltd - Login Lockdown – Protect Login Form** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/login-lockdown/wordpress-login-lockdown-protect-login-form-plugin-2-06-sql-injection-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31247 - **State**: PUBLISHED - **Published Date**: April 10, 2024 at 15:50 UTC - **Last Updated**: August 02, 2024 at 01:46 UTC - **Reserved Date**: March 29, 2024 at 16:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Insertion of Sensitive Information into Log File vulnerability in Frédéric GILLES FG Drupal to WordPress.This issue affects FG Drupal to WordPress: from n/a through 3.70.3. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Frédéric GILLES - FG Drupal to WordPress** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/fg-drupal-to-wp/wordpress-fg-drupal-to-wordpress-plugin-3-70-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve) ### Credits - Yudistira Arya (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3819, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3819 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3819 - **State**: PUBLISHED - **Published Date**: October 04, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:21 UTC - **Reserved Date**: June 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack consumption vulnerability in dartwebserver.dll 1.9 and earlier, as used in Dart PowerTCP WebServer for ActiveX and other products, allows remote attackers to cause a denial of service (daemon crash) via a long request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120928 CVE-2012-3819: Stack Overflow in DartWebserver.dll <= 1.9](http://www.securityfocus.com/archive/1/524273) 2. [](http://sadgeeksinsnow.blogspot.dk/2012/09/my-first-experiences-bug-hunting-part-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0508 - **State**: PUBLISHED - **Published Date**: January 21, 2016 at 02:00 UTC - **Last Updated**: August 05, 2024 at 22:22 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle iLearning component in Oracle iLearning 6.0 and 6.1 allows remote attackers to affect integrity via unknown vectors related to Learner Administration. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1034717](http://www.securitytracker.com/id/1034717) 2. [](http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0105 - **State**: PUBLISHED - **Published Date**: August 18, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: February 26, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ServerMask 2.2 and earlier does not obfuscate (1) ETag, (2) HTTP Status Message, or (3) Allow HTTP responses, which could tell remote attackers that the web server is an IIS server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [servermask-header-obtain-info(16947)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16947) 2. [](http://www.corsaire.com/advisories/c030224-001.txt) 3. [20040810 Corsaire Security Advisory - Port80 Software ServerMask inconsistencies](http://marc.info/?l=bugtraq&m=109215441332682&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1436 - **State**: PUBLISHED - **Published Date**: April 27, 2009 at 17:43 UTC - **Last Updated**: August 07, 2024 at 05:13 UTC - **Reserved Date**: April 27, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The db interface in libc in FreeBSD 6.3, 6.4, 7.0, 7.1, and 7.2-PRERELEASE does not properly initialize memory for Berkeley DB 1.85 database structures, which allows local users to obtain sensitive information by reading a database file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34666](http://www.securityfocus.com/bid/34666) 2. [53918](http://osvdb.org/53918) 3. [FreeBSD-SA-09:07](http://security.freebsd.org/advisories/FreeBSD-SA-09:07.libc.asc) 4. [34810](http://secunia.com/advisories/34810) 5. [1022113](http://www.securitytracker.com/id?1022113) 6. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10756)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5468 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 15:04 UTC - **Reserved Date**: January 13, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description An issue with incorrect ownership model of "privateBrowsing" information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. This vulnerability affects Firefox < 53. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1329521) 2. [](https://www.mozilla.org/security/advisories/mfsa2017-10/) 3. [97940](http://www.securityfocus.com/bid/97940) 4. [1038320](http://www.securitytracker.com/id/1038320)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14930 - **State**: PUBLISHED - **Published Date**: June 19, 2020 at 20:50 UTC - **Last Updated**: August 04, 2024 at 13:00 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in BT CTROMS Terminal OS Port Portal CT-464. Account takeover can occur because the password-reset feature discloses the verification token. Upon a getverificationcode.jsp request, this token is transmitted not only to the registered phone number of the user account, but is also transmitted to the unauthenticated HTTP client. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.exploit-db.com/exploits/48196) 2. [](https://www.pentest.com.tr/exploits/CTROMS-Terminal-OS-Port-Portal-Password-Reset-Authentication-Bypass.