System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12372
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 13:53 UTC
- **Last Updated**: August 04, 2024 at 11:56 UTC
- **Reserved Date**: April 28, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Unchecked return value in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.
### Affected Products
**n/a - Intel(R) Graphics Drivers**
Affected versions:
- before version 26.20.100.8141 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31079
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 09:39 UTC
- **Last Updated**: March 28, 2025 at 13:48 UTC
- **Reserved Date**: March 26, 2025 at 09:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in usermaven Usermaven allows Cross Site Request Forgery. This issue affects Usermaven: from n/a through 1.2.1.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**usermaven - Usermaven**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/usermaven/vulnerability/wordpress-usermaven-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1608
- **State**: PUBLISHED
- **Published Date**: March 08, 2019 at 20:00 UTC
- **Last Updated**: November 21, 2024 at 19:43 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Cisco - MDS 9000 Series Multilayer Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 7000 and 7700 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [107386](http://www.securityfocus.com/bid/107386)
2. [20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1608)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1608) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0736
- **State**: PUBLISHED
- **Published Date**: February 27, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 16, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote attackers to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2006:010](http://www.novell.com/linux/security/advisories/2006_10_casa.html)
2. [ADV-2006-0693](http://www.vupen.com/english/advisories/2006/0693)
3. [16779](http://www.securityfocus.com/bid/16779)
4. [18995](http://secunia.com/advisories/18995) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4219
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 20:08 UTC
- **Last Updated**: August 01, 2024 at 20:33 UTC
- **Reserved Date**: April 25, 2024 at 21:45 UTC
- **Assigned By**: BT
### Vulnerability Description
Prior to 23.2, it is possible to perform arbitrary Server-Side requests via HTTP-based connectors within BeyondInsight, resulting in a server-side request forgery vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**BeyondTrust - BeyondInsight**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.beyondtrust.com/trust-center/security-advisories/BT24-05)
### Credits
- Paolo Caminati
- Daniele Montanaro |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4768
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:43 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5656
- **State**: PUBLISHED
- **Published Date**: January 16, 2008 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 23, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TIBCO SmartSockets RTserver 6.8.0 and earlier, RTworks before 4.0.4, and Enterprise Message Service (EMS) 4.0.0 through 4.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted requests that control loop operations related to memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tibco.com/resources/mk/ems_security_advisory_20080115.txt)
2. [28490](http://secunia.com/advisories/28490)
3. [1019193](http://securitytracker.com/id?1019193)
4. [20080115 TIBCO SmartSockets RTServer Multiple Untrusted Loop Bounds Vulnerabilities](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=641)
5. [](http://www.tibco.com/resources/mk/sspfm_security_advisory_20080115.txt)
6. [](http://www.tibco.com/resources/mk/smartsockets_security_advisory_20080115.txt)
7. [tibco-rtserver-loop-code-execution(39708)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39708)
8. [](http://www.tibco.com/mk/advisory.jsp)
9. [27293](http://www.securityfocus.com/bid/27293)
10. [ADV-2008-0173](http://www.vupen.com/english/advisories/2008/0173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1379
- **State**: PUBLISHED
- **Published Date**: February 17, 2025 at 06:31 UTC
- **Last Updated**: February 18, 2025 at 19:32 UTC
- **Reserved Date**: February 16, 2025 at 20:08 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Real Estate Property Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-295987 | code-projects Real Estate Property Management System CustomerReport.php sql injection](https://vuldb.com/?id.295987)
2. [VDB-295987 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295987)
3. [Submit #501070 | code-projects Real Estate Property Management System in php 0/1 SQL Injection](https://vuldb.com/?submit.501070)
4. [](https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf)
5. [](https://code-projects.org/)
### Credits
- JunFeiGu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21840
- **State**: PUBLISHED
- **Published Date**: August 25, 2021 at 18:21 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input used to process an atom using the “saio” FOURCC code cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-680: Security Weakness
### Affected Products
**n/a - GPAC Project**
Affected versions:
- GPAC Project Advanced Content commit a8a8d412dabcb129e695c3e7d861fcc81f608304, GPAC Project Advanced Content v1.0.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297)
2. [DSA-4966](https://www.debian.org/security/2021/dsa-4966) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46584
