System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5367
- **State**: PUBLISHED
- **Published Date**: May 26, 2024 at 15:00 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 25, 2024 at 06:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Kashipara College Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file each_extracurricula_activities.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266279.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Kashipara - College Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-266279 | Kashipara College Management System each_extracurricula_activities.php cross site scripting](https://vuldb.com/?id.266279)
2. [VDB-266279 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.266279)
3. [Submit #343447 | Kashipara College Management System ≤1.0 XSS injection](https://vuldb.com/?submit.343447)
4. [](https://github.com/E1CHO/cve_hub/blob/main/College%20Management%20System%20-%20xss/College%20Management%20System%20-%20vuln%201.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1245
- **State**: PUBLISHED
- **Published Date**: May 16, 2013 at 01:00 UTC
- **Last Updated**: September 17, 2024 at 02:17 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The user-management page in Cisco WebEx Social relies on client-side validation of values in the Screen Name, First Name, Middle Name, Last Name, Email Address, and Job Title fields, which allows remote authenticated users to bypass intended access restrictions via crafted requests, aka Bug ID CSCue67190.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130514 WebEx Social Client-Side Restriction Bypass Attribute Change Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0776
- **State**: PUBLISHED
- **Published Date**: April 09, 2019 at 02:08 UTC
- **Last Updated**: August 04, 2024 at 17:58 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1709 (Core Installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11231
- **State**: PUBLISHED
- **Published Date**: April 07, 2021 at 07:55 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Two threads call one or both functions concurrently leading to corruption of pointers and reference counters which in turn can lead to heap corruption in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- APQ8017, APQ8053, AQT1000, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM6150L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM8937, PM8953, PMI632, PMI8937, PMI8952, PMK7350, PMK8002, PMK8350, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCM4290, QCM6125, QCS4290, QCS610, QCS6125, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2550, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4360, QPA4361, QPA5461 ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28606
- **State**: PUBLISHED
- **Published Date**: March 18, 2023 at 00:00 UTC
- **Last Updated**: February 26, 2025 at 19:04 UTC
- **Reserved Date**: March 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
js/event-graph.js in MISP before 2.4.169 allows XSS via event-graph node tooltips.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MISP/MISP/commit/30255b8d683df4ec54f856282b3bde9106d5ae1a)
2. [](https://github.com/MISP/MISP/compare/v2.4.168...v2.4.169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6715
- **State**: PUBLISHED
- **Published Date**: April 17, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: April 17, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox allows remote attackers to cause a denial of service (crash) via crafted image, as demonstrated by the zzuf lol-firefox.gif test case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44727](http://osvdb.org/44727)
2. [](http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities)
3. [](http://sam.zoy.org/zzuf/)
4. [27243](http://www.securityfocus.com/bid/27243)
5. [](http://hboeck.de/archives/578-How-long-does-it-take-to-fix-a-crash-bug.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34946
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 12:44 UTC
- **Last Updated**: February 13, 2025 at 15:53 UTC
- **Reserved Date**: May 09, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/DhcpListClient.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://palm-vertebra-fe9.notion.site/fromDhcpListClient_page-c9ee71f670534555a5ef2d99320da48e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3675
- **State**: PUBLISHED
- **Published Date**: July 28, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Password Safe 2.11, 2.16 and 3.0BETA1 does not respect the configuration settings for locking the password database when certain dialogue windows are open, which might allow attackers with physical access to obtain the database contents.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19078](http://www.securityfocus.com/bid/19078)
2. [1016565](http://securitytracker.com/id?1016565)
3. [1308](http://securityreason.com/securityalert/1308)
4. [](http://www.symantec.com/enterprise/research/SYMSA-2006-008.txt)
5. [passwordsafe-lock-weak-security(27933)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27933)
6. [20060721 SYMSA-2006-008:Password Safe - Lock Password Database Configuration Not Enforced](http://www.securityfocus.com/archive/1/441040/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3278
- **State**: PUBLISHED
- **Published Date**: October 01, 2013 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: April 26, 2013 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC VPLEX before VPLEX GeoSynchrony 5.2 SP1 uses cleartext for storage of the LDAP/AD bind password, which allows local users to obtain sensitive information by reading the management-server configuration file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130926 ESA-2013-060: EMC VPLEX Information Disclosure Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2013-09/0135.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20806
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: May 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2)
2. [](https://github.com/torvalds/linux/commit/2e7682ebfc750177a4944eeb56e97a3f05734528)
3. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e7682ebfc750177a4944eeb56e97a3f05734528)
4. [[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html)
5. [DSA-4698](https://www.debian.org/security/2020/dsa-4698)
6. [openSUSE-SU-2020:0801](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html)
7. [](https://security.netapp.com/advisory/ntap-20200619-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6580
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5891
- **State**: PUBLISHED
- **Published Date**: May 10, 2017 at 05:14 UTC
- **Last Updated**: August 05, 2024 at 15:11 UTC
- **Reserved Date**: February 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ASUS RT-AC* and RT-N* devices with firmware before 3.0.0.4.380.7378 have Login Page CSRF and Save Settings CSRF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/)
2. [](https://www.asus.com/support/Download/11/2/0/161/45/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31176, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31176 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31176
- **State**: PUBLISHED
- **Published Date**: September 02, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 17:32 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**grafana - grafana-image-renderer**
Affected versions:
- < 3.6.0 (Status: affected)
### References
1. [](https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5)
2. [](https://github.com/grafana/grafana-image-renderer/pull/364)
3. [](https://security.netapp.com/advisory/ntap-20221209-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3859