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4556 - **State**: PUBLISHED - **Published Date**: October 14, 2008 at 22:00 UTC - **Last Updated**: August 07, 2024 at 10:17 UTC - **Reserved Date**: October 14, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the adm_build_path function in sadmind in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2008-2824](http://www.vupen.com/english/advisories/2008/2824) 2. [32283](http://secunia.com/advisories/32283) 3. [sunsolstice-adminsuite-admbuildpath-bo(45858)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45858) 4. [245806](http://sunsolve.sun.com/search/document.do?assetkey=1-26-245806-1) 5. [6786](https://www.exploit-db.com/exploits/6786) 6. [oval:org.mitre.oval:def:5543](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5543) 7. [](http://support.avaya.com/elmodocs2/security/ASA-2008-448.htm) 8. [1021059](http://www.securitytracker.com/id?1021059) 9. [31751](http://www.securityfocus.com/bid/31751) 10. [](http://risesecurity.org/advisories/RISE-2008001.txt) 11. [50019](http://osvdb.org/50019) 12. [4408](http://securityreason.com/securityalert/4408) 13. [20081014 [RISE-2008001] Sun Solstice AdminSuite sadmind adm_build_path()Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/497311/100/0/threaded) 14. [32812](http://secunia.com/advisories/32812) 15. [ADV-2008-3230](http://www.vupen.com/english/advisories/2008/3230)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0390 - **State**: PUBLISHED - **Published Date**: January 12, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 13:03 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A denial of service vulnerability in Tremolo/dpen.s in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31647370. ### Affected Products **Google Inc. - Android** Affected versions: - Android-4.4.4 (Status: affected) - Android-5.0.2 (Status: affected) - Android-5.1.1 (Status: affected) - Android-6.0 (Status: affected) - Android-6.0.1 (Status: affected) - Android-7.0 (Status: affected) - Android-7.1.1 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-01-01.html) 2. [95230](http://www.securityfocus.com/bid/95230) 3. [](https://android.googlesource.com/platform/external/tremolo/+/5dc99237d49e73c27d3eca54f6ccd97d13f94de0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15622 - **State**: PUBLISHED - **Published Date**: July 28, 2020 at 17:01 UTC - **Last Updated**: August 04, 2024 at 13:22 UTC - **Reserved Date**: July 07, 2020 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mail_autoreply.php. When parsing the search parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9712. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **CentOS Web Panel - CentOS Web Panel** Affected versions: - cwp-e17.0.9.8.923 (Status: affected) ### References 1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-769/) ### Credits - @PaulosYibelo & CasperTea
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3238 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 01:00 UTC - **Last Updated**: October 02, 2024 at 19:32 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 6.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N). ### Affected Products **Oracle Corporation - WebCenter Sites** Affected versions: - 11.1.1.8.0 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) 2. [105640](http://www.securityfocus.com/bid/105640)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2306 - **State**: PUBLISHED - **Published Date**: April 26, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 13:33 UTC - **Reserved Date**: April 26, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Virtual War (VWar) 1.5.0 R15 and earlier module for PHP-Nuke, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) memberlist parameter to extra/login.php and the (2) title parameter to extra/today.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [vwar-login-today-xss(33647)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33647) 2. [23478](http://www.securityfocus.com/bid/23478) 3. [20070413 [waraxe-2007-SA#048] - Multiple vulnerabilities in Virtual War 1.5 module for PhpNuke](http://www.securityfocus.com/archive/1/465612/100/0/threaded) 4. [2642](http://securityreason.com/securityalert/2642) 5. [](http://www.waraxe.us/advisory-48.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51725, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51725 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51725 - **State**: PUBLISHED - **Published Date**: January 17, 2024 at 06:57 UTC - **Last Updated**: June 02, 2025 at 15:06 UTC - **Reserved Date**: December 22, 2023 at 09:53 UTC - **Assigned By**: CERT-In ### Vulnerability Description This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Contact Email Address parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system. ### CVSS Metrics - **CVSS Base Score**: 6.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Hathway - Skyworth Router CM5100** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013) ### Credits - This vulnerability is reported by Sushant Mane, Parul Sindhwad, Tushar Nagrare and Dr. Faruk Kazi from CoE-CNDS Lab, VJTI Mumbai, India.