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15378.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.0.80 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0006)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-171/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4944
- **State**: PUBLISHED
- **Published Date**: September 18, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 15:17 UTC
- **Reserved Date**: September 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The canvas.createPattern function in Opera 9.x before 9.22 for Linux, FreeBSD, and Solaris does not clear memory before using it to process a new pattern, which allows remote attackers to obtain sensitive information (memory contents) via JavaScript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/linux/922/)
2. [](http://www.opera.com/support/search/view/861/)
3. [45946](http://osvdb.org/45946)
4. [GLSA-200708-17](http://security.gentoo.org/glsa/glsa-200708-17.xml)
5. [](http://www.opera.com/docs/changelogs/solaris/922/)
6. [](http://www.opera.com/docs/changelogs/freebsd/922/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1824
- **State**: PUBLISHED
- **Published Date**: April 18, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in PhpGuestbook.php in PhpGuestbook 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) Website, and (3) Comment parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [phpguestbook-script-xss(25850)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25850)
2. [17594](http://www.securityfocus.com/bid/17594)
3. [20060415 PhpGuestbook <= 1.0 XSS](http://www.securityfocus.com/archive/1/431070/100/0/threaded)
4. [19669](http://secunia.com/advisories/19669)
5. [17537](http://www.securityfocus.com/bid/17537)
6. [ADV-2006-1422](http://www.vupen.com/english/advisories/2006/1422)
7. [](http://pridels0.blogspot.com/2006/04/phpguestbook-v10-script-insertion.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18790
- **State**: PUBLISHED
- **Published Date**: April 21, 2020 at 18:51 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000049372/Security-Advisory-for-Sensitive-Information-Disclosure-Vulnerability-on-Some-Routers-PSV-2017-0317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2138
- **State**: PUBLISHED
- **Published Date**: August 02, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 13:39 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in CS-Cart Japanese Edition v4.3.10 and earlier (excluding v2 and v3), CS-Cart Multivendor Japanese Edition v4.3.10 and earlier (excluding v2 and v3) allows remote attackers to hijack the authentication of administrators via unspecified vectors.
### Affected Products
**Frogman Office Inc. - CS-Cart Japanese Edition**
Affected versions:
- v4.3.10 and earlier (excluding v2 and v3) (Status: affected)
**Frogman Office Inc. - CS-Cart Multivendor Japanese Edition**
Affected versions:
- v4.3.10 and earlier (excluding v2 and v3) (Status: affected)
### References
1. [JVN#87770873](https://jvn.jp/en/jp/JVN87770873/index.html)
2. [](http://tips.cs-cart.jp/fix-csrf-20170406.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3006
- **State**: PUBLISHED
- **Published Date**: August 12, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: July 07, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 Gold and SP3; Office Excel Viewer; Office Compatibility Pack 2007 Gold and SP1; Office SharePoint Server 2007 Gold and SP1; and Office 2004 and 2008 for Mac do not properly parse Country record values when loading Excel files, which allows remote attackers to execute arbitrary code via a crafted Excel file, aka the "Excel Record Parsing Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA08-225A](http://www.us-cert.gov/cas/techalerts/TA08-225A.html)
2. [30640](http://www.securityfocus.com/bid/30640)
3. [HPSBST02360](http://marc.info/?l=bugtraq&m=121915960406986&w=2)
4. [20080812 ZDI-08-048: Microsoft Excel COUNTRY Record Memory Corruption Vulnerability](http://www.securityfocus.com/archive/1/495428/100/0/threaded)
5. [1020672](http://www.securitytracker.com/id?1020672)
6. [SSRT080117](http://marc.info/?l=bugtraq&m=121915960406986&w=2)
7. [MS08-043](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043)
8. [31455](http://secunia.com/advisories/31455)
9. [31454](http://secunia.com/advisories/31454)
10. [oval:org.mitre.oval:def:5561](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5561)
11. [ADV-2008-2347](http://www.vupen.com/english/advisories/2008/2347)
12. [](http://www.zerodayinitiative.com/advisories/ZDI-08-048/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7058
- **State**: REJECTED
- **Published Date**: July 21, 2017 at 19:00 UTC
- **Last Updated**: July 21, 2017 at 18:57 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41241
- **State**: PUBLISHED
- **Published Date**: March 08, 2022 at 18:25 UTC
- **Last Updated**: April 23, 2025 at 18:58 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 20.0.14 (Status: affected)
- >= 21.0.0, < 21.0.6 (Status: affected)
- >= 22.2.0, < 22.2.1 (Status: affected)
### References
1. [](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94)
2. [](https://github.com/nextcloud/groupfolders/issues/1692)
3. [](https://github.com/nextcloud/server/pull/29362)
4. [GLSA-202208-17](https://security.gentoo.org/glsa/202208-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7847
- **State**: PUBLISHED
- **Published Date**: May 22, 2019 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:37 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-284: Improper Access Control vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service or potential code execution by overwriting configuration settings of the controller over Modbus.