- **State**: PUBLISHED
- **Published Date**: March 20, 2019 at 21:18 UTC
- **Last Updated**: August 04, 2024 at 19:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**The libssh2 Project - libssh2**
Affected versions:
- 1.8.1 (Status: affected)
### References
1. [[oss-security] 20190318 [SECURITY ADVISORIES] libssh2](http://www.openwall.com/lists/oss-security/2019/03/18/3)
2. [20190319 [slackware-security] libssh2 (SSA:2019-077-01)](https://seclists.org/bugtraq/2019/Mar/25)
3. [](https://www.libssh2.org/CVE-2019-3859.html)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859)
5. [](http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html)
6. [107485](http://www.securityfocus.com/bid/107485)
7. [FEDORA-2019-f31c14682f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/)
8. [](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767)
9. [[debian-lts-announce] 20190326 [SECURITY] [DLA 1730-1] libssh2 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html)
10. [](https://security.netapp.com/advisory/ntap-20190327-0005/)
11. [openSUSE-SU-2019:1075](http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html)
12. [[debian-lts-announce] 20190402 [SECURITY] [DLA 1730-2] libssh2 regression update](https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html)
13. [openSUSE-SU-2019:1109](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html)
14. [FEDORA-2019-3348cb4934](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/)
15. [DSA-4431](https://www.debian.org/security/2019/dsa-4431)
16. [20190415 [SECURITY] [DSA 4431-1] libssh2 security update](https://seclists.org/bugtraq/2019/Apr/25)
17. [openSUSE-SU-2019:1290](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html)
18. [openSUSE-SU-2019:1291](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html)
19. [[debian-lts-announce] 20190725 [SECURITY] [DLA 1730-3] libssh2 regression update](https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html)
20. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2967
- **State**: PUBLISHED
- **Published Date**: June 12, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:06 UTC
- **Reserved Date**: June 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Syworks SafeNET allows local users to bypass restrictions on network resource consumption by editing the policy.dat file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060605 [Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability](http://www.securityfocus.com/archive/1/436000/100/0/threaded)
2. [1077](http://securityreason.com/securityalert/1077)
3. [safenet-policy-dos(27083)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27083)
4. [1016231](http://securitytracker.com/id?1016231) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000516
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: May 15, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Galaxy Project Galaxy version v14.10 contains a CWE-79: Improper Neutralization of Input During Web Page Generation vulnerability in Many templates used in the Galaxy server did not properly sanitize user's input, which would allow for cross-site scripting (XSS) attacks. In this form of attack, a malicious person can create a URL which, when opened by a Galaxy user or administrator, would allow the malicious user to execute arbitrary Javascript. that can result in Arbitrary JavaScript code execution. This attack appear to be exploitable via The victim must interact with component on page witch contains injected JavaScript code.. This vulnerability appears to have been fixed in v14.10.1, v15.01.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://galaxyproject.org/archive/dev-news-briefs/2015-01-13/#security) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35654
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 13:58 UTC
- **Last Updated**: August 02, 2024 at 03:14 UTC
- **Reserved Date**: May 17, 2024 at 10:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CyberChimps Responsive allows Stored XSS.This issue affects Responsive: from n/a through 5.0.3.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CyberChimps - Responsive**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/responsive/wordpress-responsive-theme-5-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0039
- **State**: REJECTED
- **Last Updated**: May 16, 2023 at 00:00 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21687
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 19:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5025
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 20:15 UTC
- **Last Updated**: August 07, 2024 at 07:24 UTC
- **Reserved Date**: December 09, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user.
### Affected Products
**PyForum - PyForum**
Affected versions:
- v1.0.3 (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/cve/CVE-2009-5025)
2. [](https://www.openwall.com/lists/oss-security/2011/07/26/7)
3. [](https://seclists.org/fulldisclosure/2009/Nov/353) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29914
- **State**: PUBLISHED
- **Published Date**: April 21, 2023 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 14:31 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://hackmd.io/%400dayResearch/H1Cn2sAk3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1476
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:26 UTC
- **Reserved Date**: February 05, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in setlocale in libc on NetBSD 1.4.x through 1.6, and possibly other operating systems, when called with the LC_ALL category, allows local attackers to execute arbitrary code via a user-controlled locale string that has more than 6 elements, which exceeds the boundaries of the new_categories category array, as exploitable through programs such as xterm and zsh.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [NetBSD-SA2002-012](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-012.txt.asc)
2. [7565](http://www.osvdb.org/7565)
3. [5724](http://www.securityfocus.com/bid/5724)
4. [netbsd-libc-setlocale-bo(10159)](http://www.iss.net/security_center/static/10159.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0145
- **State**: PUBLISHED
- **Published Date**: January 08, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: January 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in glob in PHP before 4.4.8, when open_basedir is enabled, has unknown impact and attack vectors. NOTE: this issue reportedly exists because of a regression related to CVE-2007-4663.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0059](http://www.vupen.com/english/advisories/2008/0059)
2. [](http://www.php.net/releases/4_4_8.php)
3. [SSA:2008-045-03](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136)
4. [28936](http://secunia.com/advisories/28936)
5. [](http://bugs.php.net/bug.php?id=41655)
6. [](http://www.php.net/ChangeLog-4.php)
7. [28318](http://secunia.com/advisories/28318)
8. [php-glob-openbasedir-security-bypass(39401)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39401) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13334
- **State**: PUBLISHED
- **Published Date**: November 27, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting in handle.php in TerraMaster TOS version 3.1.03 allows attackers to execute JavaScript via the "options[sysname]" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4783
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36618
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 13:13 UTC
- **Reserved Date**: June 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of OS commands as root user by low-privileged authenticated users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/)