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3749 - **State**: PUBLISHED - **Published Date**: May 15, 2024 at 06:00 UTC - **Last Updated**: August 01, 2024 at 20:20 UTC - **Reserved Date**: April 12, 2024 at 20:26 UTC - **Assigned By**: WPScan ### Vulnerability Description The SP Project & Document Manager WordPress plugin through 4.71 lacks proper access controllers and allows a logged in user to view and download files belonging to another user ### Weakness Classification (CWE) - CWE-639 Authorization Bypass Through User-Controlled Key: Security Weakness ### Affected Products **Unknown - SP Project & Document Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/) ### Credits - fewwords - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52769 - **State**: PUBLISHED - **Published Date**: November 20, 2024 at 00:00 UTC - **Last Updated**: November 29, 2024 at 21:05 UTC - **Reserved Date**: November 15, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in the component /admin/friendlink_edit of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/DedeBIZ/DedeV6/) 2. [](https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2193 - **State**: PUBLISHED - **Published Date**: May 29, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 15:27 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Apache HBase 0.92.x before 0.92.3 and 0.94.x before 0.94.9, when the Kerberos features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html) 2. [96615](http://osvdb.org/96615) 3. [20130823 CVE-2013-2193: Apache HBase Man in the Middle Vulnerability](http://seclists.org/fulldisclosure/2013/Aug/250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10049 - **State**: PUBLISHED - **Published Date**: May 31, 2019 at 21:17 UTC - **Last Updated**: August 04, 2024 at 22:10 UTC - **Reserved Date**: March 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.secureauth.com/labs/advisories)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14808 - **State**: PUBLISHED - **Published Date**: October 01, 2018 at 16:00 UTC - **Last Updated**: September 17, 2024 at 03:54 UTC - **Reserved Date**: August 01, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Emerson AMS Device Manager v12.0 to v13.5. Non-administrative users are able to change executable and library files on the affected products. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Emerson - AMS Device Manager** Affected versions: - v12.0 to v13.5 (Status: affected) ### References 1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-270-01) 2. [105406](http://www.securityfocus.com/bid/105406)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20454 - **State**: PUBLISHED - **Published Date**: December 25, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 22:21 UTC - **Reserved Date**: December 25, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in 74cms v4.2.111. upload/index.php?c=resume&a=resume_list has XSS via the key parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/coolboy0816/audit/issues/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0736, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0736 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0736 - **State**: PUBLISHED - **Published Date**: May 03, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 17, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1 does not properly create scan jobs, which allows remote attackers to execute arbitrary code via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ae-platformauth-code-execution(74559)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74559) 2. [48967](http://secunia.com/advisories/48967) 3. [](http://www.ibm.com/support/docview.wss?uid=swg21592188) 4. [48968](http://secunia.com/advisories/48968) 5. [53247](http://www.securityfocus.com/bid/53247)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1205 - **State**: PUBLISHED - **Published Date**: March 27, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 17:33 UTC - **Reserved Date**: December 06, 2017 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell EMC ScaleIO, versions prior to 2.5, do not properly handle some packet data in the MDM service. As a result, a remote attacker could potentially send specifically crafted packet data to the MDM service causing it to crash. ### Affected Products **Dell EMC - ScaleIO** Affected versions: - versions prior to 2.5 (Status: affected) ### References 1. [20180326 DSA-2018-058: Dell EMC ScaleIO Multiple Security Vulnerabilities](http://seclists.org/fulldisclosure/2018/Mar/59)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5656 - **State**: PUBLISHED - **Published Date**: January 07, 2020 at 16:35 UTC - **Last Updated**: August 06, 2024 at 17:15 UTC - **Reserved Date**: August 30, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FuzeZip 1.0.0.131625 has a Local Buffer Overflow vulnerability ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://realpentesting.blogspot.com.es/p/advisories.html) 2. [](http://www.exploit-db.com/exploits/25130) 3. [](http://seclists.org/fulldisclosure/2013/Sep/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1774, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1774 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1774 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 01, 2024 at 18:48 UTC - **Reserved Date**: February 22, 2024 at 18:27 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Customily Product Personalizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via user cookies in all versions up to, and including, 1.23.