### Affected Products
**n/a - Modicon M580 Modicon M340 Modicon Quantum Modicon Premium**
Affected versions:
- Modicon M580 Modicon M340 Modicon Quantum Modicon Premium (Status: affected)
### References
1. [](https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0742)
3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3819
- **State**: PUBLISHED
- **Published Date**: July 27, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:48 UTC
- **Reserved Date**: July 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [twiki-configure-command-injection(28049)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28049)
2. [1016603](http://securitytracker.com/id?1016603)
3. [21235](http://secunia.com/advisories/21235)
4. [](http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure)
5. [19188](http://www.securityfocus.com/bid/19188)
6. [27556](http://www.osvdb.org/displayvuln.php?osvdb_id=27556)
7. [ADV-2006-2995](http://www.vupen.com/english/advisories/2006/2995) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2927
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 15, 2024 at 18:48 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Hyperion Data Relationship Management product of Oracle Hyperion (component: Access and Security). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Data Relationship Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Hyperion Data Relationship Management. CVSS 3.0 Base Score 6.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Hyperion Data Relationship Management**
Affected versions:
- 11.1.2.4 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0105
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from out-of-bound memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
### Affected Products
**Microsoft Corporation - Office**
Affected versions:
- Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 (Status: affected)
### References
1. [1038010](http://www.securitytracker.com/id/1038010)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0105)
3. [96746](http://www.securityfocus.com/bid/96746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4027
- **State**: PUBLISHED
- **Published Date**: July 01, 2020 at 01:35 UTC
- **Last Updated**: September 17, 2024 at 01:56 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
### Affected Products
**Atlassian - Confluence Server**
Affected versions:
- unspecified (Status: affected)
- 7.5.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Confluence Data Center**
Affected versions:
- unspecified (Status: affected)
- 7.5.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/CONFSERVER-59898) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0508
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:49 UTC
- **Reserved Date**: June 07, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wwwisis 3.45 and earlier allows remote attackers to execute arbitrary commands and read files via the parameters (1) prolog or (2) epilog.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020402 RE: [VulnWatch] vuln in wwwisis: remote command execution and get files](http://online.securityfocus.com/archive/1/265456)
2. [4384](http://www.securityfocus.com/bid/4384)
3. [20020328 vuln in wwwisis: remote command execution and get files](http://online.securityfocus.com/archive/1/264682)
4. [20020328 [VulnWatch] vuln in wwwisis: remote command execution and get files](http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0077.html)
5. [wwwisis-remote-command-execution(8660)](http://www.iss.net/security_center/static/8660.php)
6. [4383](http://www.securityfocus.com/bid/4383)
7. [](http://www.bireme.br/security.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5065
- **State**: PUBLISHED
- **Published Date**: April 10, 2017 at 03:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 26, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 allow Embedded_Ace_Set_Task.cgi command injection.