2. [](https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html)
3. [](https://networks.unify.com/security/advisories/OBSO-2307-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22903
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 15:49 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**n/a - https://github.com/rails/rails**
Affected versions:
- Fixed in 6.1.3.2 (Status: affected)
### References
1. [](https://hackerone.com/reports/1148025)
2. [](https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11309
- **State**: PUBLISHED
- **Published Date**: May 28, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Blind SQL injection in coupon_code in the MemberMouse plugin 2.2.8 and prior for WordPress allows an unauthenticated attacker to dump the WordPress MySQL database via an applyCoupon action in an admin-ajax.php request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.riccardoancarani.it/cve-2018-11309-blind-sql-injection-in-membermouse-plugin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26142
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 19:41 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu)
2. [](https://www.fragattacks.com)
3. [](https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md)
4. [[oss-security] 20210511 various 802.11 security issues - fragattacks.com](http://www.openwall.com/lists/oss-security/2021/05/11/12)
5. [](https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28965
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 14:47 UTC
- **Last Updated**: August 02, 2024 at 01:03 UTC
- **Reserved Date**: March 13, 2024 at 15:42 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal enable REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain Internal APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Dell - Secure Connect Gateway-Application**
Affected versions:
- 5.18.00.20 (Status: affected)
**Dell - Secure Connect Gateway-Appliance**
Affected versions:
- 5.18.00.20 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34625
- **State**: PUBLISHED
- **Published Date**: July 20, 2023 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 14:49 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ShowMojo MojoBox Digital Lockbox 1.4 is vulnerable to Authentication Bypass. The implementation of the lock opening mechanism via Bluetooth Low Energy (BLE) is vulnerable to replay attacks. A malicious user is able to intercept BLE requests and replicate them to open the lock at any time. Alternatively, an attacker with physical access to the device on which the Android app is installed, can obtain the latest BLE messages via the app logs and use them for opening the lock.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock)
2. [](https://mandomat.github.io/2023-03-15-testing-mojobox-security/)
3. [](https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1864
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 18:15 UTC
- **Last Updated**: November 20, 2024 at 17:11 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of the affected software. A successful exploit could allow the attacker, with read-only privileges, to inject and execute arbitrary, system-level commands with root privileges on an affected device.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cisco - Cisco Unified Computing System E-Series Software (UCSE)**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190821 Cisco Integrated Management Controller Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4904
- **State**: PUBLISHED
- **Published Date**: February 27, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a heap overflow vulnerability. The vulnerability is triggered by crafted TIFF data within an XPS file, which causes an out of bounds memory access. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
### Affected Products
**n/a - Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-02.html)
2. [102992](http://www.securityfocus.com/bid/102992)
3. [1040364](http://www.securitytracker.com/id/1040364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42302
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 00:47 UTC
- **Last Updated**: August 04, 2024 at 03:30 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure RTOS Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Real Time Operating System**
Affected versions:
- 6.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42302) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9286
- **State**: PUBLISHED
- **Published Date**: April 30, 2019 at 13:07 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: April 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vulnerability-lab.com/get_content.php?id=1608)
2. [](https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625)
3. [](https://github.com/NodeBB/NodeBB/pull/3371)
4. [](https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2004
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:44 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Siebel Core - Server BizLogic Script product of Oracle Siebel CRM (component: Integration - Scripting). Supported versions that are affected are 20.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel Core - Server BizLogic Script. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel Core - Server BizLogic Script accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Siebel Core - Server Framework**
Affected versions:
- 20.12 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6126
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
### Affected Products
**IBM Corporation - Kenexa LMS on Cloud**
Affected versions:
- 13.0 (Status: affected)
- 13.1 (Status: affected)
- 13.2 (Status: affected)
- 13.2.2 (Status: affected)
- 13.2.3 (Status: affected)
- 13.2.4 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
- 14.2.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21993982)
2. [94301](http://www.securityfocus.com/bid/94301) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2178
- **State**: PUBLISHED
- **Published Date**: May 13, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin.php in LifeType 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the searchTerms parameter in an editArticleCategories operation (aka an admin category search).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lifetype-admin-xss(42151)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42151)
2. [](http://wiki.lifetype.net/index.php/Release_notes_Lifetype_1.2.8)
3. [29017](http://www.securityfocus.com/bid/29017)
4. [](http://lifetype.net/post/2008/05/04/lifetype-1.2.8-released)
5. [30075](http://secunia.com/advisories/30075)
6. [3871](http://securityreason.com/securityalert/3871)
7. [20080502 Lifetype 1.2.7 XSS Vulnerability](http://www.securityfocus.com/archive/1/491550/100/0/threaded)
8. [20080504 Re: Lifetype 1.2.7 XSS Vulnerability](http://www.securityfocus.com/archive/1/491597/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7164
- **State**: PUBLISHED
- **Published Date**: October 19, 2020 at 17:42 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A operationselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
### Affected Products
**n/a - HPE Intelligent Management Center (iMC)**
Affected versions:
- Prior to iMC PLAT 7.3 (E0705P07) (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04036en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3046
- **State**: PUBLISHED
- **Published Date**: April 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:16 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 parser, related to contiguous code-stream parsing.