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. We unfortunately could not get in touch with the vendor through various means to disclose this issue. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **Customily - Customily Product Personalizer** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0f8aa38b-85c5-45a7-b5cd-9ecd43a3c340?source=cve) 2. [](https://www.customily.com/woocommerce) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2469 - **State**: PUBLISHED - **Published Date**: June 18, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 15:36 UTC - **Reserved Date**: March 05, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2013:1060](http://rhn.redhat.com/errata/RHSA-2013-1060.html) 2. [HPSBUX02908](http://marc.info/?l=bugtraq&m=137545592101387&w=2) 3. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414) 4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 5. [oval:org.mitre.oval:def:19713](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19713) 6. [](http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html) 7. [SUSE-SU-2013:1264](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html) 8. [SUSE-SU-2013:1257](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html) 9. [HPSBUX02907](http://marc.info/?l=bugtraq&m=137545505800971&w=2) 10. [SUSE-SU-2013:1256](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html) 11. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=975120) 12. [54154](http://secunia.com/advisories/54154) 13. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html) 14. [SSRT101305](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880) 15. [HPSBUX02922](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880) 16. [60658](http://www.securityfocus.com/bid/60658) 17. [SUSE-SU-2013:1263](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html) 18. [RHSA-2013:1059](http://rhn.redhat.com/errata/RHSA-2013-1059.html) 19. [oval:org.mitre.oval:def:19552](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19552) 20. [oval:org.mitre.oval:def:19314](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19314) 21. [SUSE-SU-2013:1293](http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html) 22. [RHSA-2013:1081](http://rhn.redhat.com/errata/RHSA-2013-1081.html) 23. [TA13-169A](http://www.us-cert.gov/ncas/alerts/TA13-169A) 24. [](http://advisories.mageia.org/MGASA-2013-0185.html) 25. [RHSA-2013:0963](http://rhn.redhat.com/errata/RHSA-2013-0963.html) 26. [](http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176) 27. [SUSE-SU-2013:1255](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html) 28. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html) 29. [MDVSA-2013:183](http://www.mandriva.com/security/advisories?name=MDVSA-2013:183) 30. [](http://www-01.ibm.com/support/docview.wss?uid=swg21642336) 31. [SUSE-SU-2013:1305](http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html) 32. [oval:org.mitre.oval:def:17042](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17042)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52293 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 16:04 UTC - **Last Updated**: November 13, 2024 at 18:56 UTC - **Reserved Date**: November 06, 2024 at 19:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **craftcms - cms** Affected versions: - >= 4.0.0-RC1, < 4.12.2 (Status: affected) - >= 5.0.0-RC1, < 5.4.3 (Status: affected) ### References 1. [https://github.com/craftcms/cms/security/advisories/GHSA-f3cw-hg6r-chfv](https://github.com/craftcms/cms/security/advisories/GHSA-f3cw-hg6r-chfv) 2. [https://github.com/craftcms/cms/commit/123e48a696de1e2f63ab519d4730eb3b87beaa58](https://github.com/craftcms/cms/commit/123e48a696de1e2f63ab519d4730eb3b87beaa58)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2064 - **State**: PUBLISHED - **Published Date**: April 27, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 26, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the libpkcs11 library in Sun Solaris 10 might allow local users to gain privileges or cause a denial of service (application failure) via unknown attack vectors that involve the getpwnam family of non-reentrant functions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [solaris-libpkcs11-privilege-escalation(26075)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26075) 2. [102316](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102316-1) 3. [17687](http://www.securityfocus.com/bid/17687) 4. [ADV-2006-1504](http://www.vupen.com/english/advisories/2006/1504) 5. [19789](http://secunia.com/advisories/19789) 6. [1015987](http://securitytracker.com/id?1015987)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29017 - **State**: PUBLISHED - **Published Date**: April 06, 2023 at 19:18 UTC - **Last Updated**: February 10, 2025 at 16:10 UTC - **Reserved Date**: March 29, 2023 at 17:39 UTC - **Assigned By**: GitHub_M ### Vulnerability Description vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.15 of vm2. There are no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-913: Security Weakness ### Affected Products **patriksimek - vm2** Affected versions: - < 3.9.15 (Status: affected) ### References 1. [https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv](https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv) 2. [https://github.com/patriksimek/vm2/issues/515](https://github.com/patriksimek/vm2/issues/515) 3. [https://github.com/patriksimek/vm2/commit/d534e5785f38307b70d3aac1945260a261a94d50](https://github.com/patriksimek/vm2/commit/d534e5785f38307b70d3aac1945260a261a94d50) 4. [https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d](https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4818 - **State**: PUBLISHED - **Published Date**: April 20, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 00:39 UTC - **Reserved Date**: May 17, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description DMMFX Trade for Android 1.5.0 and earlier, DMMFX DEMO Trade for Android 1.5.0 and earlier, and GAITAMEJAPAN FX Trade for Android 1.4.0 and earlier do not verify SSL certificates. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.gaitamejapan.com/support/news/2016/2016053001/) 2. [JVNDB-2016-000092](http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000092.html) 3. [JVN#40898764](http://jvn.jp/en/jp/JVN40898764/index.html) 4. [](http://fx.dmm.com/information/press/2016/2016053001/) 5. [](https://jvn.jp/en/jp/JVN40898764/995849/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10420 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:04 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php by adding a question mark (?) followed by the payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=137#uxss) 2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0846 - **State**: PUBLISHED - **Published Date**: February 20, 2008 at 21:00 UTC - **Last Updated**: September 16, 2024 at 19:15 UTC - **Reserved Date**: February 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in the com_profile component for Joomla! allows remote attackers to execute arbitrary SQL commands via the oid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080216 joomla SQL Injection(com_profile)](http://marc.info/?l=bugtraq&m=120335361520072&w=2) 2. [27851](http://www.securityfocus.com/bid/27851)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1978 - **State**: REJECTED - **Published Date**: January 05, 2018 at 14:00 UTC - **Last Updated**: January 05, 2018 at 13:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30767 - **State**: PUBLISHED - **Published Date**: May 16, 2022 at 02:13 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96) 2. [](https://lists.denx.de/pipermail/u-boot/2022-May/483952.html) 3. [](https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/) 4. [FEDORA-2022-61cf1c64f6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/) 5. [](https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-7391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-7391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-7391 - **State**: PUBLISHED - **Published Date**: July 19, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 18:09 UTC - **Reserved Date**: July 19, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Entity API module 7.x-1.x before 7.x-1.2 for Drupal, when using the (a) Views field or (b) area plugins, allows remote attackers to read restricted entities via the (1) field, (2) header, or (3) footer of a View. NOTE: this identifier was SPLIT from CVE-2013-4273 per ADT5 due to different researcher organizations. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20130822 Re: CVE request for Drupal contributed modules](http://www.openwall.com/lists/oss-security/2013/08/22/2) 2. [](https://drupal.org/node/2065207) 3. [](https://drupal.org/node/2065197)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22000 - **State**: PUBLISHED - **Published Date**: July 13, 2021 at 18:01 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Thinapp version 5.x prior to 5.2.10 contain a DLL hijacking vulnerability due to insecure loading of DLLs. A malicious actor with non-administrative privileges may exploit this vulnerability to elevate privileges to administrator level on the Windows operating system having VMware ThinApp installed on it. ### Affected Products **n/a - Vmware Thinapp** Affected versions: - VMware Thinapp 5.x prior to 5.2.10 (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2021-0015.html) 2. [20210716 VMware ThinApp DLL hijacking vulnerability](http://seclists.org/fulldisclosure/2021/Jul/35) 3. [](http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26841 - **State**: REJECTED - **Last Updated**: October 13, 2022 at 00:00 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28066, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28066 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28066 - **State**: PUBLISHED - **Published Date**: April 08, 2024 at 00:00 UTC - **Last Updated**: August 15, 2024 at 14:44 UTC - **Reserved Date**: March 01, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Unify CP IP Phone firmware 1.10.4.3, Weak Credentials are used (a hardcoded root password). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://syss.de) 2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17276 - **State**: PUBLISHED - **Published Date**: March 24, 2020 at 17:44 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 07, 2019 at 00:00 UTC - **Assigned By**: netapp ### Vulnerability Description OnCommand System Manager versions 9.3 prior to 9.3P18 and 9.4 prior to 9.4P2 are susceptible to a cross site scripting vulnerability that could allow an authenticated attacker to inject arbitrary scripts into the SNMP Community Names label field. ### Affected Products **n/a - OnCommand System Manager 9.x** Affected versions: - 9.3 prior to 9.3P18 and 9.4 prior to 9.4P2 (Status: affected) ### References 1. [](https://security.netapp.com/advisory/ntap-20200323-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32892 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 21:01 UTC - **Last Updated**: March 13, 2025 at 19:35 UTC - **Reserved Date**: April 19, 2024 at 14:16 UTC - **Assigned By**: Google_Devices ### Vulnerability Description In handle_init of goodix/main/main.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. ### Affected Products **Google - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2024-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55556 - **State**: PUBLISHED - **Published Date**: January 07, 2025 at 00:00 UTC - **Last Updated**: January 08, 2025 at 19:24 UTC - **Reserved Date**: December 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.synacktiv.com/) 2. [](https://github.com/crater-invoice/crater) 3. [](https://www.synacktiv.com/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0454 - **State**: PUBLISHED - **Published Date**: March 26, 2013 at 21:00 UTC - **Last Updated**: August 06, 2024 at 14:25 UTC - **Reserved Date**: December 16, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [storwize-cifs-incorrect-permissions(80970)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80970) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=928419) 3. [USN-1802-1](http://www.ubuntu.com/usn/USN-1802-1) 4. [](http://www.ibm.com/support/docview.wss?uid=ssg1S1004289) 5. [](https://www.samba.org/samba/security/CVE-2013-0454) 6. [](https://bugzilla.samba.org/show_bug.cgi?id=8738) 7. [[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download](https://lists.samba.org/archive/samba-announce/2012/000259.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1167 - **State**: PUBLISHED - **Published Date**: July 19, 2019 at 14:34 UTC - **Last Updated**: August 04, 2024 at 18:06 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'. ### Affected Products **Microsoft - PowerShell Core** Affected versions: - 6.1 (Status: affected) - 6.2 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4576 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 06:31 UTC - **Last Updated**: October 27, 2024 at 21:52 UTC - **Reserved Date**: May 06, 2024 at 22:07 UTC - **Assigned By**: tibco ### Vulnerability Description The component listed above contains a vulnerability that allows an attacker to traverse directories and access sensitive files, leading to unauthorized disclosure of system configuration and potentially sensitive information. ### Affected Products **Tibco - EBX** Affected versions: - 5 (Status: affected) - 6 (Status: affected) ### References 1. [](https://community.tibco.com/advisories/tibco-security-advisory-june-11-2024-tibco-ebx-cve-2024-4576-r215/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0059 - **State**: PUBLISHED - **Published Date**: May 19, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 16:18 UTC - **Reserved Date**: January 01, 2006 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Heap-based buffer overflow in the ISO Transport Service over TCP (RFC 1006) implementation of LiveData ICCP Server before 5.00.035 allows remote attackers to cause a denial of service or execute arbitrary code via malformed packets. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016113](http://securitytracker.com/id?1016113) 2. [](http://www.digitalbond.com/SCADA_Blog/2006/05/us-cert-livedata-iccp-vulnerability.html) 3. [ADV-2006-1830](http://www.vupen.com/english/advisories/2006/1830) 4. [livedata-iccp-rfc1006-bo(26490)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26490) 5. [20146](http://secunia.com/advisories/20146) 6. [VU#190617](http://www.kb.cert.org/vuls/id/190617) 7. [](http://www.kb.cert.org/vuls/id/JGEI-6MMS9T) 8. [18010](http://www.securityfocus.com/bid/18010)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5534 - **State**: PUBLISHED - **Published Date**: December 03, 2012 at 21:00 UTC - **Last Updated**: August 06, 2024 at 21:05 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.savannah.gnu.org/gitweb/?p=weechat.git%3Ba=commitdiff_plain%3Bh=efb795c74fe954b9544074aafcebb1be4452b03a) 2. [51294](http://secunia.com/advisories/51294) 3. [51377](http://secunia.com/advisories/51377) 4. [openSUSE-SU-2013:0150](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00018.html) 5. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0347) 6. [openSUSE-SU-2012:1580](http://lists.opensuse.org/opensuse-updates/2012-11/msg00087.html) 7. [56584](http://www.securityfocus.com/bid/56584) 8. [FEDORA-2012-18575](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093516.html) 9. [](http://weechat.org/security/) 10. [FEDORA-2012-18526](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093495.html) 11. [[oss-security] 20121119 Re: Fwd: [[Weechat-security] Security vulnerability in WeeChat 0.3.0 -> 0.3.9.1]](http://www.openwall.com/lists/oss-security/2012/11/19/4) 12. [](https://savannah.nongnu.org/bugs/?37764) 13. [MDVSA-2013:136](http://www.mandriva.com/security/advisories?name=MDVSA-2013:136) 14. [FEDORA-2012-18494](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093260.