### Affected Products
**n/a - Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2**
Affected versions:
- Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 (Status: affected)
### References
1. [](https://carvesystems.com/sierra-wireless-2016-advisory.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1147
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 21:38 UTC
- **Last Updated**: November 12, 2024 at 20:40 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0390
- **State**: PUBLISHED
- **Published Date**: June 10, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: June 10, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple buffer overflows in Options Parsing Tool (OPT) shared library 3.18 and earlier, when used in setuid programs, may allow local users to execute arbitrary code via long command line options that are fed into macros such as opt_warn_2, as used in functions such as opt_atoi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030523 Re: Options Parsing Tool library buffer overflows.](http://marc.info/?l=bugtraq&m=105371246204866&w=2)
2. [20030424 SRT2003-04-24-1532 - Options Parsing Tool library buffer overflows.](http://marc.info/?l=bugtraq&m=105121918523320&w=2)
3. [](http://nis-www.lanl.gov/~jt/Software/opt/opt-3.19.tar.gz) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39089
- **State**: PUBLISHED
- **Published Date**: January 20, 2023 at 18:14 UTC
- **Last Updated**: March 31, 2025 at 14:59 UTC
- **Reserved Date**: August 16, 2021 at 18:59 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.6.0 could allow an authenticated user to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 216387.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**IBM - Cloud Pak for Security**
Affected versions:
- 1.10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6856405)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/216387) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37766
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 00:00 UTC
- **Last Updated**: November 08, 2024 at 15:01 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/2516) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7695
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The easaa Baoneng (aka com.easaa.baoneng) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#896217](http://www.kb.cert.org/vuls/id/896217)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26426
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 13:56 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 04, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In camera isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07085486; Issue ID: ALPS07085486.
### Affected Products
**MediaTek, Inc. - MT6833, MT6853, MT6873, MT6877, MT6893, MT8167, MT8167S, MT8168, MT8175, MT8185, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8765, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/August-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8535
- **State**: PUBLISHED
- **Published Date**: May 26, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 16:41 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8536, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542.
### Affected Products
**Microsoft Corporation - Malware Protection Engine**
Affected versions:
- Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016. (Status: affected)
### References
1. [42081](https://www.exploit-db.com/exploits/42081/)
2. [98702](http://www.securityfocus.com/bid/98702)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8535)
4. [1038571](http://www.securitytracker.com/id/1038571) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34341
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 22:01 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 08, 2021 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
Ming 0.4.8 has an out-of-bounds read vulnerability in the function decompileIF() in the decompile.c file that causes a direct segmentation fault and leads to denial of service.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - ming**
Affected versions:
- Ming 0.4.8 (Status: affected)
### References
1. [](https://github.com/libming/libming/issues/204)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1969628) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42666
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 18:21 UTC
- **Last Updated**: September 12, 2024 at 17:53 UTC
- **Reserved Date**: September 12, 2023 at 23:06 UTC
- **Assigned By**: icscert
### Vulnerability Description
The affected product is vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability, which may allow an attacker to create malicious requests for obtaining the information of the version about the web server used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**DEXMA - DexGate**
Affected versions:
- version 20130114 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02)
### Credits
- Aarón Flecha Menéndez of S21sec reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1871
- **State**: PUBLISHED