### Affected Products
**n/a - Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier.**
Affected versions:
- Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier. (Status: affected)
### References
1. [97554](http://www.securityfocus.com/bid/97554)
2. [1038228](http://www.securitytracker.com/id/1038228)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-11.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19739
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: November 29, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2932
- **State**: PUBLISHED
- **Published Date**: August 21, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 15, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26513](http://secunia.com/advisories/26513)
2. [ADV-2007-2929](http://www.vupen.com/english/advisories/2007/2929)
3. [zonealarm-acl-privilege-escalation(36110)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36110)
4. [20070820 Check Point Zone Labs Multiple Products Privilege Escalation Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584)
5. [25365](http://www.securityfocus.com/bid/25365)
6. [1018588](http://securitytracker.com/id?1018588)
7. [25377](http://www.securityfocus.com/bid/25377)
8. [](http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41725
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 18:13 UTC
- **Last Updated**: September 05, 2024 at 14:55 UTC
- **Reserved Date**: August 31, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability
### Affected Products
**Ivanti - Avalanche**
Affected versions:
- 6.4.1.236 (Status: affected)
### References
1. [](https://download.wavelink.com/Files/avalanche_v6.4.1.236_release_notes.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26529
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 19:52 UTC
- **Last Updated**: February 24, 2025 at 20:14 UTC
- **Reserved Date**: February 12, 2025 at 13:29 UTC
- **Assigned By**: fedora
### Vulnerability Description
Description information displayed in the site administration live log
required additional sanitizing to prevent a stored XSS risk.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Moodle Project - moodle**
Affected versions:
- 4.5.0 (Status: affected)
- 4.4.0 (Status: affected)
- 4.3.0 (Status: affected)
- 4.1.0 (Status: affected)
- 4.2.0 (Status: unknown)
- 0 (Status: unknown)
### References
1. [](https://moodle.org/mod/forum/discuss.php?d=466145)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0309
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HP-UX vgdisplay program gives root access to local users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX9702-056](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9702-056) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1423
- **State**: PUBLISHED
- **Published Date**: March 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: March 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Advanced Poll before 1.61, when using a flat file database, allows remote attackers to gain privileges by setting the logged_in parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#140723](http://www.kb.cert.org/vuls/id/140723)
2. [1002516](http://securitytracker.com/id?1002516)
3. [advancedpoll-php-admin-access(7861)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7861) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14526
- **State**: PUBLISHED
- **Published Date**: September 27, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple XML external entity (XXE) vulnerabilities in the OpenText Documentum Administrator 7.2.0180.0055 allow remote authenticated users to list the contents of arbitrary directories, read arbitrary files, cause a denial of service, or, on Windows, obtain Documentum user hashes via a (1) crafted DTD, involving unspecified XML structures in a request to xda/com/documentum/ucf/server/transport/impl/GAIRConnector or crafted XML file in a MediaProfile file (2) import or (3) check in.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20170925 OpenText Documentum Administrator and Webtop - XML External Entity Injection](http://seclists.org/fulldisclosure/2017/Sep/58)
2. [](https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42769
- **State**: PUBLISHED
- **Published Date**: August 22, 2024 at 00:00 UTC
- **Last Updated**: August 22, 2024 at 18:32 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Reflected Cross Site Scripting (XSS) vulnerability was found in "/core/signup_user.php " of Kashipara Hotel Management System v1.0, which allows remote attackers to execute arbitrary code via "user_fname" and "user_lname" parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kashipara.com/)
2. [](https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Hotel%20Management%20System%20v1.0/Reflected%20XSS%20-%20Sign%20UP.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37202
- **State**: PUBLISHED
- **Published Date**: September 14, 2021 at 10:47 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The IFC adapter in affected application contains a use-after-free vulnerability that could be triggered while parsing user-supplied IFC files. An attacker could leverage this vulnerability to execute code in the context of the current process.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Siemens - NX 1980 Series**
Affected versions:
- All versions < V1984 (Status: affected)
**Siemens - Solid Edge SE2021**
Affected versions:
- All versions < SE2021MP8 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27558
- **State**: PUBLISHED
- **Published Date**: August 29, 2022 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 01:12 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL iNotes is susceptible to a Broken Password Strength Checks vulnerability. Custom password policies are not enforced on certain iNotes forms which could allow users to set weak passwords, leading to easier cracking.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-521: Security Weakness
### Affected Products
**HCL Software - HCL iNotes**
Affected versions:
- 12.0.1, 12.0.1FP1 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100217) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-18913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-18913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18913
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 19:34 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EARCLINK ESPCMS-P8 was discovered to contain a SQL injection vulnerability in the espcms_web/Search.php component via the attr_array parameter. This vulnerability allows attackers to access sensitive database information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tusk1.cn/2019/03/21/ESPCMS-P8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E4%B8%8E%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40754
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 10:48 UTC
- **Last Updated**: September 18, 2024 at 22:42 UTC
- **Reserved Date**: July 10, 2024 at 03:39 UTC
- **Assigned By**: samsung.tv_appliance
### Vulnerability Description
Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Samsung Open Source - Escargot**
Affected versions:
- 4.0.0 (Status: affected)
### References
1. [](https://github.com/Samsung/escargot/pull/1369)
### Credits
- Jeonil Ji, Sunghoon Jang |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8291
- **State**: PUBLISHED
- **Published Date**: October 18, 2021 at 12:48 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A link preview rendering issue in Rocket.Chat versions before 3.9 could lead to potential XSS attacks.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Rocket.Chat server**
Affected versions:
- Fixed versions: 3.10, 3.9.4, 3.8.5 (Status: affected)
### References
1. [](https://github.com/RocketChat/Rocket.Chat/pull/19854) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43718
- **State**: PUBLISHED
- **Published Date**: September 30, 2023 at 21:19 UTC
- **Last Updated**: September 23, 2024 at 16:38 UTC
- **Reserved Date**: September 21, 2023 at 14:12 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "MSEARCH_ENABLE_TITLE[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Os Commerce - Os Commerce**
Affected versions:
- 4.12.56860 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/bts/)
2. [](https://www.oscommerce.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7131, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7131
- **State**: PUBLISHED
- **Published Date**: December 28, 2023 at 16:31 UTC
- **Last Updated**: August 02, 2024 at 08:50 UTC
- **Reserved Date**: December 28, 2023 at 07:54 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Intern Membership Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user_registration/ of the component User Registration. The manipulation of the argument userName leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249134 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Intern Membership Management System**
Affected versions:
- 2.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.249134)
2. [](https://vuldb.com/?ctiid.249134)
3. [](https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md)
### Credits
- Hamdi Sevben (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24514
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 23:29 UTC
- **Last Updated**: March 27, 2025 at 03:55 UTC
- **Reserved Date**: January 23, 2025 at 00:50 UTC
- **Assigned By**: kubernetes
### Vulnerability Description
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-url` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**kubernetes - ingress-nginx**
Affected versions:
- 0 (Status: affected)
- 1.12.0 (Status: affected)
### References
1. [](https://github.com/kubernetes/kubernetes/issues/131006)
### Credits
- Nir Ohfeld
- Ronen Shustin
- Sagi Tzadik |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3013, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3013 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3013
- **State**: PUBLISHED
- **Published Date**: June 18, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 29, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in IBM Curam Social Program Management 4.5 SP10 through 6.0.5.4 allow remote authenticated users to inject arbitrary web script or HTML via crafted input to a (1) custom JSP or (2) custom renderer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21675415)
2. [59259](http://secunia.com/advisories/59259)
3. [ibm-curan-cve20143013-xss(93011)](https://exchange.xforce.ibmcloud.com/vulnerabilities/93011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6173
- **State**: PUBLISHED
- **Published Date**: December 09, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6171 and CVE-2015-6174.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-135](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-135)
2. [1034334](http://www.securitytracker.com/id/1034334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1085
- **State**: PUBLISHED
- **Published Date**: April 14, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:39 UTC
- **Reserved Date**: November 30, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Human Interface Toolbox (HIToolBox) for Apple Mac 0S X 10.3.6 allows local users to exit applications via the force-quit key combination, even when the system is running in kiosk mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11802](http://www.securityfocus.com/bid/11802)
2. [13362](http://secunia.com/advisories/13362/)
3. [APPLE-SA-2004-12-02](http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html)
4. [macos-hitoolbox-kiosk-dos(18352)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18352)
5. [P-049](http://www.ciac.org/ciac/bulletins/p-049.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20236
- **State**: PUBLISHED
- **Published Date**: September 13, 2023 at 16:39 UTC
- **Last Updated**: October 23, 2024 at 19:10 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the iPXE boot function of Cisco IOS XR software could allow an authenticated, local attacker to install an unverified software image on an affected device.