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4007 - **State**: PUBLISHED - **Published Date**: April 17, 2019 at 14:15 UTC - **Last Updated**: August 05, 2024 at 04:57 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the deleteConfig functionality. The program is able to delete any protected file on the system. An attacker would need local access to the machine to successfully exploit the bug. ### Affected Products **n/a - Shimo VPN** Affected versions: - Shimo VPN 4.1.5.1 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0676)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1416 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 13:03 UTC - **Last Updated**: May 21, 2025 at 13:31 UTC - **Reserved Date**: February 18, 2025 at 13:43 UTC - **Assigned By**: CERT-PL ### Vulnerability Description In Proget MDM, a low-privileged user can retrieve passwords for managed devices and subsequently use functionalities restricted by the MDM (Mobile Device Management). For it to happen, they must know the UUIDs of targetted devices, which might be obtained by exploiting CVE-2025-1415 or CVE-2025-1417. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite). ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Proget - Proget** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.pl/en/posts/2025/05/CVE-2025-1415) 2. [](https://proget.pl/en/mobile-device-management/) ### Credits - Marcin Węgłowski (AFINE)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5139 - **State**: PUBLISHED - **Published Date**: September 28, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: September 28, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in admin/include/header.php in chupix 0.2.3, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the repertoire parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4462](https://www.exploit-db.com/exploits/4462) 2. [25835](http://www.securityfocus.com/bid/25835) 3. [chupix-header-file-include(36829)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36829)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6825, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6825 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6825 - **State**: PUBLISHED - **Published Date**: September 07, 2016 at 19:00 UTC - **Last Updated**: August 06, 2024 at 01:43 UTC - **Reserved Date**: August 16, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software before V100R003C00SPC610, RH1288 V3 servers with software before V100R003C00SPC613, RH2288 V3 servers with software before V100R003C00SPC617, and RH2288H V3 servers with software before V100R003C00SPC515 allow remote attackers to obtain passwords via a brute-force attack, related to "lack of authentication protection mechanisms." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160817-01-server-en) 2. [92504](http://www.securityfocus.com/bid/92504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7867, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7867 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7867 - **State**: PUBLISHED - **Published Date**: October 27, 2021 at 00:43 UTC - **Last Updated**: August 04, 2024 at 09:41 UTC - **Reserved Date**: January 22, 2020 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description An improper input validation vulnerability in Helpu solution could allow a local attacker to arbitrary file creation and execution without click file transfer menu. It is possible to file in arbitrary directory for user because the viewer program receive the file from agent with privilege of administrator. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **HelpU - HelpuViewer.exe** Affected versions: - 2018.5.21.0 (Status: affected) ### References 1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36303)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3945, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3945 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3945 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33780 - **State**: PUBLISHED - **Published Date**: May 07, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:36 UTC - **Reserved Date**: April 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::copyOut at /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf-3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35034 - **State**: PUBLISHED - **Published Date**: June 12, 2023 at 00:00 UTC - **Last Updated**: January 06, 2025 at 17:16 UTC - **Reserved Date**: June 12, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow remote code execution by unauthenticated users, aka OSFOURK-24033. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://networks.unify.com/security/advisories/OBSO-2305-01.pdf) 2. [](https://www.news.de/technik/856882353/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-bekannte-schwachstellen-und-sicherheitsluecken/1/)