- **Published Date**: June 07, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in the privilege system in Drupal 4.4.0 through 4.6.0, when public registration is enabled, allows remote attackers to gain privileges, due to an "input check" that "is not implemented properly."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17028](http://www.osvdb.org/17028)
2. [15372](http://secunia.com/advisories/15372)
3. [20050603 [DRUPAL-SA-2005-001] New Drupal release fixes critical security issue](http://archives.neohapsis.com/archives/fulldisclosure/2005-06/0010.html)
4. [20050603 [DRUPAL-SA-2005-001] New Drupal release fixes critical security issue](http://marc.info/?l=bugtraq&m=111782257601422&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17465
- **State**: PUBLISHED
- **Published Date**: December 08, 2017 at 05:00 UTC
- **Last Updated**: September 16, 2024 at 21:02 UTC
- **Reserved Date**: December 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x95002574 DeviceIoControl request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0keoyo/Driver-Loaded-PoC/tree/master/K7-Antivirus/K7Anti_Nullptr_Dereference_0x95002574) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33484
- **State**: PUBLISHED
- **Published Date**: September 07, 2021 at 04:59 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in CommentsService.ashx in OnyakTech Comments Pro 3.8. An attacker can download a copy of the installer, decompile it, and discover a hardcoded IV used to encrypt the username and userid in the comment POST request. Additionally, the attacker can decrypt the encrypted encryption key (sent as a parameter in the comment form request) by setting this encrypted value as the username, which will appear on the comment page in its decrypted form. Using these two values (combined with the encryption functionality discovered in the decompiled installer), the attacker can encrypt another user's ID and username. These values can be used as part of the comment posting request in order to spoof the user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://twitter.com/onyaktech)
2. [](https://burninatorsec.blogspot.com/2021/07/onyaktech-comments-pro-broken.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18647
- **State**: PUBLISHED
- **Published Date**: December 04, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 11:16 UTC
- **Reserved Date**: October 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Missing Authorization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/)
2. [](https://gitlab.com/gitlab-org/gitlab-ee/issues/7538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1112
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 17:10 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: March 28, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Autolinks**
Affected versions:
- 1.0.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505)
### Credits
- Vaibhav Nitin Gaikwad |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0150
- **State**: PUBLISHED
- **Published Date**: April 18, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1078846)
2. [DSA-2910](http://www.debian.org/security/2014/dsa-2910)
3. [USN-2182-1](http://www.ubuntu.com/usn/USN-2182-1)
4. [DSA-2909](http://www.debian.org/security/2014/dsa-2909)
5. [57878](http://secunia.com/advisories/57878)
6. [[Qemu-devel] 20140411 Re: [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun](http://article.gmane.org/gmane.comp.emulators.qemu/266768)
7. [[Qemu-devel] 20140411 [PATCH for-2.0] virtio-net: fix guest-triggerable buffer overrun](http://thread.gmane.org/gmane.comp.emulators.qemu/266713)
8. [58191](http://secunia.com/advisories/58191) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15458
- **State**: REJECTED
- **Published Date**: January 23, 2018 at 17:00 UTC
- **Last Updated**: January 23, 2018 at 16:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4072
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 00:27 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: August 02, 2023 at 00:50 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 115.0.5790.170 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1464038)
3. [](https://www.debian.org/security/2023/dsa-5467)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/)
5. [](https://security.gentoo.org/glsa/202311-11)
6. [](https://security.gentoo.org/glsa/202312-07)
7. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1277
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BackWeb client stores the username and password in cleartext for proxy authentication in the Communication registry key, which could allow other local users to gain privileges by reading the password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19981224 BackWeb - Password issue (used by NAI for Corporate customer notification).](http://marc.info/?l=ntbugtraq&m=91487886514546&w=2)
2. [backweb-cleartext-passwords(1565)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1565) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38493
- **State**: PUBLISHED
- **Published Date**: July 25, 2023 at 20:51 UTC