This vulnerability is due to insufficient image verification. An attacker could exploit this vulnerability by manipulating the boot parameters for image verification during the iPXE boot process on an affected device. A successful exploit could allow the attacker to boot an unverified software image on the affected device.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- 5.2.0 (Status: affected)
- 5.2.1 (Status: affected)
- 5.2.2 (Status: affected)
- 5.2.4 (Status: affected)
- 5.2.3 (Status: affected)
- 5.2.5 (Status: affected)
- 5.2.47 (Status: affected)
- 5.3.0 (Status: affected)
- 5.3.1 (Status: affected)
- 5.3.2 (Status: affected)
- 5.3.3 (Status: affected)
- 5.3.4 (Status: affected)
- 6.0.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.1.1 (Status: affected)
- 6.1.2 (Status: affected)
- 6.1.3 (Status: affected)
- 6.1.4 (Status: affected)
- 6.1.12 (Status: affected)
- 6.1.22 (Status: affected)
- 6.1.32 (Status: affected)
- 6.1.36 (Status: affected)
- 6.1.42 (Status: affected)
- 6.2.1 (Status: affected)
- 6.2.2 (Status: affected)
- 6.2.3 (Status: affected)
- 6.2.25 (Status: affected)
- 6.2.11 (Status: affected)
- 6.3.2 (Status: affected)
- 6.3.3 (Status: affected)
- 6.3.15 (Status: affected)
- 6.4.1 (Status: affected)
- 6.4.2 (Status: affected)
- 6.4.3 (Status: affected)
- 6.5.1 (Status: affected)
- 6.5.2 (Status: affected)
- 6.5.3 (Status: affected)
- 6.5.25 (Status: affected)
- 6.5.26 (Status: affected)
- 6.5.28 (Status: affected)
- 6.5.29 (Status: affected)
- 6.5.32 (Status: affected)
- 6.5.33 (Status: affected)
- 6.6.2 (Status: affected)
- 6.6.3 (Status: affected)
- 6.6.25 (Status: affected)
- 6.6.4 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.2 (Status: affected)
- 7.0.12 (Status: affected)
- 7.0.14 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.15 (Status: affected)
- 7.1.2 (Status: affected)
- 7.1.3 (Status: affected)
- 6.7.1 (Status: affected)
- 6.7.2 (Status: affected)
- 6.7.3 (Status: affected)
- 6.7.4 (Status: affected)
- 7.2.0 (Status: affected)
- 7.2.1 (Status: affected)
- 7.2.2 (Status: affected)
- 7.3.1 (Status: affected)
- 7.3.15 (Status: affected)
- 7.3.2 (Status: affected)
- 7.3.3 (Status: affected)
- 7.3.5 (Status: affected)
- 7.4.1 (Status: affected)
- 7.4.2 (Status: affected)
- 6.8.1 (Status: affected)
- 6.8.2 (Status: affected)
- 7.5.1 (Status: affected)
- 7.5.3 (Status: affected)
- 7.5.2 (Status: affected)
- 7.5.4 (Status: affected)
- 7.6.1 (Status: affected)
- 7.6.2 (Status: affected)
- 7.7.1 (Status: affected)
- 7.7.2 (Status: affected)
- 7.7.21 (Status: affected)
- 6.9.1 (Status: affected)
- 6.9.2 (Status: affected)
- 7.8.1 (Status: affected)
- 7.8.2 (Status: affected)
- 7.9.1 (Status: affected)
- 7.9.2 (Status: affected)
### References
1. [cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1488
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 01:15 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 21, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of time.
### Affected Products
**rsyslog - rsyslog**
Affected versions:
- before 5.7.6 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2011-1488)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488)
3. [](https://access.redhat.com/security/cve/cve-2011-1488)
4. [](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html)
5. [](https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26582
- **State**: PUBLISHED
- **Published Date**: February 21, 2024 at 14:59 UTC
- **Last Updated**: May 04, 2025 at 08:51 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
### Affected Products
**Linux - Linux**
Affected versions:
- fd31f3996af2627106e22a9f8072764fede51161 (Status: affected)
- fd31f3996af2627106e22a9f8072764fede51161 (Status: affected)
- fd31f3996af2627106e22a9f8072764fede51161 (Status: affected)
- fd31f3996af2627106e22a9f8072764fede51161 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.0 (Status: affected)
- 0 (Status: unaffected)
- 6.1.79 (Status: unaffected)
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96)
2. [](https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5)
3. [](https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df)
4. [](https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41846
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 16:53 UTC
- **Last Updated**: October 07, 2024 at 13:15 UTC
- **Reserved Date**: July 22, 2024 at 17:16 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2999
- **State**: PUBLISHED
- **Published Date**: June 08, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in SysAid Help Desk before 15.2 allow remote administrators to execute arbitrary SQL commands via the (1) groupFilter parameter in an AssetDetails report to /genericreport, customSQL parameter in a (2) TopAdministratorsByAverageTimer report or an (3) ActiveRequests report to /genericreport, (4) dir parameter to HelpDesk.jsp, or (5) grantSQL parameter to RFCGantt.jsp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)](http://seclists.org/fulldisclosure/2015/Jun/8)
2. [20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)](http://www.securityfocus.com/archive/1/535679/100/0/threaded)
3. [](http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html)
4. [75038](http://www.securityfocus.com/bid/75038)
5. [](https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19792
- **State**: PUBLISHED
- **Published Date**: March 03, 2020 at 14:32 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A permissions issue in ESET Cyber Security before 6.8.300.0 for macOS allows a local attacker to escalate privileges by appending data to root-owned files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://danishcyberdefence.dk/blog/esets-cyber-security) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1210
- **State**: PUBLISHED
- **Published Date**: July 30, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=564679)
2. [oval:org.mitre.oval:def:11863](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11863)
3. [](http://www.mozilla.org/security/announce/2010/mfsa2010-44.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4370
- **State**: PUBLISHED
- **Published Date**: January 10, 2012 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 04, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4372 and CVE-2011-4373.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb12-01.html)
2. [51348](http://www.securityfocus.com/bid/51348)
3. [oval:org.mitre.oval:def:14801](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14801)
4. [1026496](http://www.securitytracker.com/id?1026496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40837
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 20:15 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin function 'sub_ADD50' contains a command execution vulnerability. In the "formSetIptv" function, obtaining the "list" and "vlanId" fields, unfiltered passing these two fields as parameters to the "sub_ADD50" function to execute commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/cmd/2/2.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3620, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3620 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3620
- **State**: PUBLISHED
- **Published Date**: July 31, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.corsaire.com/advisories/c051114-003.txt)
2. [vmware-password-information-disclosure(28112)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28112)
3. [19249](http://www.securityfocus.com/bid/19249)
4. [](http://kb.vmware.com/kb/2118366)
5. [20060801 VMSA-2006-0004 Cross site scripting vulnerability and other fixes](http://www.securityfocus.com/archive/1/441825/100/100/threaded)
6. [20060731 Corsaire Security Advisory - VMware ESX Server Password Disclosure in Log issue](http://www.securityfocus.com/archive/1/441727/100/100/threaded)
7. [ADV-2006-3075](http://www.vupen.com/english/advisories/2006/3075)
8. [21230](http://secunia.com/advisories/21230)
9. [VU#822476](http://www.kb.cert.org/vuls/id/822476) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21247, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21247 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21247
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 19:52 UTC
- **Last Updated**: March 13, 2025 at 15:52 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - MySQL Cluster**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
**Oracle Corporation - MySQL Client**
Affected versions:
- * (Status: affected)
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8346
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 16:48 UTC
- **Last Updated**: August 04, 2024 at 21:17 UTC
- **Reserved Date**: February 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Zoho ManageEngine ADSelfService Plus 5.x through 5704, an authorization.do cross-site Scripting (XSS) vulnerability allows for an unauthenticated manipulation of the JavaScript code by injecting the HTTP form parameter adscsrf. An attacker can use this to capture a user's AD self-service password reset and MFA token.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/self-service-password/release-notes.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-45007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-45007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-45007
- **State**: PUBLISHED
- **Published Date**: April 30, 2025 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 14:34 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the profile.php file of PHPGurukul Timetable Generator System v1.0. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the adminname POST request parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Time-Table-Generator-System/xss-injection.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4886
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 19:18 UTC
- **Last Updated**: February 13, 2025 at 16:34 UTC
- **Reserved Date**: January 12, 2023 at 01:32 UTC
- **Assigned By**: kubernetes
### Vulnerability Description
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Kubernetes - ingress-nginx**
Affected versions:
- 0 (Status: affected)
- 1.8.0 (Status: unknown)
### References
1. [](https://github.com/kubernetes/ingress-nginx/issues/10570)
2. [](https://groups.google.com/g/kubernetes-security-announce/c/ge7u3qCwZLI)
3. [](http://www.openwall.com/lists/oss-security/2023/10/25/5)
4. [](https://security.netapp.com/advisory/ntap-20240307-0013/)
### Credits
- Ginoah, working with the DEVCORE Internship Program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29118
- **State**: PUBLISHED
- **Published Date**: March 19, 2024 at 14:49 UTC
- **Last Updated**: August 02, 2024 at 01:03 UTC
- **Reserved Date**: March 15, 2024 at 14:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scrollsequence allows Stored XSS.This issue affects Scrollsequence: from n/a through 1.5.4.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Scrollsequence - Scrollsequence**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/scrollsequence/wordpress-scrollsequence-plugin-1-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- resecured.io (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54428
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 14:13 UTC
- **Last Updated**: December 16, 2024 at 20:02 UTC
- **Reserved Date**: December 02, 2024 at 12:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in onigetoc Add image to Post allows Stored XSS.This issue affects Add image to Post: from n/a through 0.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**onigetoc - Add image to Post**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/add-image-to-post/vulnerability/wordpress-add-image-to-post-plugin-0-6-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21143
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 14:55 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1163504)
3. [FEDORA-2021-05afa65d39](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUQSMNV7INLDDSD3RKI5S5EAULX2QC7P/)
4. [FEDORA-2021-7fb30b9381](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7ACWYJ74Z3YN2XH4QMUEGNBC3VXX464L/)
5. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5290
- **State**: PUBLISHED
- **Published Date**: May 31, 2025 at 07:22 UTC
- **Last Updated**: June 02, 2025 at 15:49 UTC
- **Reserved Date**: May 27, 2025 at 21:40 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Borderless – Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**visualmodo - Borderless – Elementor Addons and Templates**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4492aede-b68d-46b8-955f-81ebdc875921?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L72)
3. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L230)
4. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L288)
5. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/circular-progress-bar.php#L433)
6. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/progress-bar.php#L417)
7. [](https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/semi-circular-progress-bar.php#L410)
8. [](https://plugins.trac.wordpress.org/changeset/3302155/)
### Credits
- Robert DeVore |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0681
- **State**: PUBLISHED
- **Published Date**: November 15, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 03:35 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) uses hard-coded credentials, which may allow remote attackers to login to the Management page and change the configuration.