- **Last Updated**: October 03, 2024 at 18:47 UTC
- **Reserved Date**: July 18, 2023 at 16:28 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Armeria is a microservice framework Spring supports Matrix variables. When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path that may contain matrix variables. Prior to version 1.24.3, the Armeria decorators might not invoked because of the matrix variables. If an attacker sends a specially crafted request, the request may bypass the authorizer. Version 1.24.3 contains a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**line - armeria**
Affected versions:
- < 1.24.3 (Status: affected)
### References
1. [https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j](https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j)
2. [https://github.com/line/armeria/commit/039db50bbfc88014ea8737fd1e1ddd6fd3fc4f07](https://github.com/line/armeria/commit/039db50bbfc88014ea8737fd1e1ddd6fd3fc4f07)
3. [https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html](https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28362
- **State**: PUBLISHED
- **Published Date**: March 24, 2021 at 13:52 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denial-of-Service condition. This is related to rpl-ext-header.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kb.cert.org/vuls/id/815128)
2. [](https://github.com/contiki-os/contiki/releases) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47135
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 08:06 UTC
- **Last Updated**: January 08, 2025 at 22:02 UTC
- **Reserved Date**: December 12, 2022 at 11:41 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in chronoengine.Com Chronoforms plugin <= 7.0.9 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**chronoengine.com - Chronoforms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/chronoforms/wordpress-chronoforms-plugin-7-0-9-cross-site-request-forgery-csrf?_s_id=cve)
### Credits
- rezaduty (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20339
- **State**: PUBLISHED
- **Published Date**: October 23, 2024 at 17:09 UTC
- **Last Updated**: October 24, 2024 at 16:16 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- 6.2.3 (Status: affected)
- 6.2.3.9 (Status: affected)
- 6.2.3.1 (Status: affected)
- 6.2.3.2 (Status: affected)
- 6.2.3.10 (Status: affected)
- 6.4.0 (Status: affected)
- 6.4.0.3 (Status: affected)
- 6.4.0.4 (Status: affected)
- 6.2.3.15 (Status: affected)
- 6.2.3.6 (Status: affected)
- 6.2.3.7 (Status: affected)
- 6.2.3.12 (Status: affected)
- 6.2.3.3 (Status: affected)
- 6.2.3.11 (Status: affected)
- 6.4.0.6 (Status: affected)
- 6.2.3.13 (Status: affected)
- 6.2.3.8 (Status: affected)
- 6.2.3.4 (Status: affected)
- 6.4.0.1 (Status: affected)
- 6.2.3.5 (Status: affected)
- 6.4.0.5 (Status: affected)
- 6.2.3.14 (Status: affected)
- 6.4.0.2 (Status: affected)
- 6.4.0.8 (Status: affected)
- 6.4.0.7 (Status: affected)
- 6.6.0 (Status: affected)
- 6.4.0.9 (Status: affected)
- 6.2.3.16 (Status: affected)
- 6.6.0.1 (Status: affected)
- 6.6.1 (Status: affected)
- 6.4.0.10 (Status: affected)
- 6.7.0 (Status: affected)
- 6.4.0.11 (Status: affected)
- 6.6.3 (Status: affected)
- 6.7.0.1 (Status: affected)
- 6.6.4 (Status: affected)
- 6.4.0.12 (Status: affected)
- 6.7.0.2 (Status: affected)
- 7.0.0 (Status: affected)
- 6.2.3.17 (Status: affected)
- 7.0.0.1 (Status: affected)
- 6.6.5 (Status: affected)
- 7.0.1 (Status: affected)
- 7.1.0 (Status: affected)
- 6.4.0.13 (Status: affected)
- 6.6.5.1 (Status: affected)
- 6.2.3.18 (Status: affected)
- 7.0.1.1 (Status: affected)
- 6.7.0.3 (Status: affected)
- 6.4.0.14 (Status: affected)
- 7.1.0.1 (Status: affected)
- 6.6.5.2 (Status: affected)
- 7.0.2 (Status: affected)
- 6.4.0.15 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.2.1 (Status: affected)
- 7.0.3 (Status: affected)
- 6.6.7 (Status: affected)
- 7.2.0.1 (Status: affected)
- 7.0.4 (Status: affected)
- 7.2.1 (Status: affected)
- 7.0.5 (Status: affected)
- 6.4.0.16 (Status: affected)
- 7.3.0 (Status: affected)
- 7.2.2 (Status: affected)
- 6.6.7.1 (Status: affected)
- 7.2.3 (Status: affected)
- 7.3.1 (Status: affected)
- 7.1.0.3 (Status: affected)
- 7.2.4 (Status: affected)
- 7.0.6 (Status: affected)
- 7.2.5 (Status: affected)
- 7.2.4.1 (Status: affected)
- 7.3.1.1 (Status: affected)
- 6.4.0.17 (Status: affected)
- 7.0.6.1 (Status: affected)
- 7.2.5.1 (Status: affected)
- 6.6.7.2 (Status: affected)
- 7.2.5.2 (Status: affected)
- 7.3.1.2 (Status: affected)
### References
1. [cisco-sa-ftd-tls-dos-QXYE5Ufy](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy)
2. [https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO)
3. [Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication](https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2353
- **State**: PUBLISHED
- **Published Date**: June 21, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 21, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Node Reference module in Content Construction Kit (CCK) module 6.x before 6.x-2.7 for Drupal does not perform access checks for the source field in the backend URL for the autocomplete widget, which allows remote attackers to discover titles and IDs of controlled nodes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [65615](http://osvdb.org/65615)