### Affected Products
**NEOJAPAN Inc. - Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier)**
Affected versions:
- Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier (Status: affected)
### References
1. [](https://www.denbun.com/en/pop/support/security/181003.html)
2. [JVN#00344155](http://jvn.jp/en/jp/JVN00344155/index.html)
3. [](https://www.denbun.com/en/imap/support/security/181003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0568
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 20:16 UTC
- **Last Updated**: January 31, 2025 at 19:05 UTC
- **Reserved Date**: January 19, 2025 at 03:31 UTC
- **Assigned By**: zdi
### Vulnerability Description
Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Sante - PACS Server**
Affected versions:
- 4.0.9 (Status: affected)
### References
1. [ZDI-25-049](https://www.zerodayinitiative.com/advisories/ZDI-25-049/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4047
- **State**: PUBLISHED
- **Published Date**: July 27, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 14:37 UTC
- **Reserved Date**: July 27, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
geoBlog (aka BitDamaged) 1 does not require authentication for (1) deletecomment.php, (2) deleteblog.php, and (3) listcomment.php in admin/, which allows remote attackers to delete arbitrary comments, delete arbitrary blogs, and have other unspecified impact via a request with a valid id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42487](http://osvdb.org/42487)
2. [2934](http://securityreason.com/securityalert/2934)
3. [geoblog-listcomments-security-bypass(35494)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35494)
4. [42486](http://osvdb.org/42486)
5. [24966](http://www.securityfocus.com/bid/24966)
6. [20070719 Geoblog v1 administrator bypass](http://www.securityfocus.com/archive/1/474127/100/0/threaded)
7. [42485](http://osvdb.org/42485) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5179
- **State**: PUBLISHED
- **Published Date**: April 26, 2019 at 13:55 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.
### Affected Products
**n/a - Firefox**
Affected versions:
- All versions prior to Firefox 60 (Status: affected)
### References
1. [](https://www.mozilla.org/en-US/security/advisories/mfsa2018-11/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5408
- **State**: PUBLISHED
- **Published Date**: May 27, 2024 at 12:16 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 27, 2024 at 07:26 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Vulnerability in RhinOS 3.0-1190 consisting of an XSS through the "search" parameter of /portal/search.htm. This vulnerability could allow a remote attacker to steal details of a victim's user session by submitting a specially crafted URL.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SaltOS - RhinOS**
Affected versions:
- 3.0-1190 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-rhinos-saltos)
2. [](https://github.com/josepsanzcamp/RhinOS)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1127
- **State**: PUBLISHED
- **Published Date**: March 09, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Gallery 2 up to 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the X-Forwarded-For (X_FORWARDED_FOR) HTTP header, which is not properly handled when adding a comment to an album.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16940](http://www.securityfocus.com/bid/16940)
2. [23596](http://www.osvdb.org/23596)
3. [](http://www.gulftech.org/?node=research&article_id=00106-03022006)
4. [gallery-getremotehostaddress-xss(25117)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25117)
5. [](http://gallery.menalto.com/gallery_2.0.3_released)
6. [ADV-2006-0813](http://www.vupen.com/english/advisories/2006/0813)
7. [20060303 Gallery 2 Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-02/0621.html)
8. [19104](http://secunia.com/advisories/19104)
9. [1015717](http://securitytracker.com/id?1015717) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0019
- **State**: PUBLISHED
- **Published Date**: April 10, 2019 at 20:13 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: October 11, 2018 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
When BGP tracing is enabled an incoming BGP message may cause the Junos OS routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extended DoS condition. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S4, 16.1R7-S5; 16.2 versions prior to 16.2R2-S9, 16.2R3; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S1; 17.3 versions prior to 17.3R3-S3, 17.3R3-S4, 17.3R4; 17.4 versions prior to 17.4R1-S7, 17.4R2-S3, 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4, 18.1R4; 18.2 versions prior to 18.2R2-S2, 18.2R2-S3, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. This issue does not affect Junos releases prior to 16.1R1.
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 16.1 (Status: affected)
- 16.2 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.2X75 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- all (Status: unaffected)
### References
1. [](https://kb.juniper.net/JSA10931)
2. [107893](http://www.securityfocus.com/bid/107893) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30668
- **State**: PUBLISHED
- **Published Date**: May 14, 2025 at 17:39 UTC
- **Last Updated**: May 14, 2025 at 19:00 UTC
- **Reserved Date**: March 24, 2025 at 22:35 UTC
- **Assigned By**: Zoom
### Vulnerability Description
Integer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct a denial of service via network access.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Zoom Communications, Inc - Zoom Workplace Apps**
Affected versions:
- see references (Status: affected)
### References
1. [](https://www.zoom.com/en/trust/security-bulletin/zsb-25020) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3905
- **State**: PUBLISHED
- **Published Date**: September 04, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: September 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20080904 Re: CVE Request (ruby -- DNS spoofing vulnerability](http://www.openwall.com/lists/oss-security/2008/09/04/9)
2. [31430](http://secunia.com/advisories/31430)
3. [USN-651-1](https://usn.ubuntu.com/651-1/)
4. [31699](http://www.securityfocus.com/bid/31699)
5. [DSA-1652](http://www.debian.org/security/2008/dsa-1652)
6. [FEDORA-2008-8736](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html)
7. [](http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm)
8. [DSA-1651](http://www.debian.org/security/2008/dsa-1651)
9. [RHSA-2008:0897](http://www.redhat.com/support/errata/RHSA-2008-0897.html)
10. [](http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/)
11. [32219](http://secunia.com/advisories/32219)
12. [32948](http://secunia.com/advisories/32948)
13. [oval:org.mitre.oval:def:10034](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10034)
14. [32255](http://secunia.com/advisories/32255)
15. [ruby-resolv-dns-spoofing(45935)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45935)
16. [32371](http://secunia.com/advisories/32371)
17. [32165](http://secunia.com/advisories/32165)
18. [GLSA-200812-17](http://security.gentoo.org/glsa/glsa-200812-17.xml)
19. [33178](http://secunia.com/advisories/33178)
20. [ADV-2008-2334](http://www.vupen.com/english/advisories/2008/2334)
21. [SSA:2008-334-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.371754)
22. [FEDORA-2008-8738](https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html)
23. [32256](http://secunia.com/advisories/32256)
24. [[oss-security] 20080903 CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)](http://www.openwall.com/lists/oss-security/2008/09/03/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6919
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 16:37 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 13, 2020 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.
### Affected Products
**n/a - HP Support Assistant**
Affected versions:
- before 9.11 (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_5585999-5586023-16)
2. [](https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0030/MNDT-2022-0030.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13563
- **State**: PUBLISHED
- **Published Date**: February 01, 2021 at 15:06 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 26, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**n/a - phpGACL**
Affected versions:
- phpGACL 3.3.7 , OpenEMR 5.0.2 , OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce) (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3879
- **State**: PUBLISHED
- **Published Date**: October 19, 2021 at 12:30 UTC
- **Last Updated**: August 03, 2024 at 17:09 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**snipe - snipe/snipe-it**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe)
2. [](https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2555
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 18:00 UTC
- **Last Updated**: March 20, 2025 at 19:48 UTC
- **Reserved Date**: March 20, 2025 at 10:24 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in Audi Universal Traffic Recorder App 2.0. Affected is an unknown function of the component FTP Credentials. The manipulation leads to use of hard-coded password. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.89 and 2.90 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about these issues and acted very professional. Version 2.89 is fixing this issue for new customers and 2.90 is going to fix it for existing customers.
### CVSS Metrics
- **CVSS Base Score**: 2.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
- CWE-255: Security Weakness
### Affected Products
**Audi - Universal Traffic Recorder App**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-300168 | Audi Universal Traffic Recorder App FTP Credentials hard-coded password](https://vuldb.com/?id.300168)
2. [VDB-300168 | CTI Indicators (IOB, IOC, TTP)](https://vuldb.com/?ctiid.300168)
3. [Submit #513391 | Audi UTR Dashcam 2.0 Plaintext Password in Configuration File](https://vuldb.com/?submit.513391)
4. [](https://github.com/geo-chen/Audi/blob/main/README.md#finding-2-hardcoded-credentials-in-audi-universal-traffic-recorder-app)
### Credits
- geochen (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6477
- **State**: REJECTED
- **Published Date**: July 10, 2020 at 14:14 UTC
- **Last Updated**: July 10, 2020 at 14:14 UTC
- **Reserved Date**: January 02, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7144
- **State**: REJECTED
- **Published Date**: August 17, 2020 at 14:10 UTC
- **Last Updated**: August 17, 2020 at 14:10 UTC
- **Reserved Date**: February 15, 2018 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7435
- **State**: PUBLISHED
- **Published Date**: August 31, 2024 at 02:33 UTC
- **Last Updated**: September 03, 2024 at 18:18 UTC
- **Reserved Date**: August 02, 2024 at 20:30 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Attire theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.0.6 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**shafayat-alam - Attire**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f21cbe18-77e1-4a9a-96a0-74edaef0db3e?source=cve)
2. [](https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=240321%40attire%2F2.0.7&old=231937%40attire%2F2.0.6)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3517
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 18:03 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 08, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in NETGEAR WNR3500U and WNR3500L.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ise.io/casestudies/exploiting-soho-routers/)
2. [](https://www.ise.io/soho_service_hacks/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2024
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 20:06 UTC
- **Last Updated**: August 04, 2024 at 18:35 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-03-01)
2. [USN-4094-1](https://usn.ubuntu.com/4094-1/)
3. [USN-4118-1](https://usn.ubuntu.com/4118-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26686
- **State**: PUBLISHED
- **Published Date**: February 23, 2021 at 17:06 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 03, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote authenticated SQL Injection vulnerabilitiy was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface API of ClearPass could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database.
### Affected Products
**n/a - Aruba ClearPass Policy Manager**
Affected versions:
- Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1 (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-004.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32655
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:35 UTC
- **Reserved Date**: April 09, 2025 at 11:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in DevriX Restrict User Registration allows Stored XSS. This issue affects Restrict User Registration: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**DevriX - Restrict User Registration**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/restrict-user-registration/vulnerability/wordpress-restrict-user-registration-plugin-1-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0806
- **State**: PUBLISHED
- **Published Date**: October 03, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Android framework (gatekeeperresponse). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62998805.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/base/+/b87c968e5a41a1a09166199bf54eee12608f3900)
2. [101086](http://www.securityfocus.com/bid/101086)
3. [](https://source.android.com/security/bulletin/2017-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1938
- **State**: PUBLISHED
- **Published Date**: April 24, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sony Mylo COM-2 Japanese model firmware before 1.002 does not properly verify web server SSL certificates, which allows remote attackers to obtain sensitive information and conduct spoofing attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sony-mylo-ssl-spoofing(41971)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41971)
2. [28905](http://www.securityfocus.com/bid/28905)
3. [29928](http://secunia.com/advisories/29928)
4. [](http://esupport.sony.com/perl/news-item.pl?news_id=262&mdl=COM2)
5. [JVN#76788395](http://jvn.jp/jp/JVN%2376788395/index.html)
6. [ADV-2008-1349](http://www.vupen.com/english/advisories/2008/1349/references)
7. [](http://mylo.nccl.sony.co.jp/hotnews/2008/04/01/index.html)
8. [](http://mylo.nccl.sony.co.jp/download/M-W002-001-02/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5966, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5966
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 29, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Privileged Identity Manager Virtual Appliance could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
### Affected Products
**IBM Corporation - Privileged Identity Manager**
Affected versions:
- 1.0.1 (Status: affected)
- 1.0.1.1 (Status: affected)
- 2.0.0 (Status: affected)
- 2.0.1 (Status: affected)
- 2.0.2 (Status: affected)
- 2.1.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21996614)
2. [95197](http://www.securityfocus.com/bid/95197) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.