2. [40243](http://secunia.com/advisories/40243)
3. [](http://drupal.org/node/829566)
4. [FEDORA-2010-10127](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043100.html)
5. [FEDORA-2010-10200](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043191.html)
6. [ADV-2010-1546](http://www.vupen.com/english/advisories/2010/1546)
7. [40318](http://secunia.com/advisories/40318)
8. [FEDORA-2010-10176](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043172.html)
9. [cck-noderef-info-disc(59515)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19955
- **State**: PUBLISHED
- **Published Date**: November 02, 2020 at 15:57 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: December 07, 2018 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-80: Security Weakness
### Affected Products
**QNAP Systems Inc. - Photo Station**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-20-11)
### Credits
- Independent Security Evaluators |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41949
- **State**: PUBLISHED
- **Published Date**: September 25, 2023 at 00:31 UTC
- **Last Updated**: September 24, 2024 at 14:23 UTC
- **Reserved Date**: September 06, 2023 at 08:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Avirtum iFolders plugin <= 1.5.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Avirtum - iFolders**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ifolders/wordpress-ifolders-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- emad (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39449
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 18:50 UTC
- **Last Updated**: May 19, 2025 at 21:22 UTC
- **Reserved Date**: April 16, 2025 at 06:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Crocoblock JetWooBuilder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JetWooBuilder: from n/a through 2.1.18.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Crocoblock - JetWooBuilder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/jet-woo-builder/vulnerability/wordpress-jetwoobuilder-2-1-18-broken-access-control-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42905
- **State**: PUBLISHED
- **Published Date**: August 28, 2024 at 00:00 UTC
- **Last Updated**: August 28, 2024 at 18:36 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Beijing Digital China Cloud Technology Co., Ltd. DCME-320 v.7.4.12.60 has a command execution vulnerability, which can be exploited to obtain device administrator privileges via the getVar function in the code/function/system/tool/ping.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://immense-mirror-b42.notion.site/Beijing-Digital-China-Yunke-Information-Technology-Co-Ltd-DCN-firewall-has-a-command-execution-vuln-31bdd1228f6d47c09e854af5f0e7059f)
2. [](https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23375
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 19:13 UTC
- **Last Updated**: January 23, 2025 at 01:04 UTC
- **Reserved Date**: January 11, 2023 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Microsoft OLE DB Driver 18 for SQL Server**
Affected versions:
- 18.0.0 (Status: affected)
**Microsoft - Microsoft OLE DB Driver 19 for SQL Server**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server**
Affected versions:
- 18.0.0.0 (Status: affected)
### References
1. [Microsoft ODBC and OLE DB Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23375) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9238
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 28, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the NFC stack, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121267042
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0898
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 16:34 UTC
- **Last Updated**: January 16, 2025 at 21:26 UTC
- **Reserved Date**: February 17, 2023 at 21:23 UTC
- **Assigned By**: icscert
### Vulnerability Description
General Electric MiCOM S1 Agile is vulnerable to an attacker achieving code execution by placing malicious DLL files in the directory of the application.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**General Electric - MiCOM S1 Agile**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-311-23)
### Credits
- Sushant Mane from CoE-CNDS Lab, VJTI
- Anooja Joy from CoE-CNDS Lab, VJTI
- Dr. Faruk Kazi from CoE-CNDS Lab, VJTI |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40938
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:25 UTC
- **Last Updated**: May 04, 2025 at 09:18 UTC
- **Reserved Date**: July 12, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
landlock: Fix d_parent walk
The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when
trying to link a root mount point. This cannot work in practice because
this directory is mounted, but the VFS check is done after the call to
security_path_link().
Do not use source directory's d_parent when the source directory is the
mount point.
[mic: Fix commit message]
### Affected Products
**Linux - Linux**
Affected versions:
- b91c3e4ea756b12b7d992529226edce1cfd854d7 (Status: affected)
- b91c3e4ea756b12b7d992529226edce1cfd854d7 (Status: affected)
- b91c3e4ea756b12b7d992529226edce1cfd854d7 (Status: affected)
- b91c3e4ea756b12b7d992529226edce1cfd854d7 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.95 (Status: unaffected)
- 6.6.35 (Status: unaffected)
- 6.9.6 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f)
2. [](https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11)
3. [](https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6)
4. [](https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21348
- **State**: PUBLISHED
- **Published Date**: October 30, 2023 at 16:56 UTC
- **Last Updated**: September 06, 2024 at 19:40 UTC
- **Reserved Date**: November 03, 2022 at 22:37 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Window Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
### References
1. [](https://source.android.com/docs/security/bulletin/android-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6987
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Mass Gaming TV (aka net.massgamers) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#194153](http://www.kb.cert.org/vuls/id/194153)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22304
- **State**: PUBLISHED
- **Published Date**: January 31, 2024 at 12:15 UTC
- **Last Updated**: May 23, 2025 at 16:00 UTC
- **Reserved Date**: January 08, 2024 at 20:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Borbis Media FreshMail For WordPress.This issue affects FreshMail For WordPress: from n/a through 2.3.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Borbis Media - FreshMail For WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/freshmail-integration/wordpress-freshmail-for-wordpress-plugin-2-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0763
- **State**: PUBLISHED
- **Published Date**: March 29, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 17, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-698](http://www.debian.org/security/2005/dsa-698)
2. [RHSA-2005:512](http://www.redhat.com/support/errata/RHSA-2005-512.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38438
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 18:15 UTC
- **Last Updated**: April 23, 2025 at 16:55 UTC
- **Reserved Date**: August 18, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-40.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37994
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 21:05 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1100761)
3. [DSA-5046](https://www.debian.org/security/2022/dsa-5046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42337
- **State**: REJECTED
- **Last Updated**: July 02, 2023 at 21:50 UTC
- **Reserved Date**: October 03, 2022 at 16:02 UTC
- **Assigned By**: XEN
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23947
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:08 UTC
- **Last Updated**: January 17, 2025 at 21:07 UTC
- **Reserved Date**: January 16, 2025 at 11:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M.J WP-Player allows Stored XSS.This issue affects WP-Player: from n/a through 2.6.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**M.J - WP-Player**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-player/vulnerability/wordpress-wp-player-plugin-2-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28698
- **State**: PUBLISHED
- **Published Date**: August 27, 2021 at 18:32 UTC
- **Last Updated**: August 03, 2024 at 21:47 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.
### Affected Products
**Xen - xen**
Affected versions:
- 4.14.x (Status: affected)
**Xen - xen**
Affected versions:
- unspecified (Status: unknown)
- 4.15.x (Status: affected)
- next of xen-unstable (Status: unaffected)
**Xen - xen**
Affected versions:
- 4.13.x (Status: affected)
**Xen - xen**
Affected versions:
- 4.11.x (Status: affected)
**Xen - xen**
Affected versions:
- 4.12.x (Status: affected)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-380.txt)
2. [[oss-security] 20210901 Xen Security Advisory 380 v3 (CVE-2021-28698) - long running loops in grant table handling](http://www.openwall.com/lists/oss-security/2021/09/01/2)
3. [FEDORA-2021-4f129cc0c1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPRVHW4J4ZCPPOHZEWP5MOJT7XDGFFPJ/)
4. [FEDORA-2021-d68ed12e46](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZCNPSRPGFCQRYE2BI4D4Q4SCE56ANV2/)
5. [DSA-4977](https://www.debian.org/security/2021/dsa-4977)
6. [FEDORA-2021-081f9bf5d2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VQCFAPBNGBBAOMJZG6QBREOG5IIDZID/)
7. [GLSA-202208-23](https://security.gentoo.org/glsa/202208-23)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Andrew Cooper of Citrix.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22936
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:28 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
### Affected Products
**n/a - SaltStack Salt**
Affected versions:
- SaltStack Salt prior to 3002.8, 3003.4, 3004.1 (Status: affected)
### References
1. [](https://saltproject.io/security_announcements/salt-security-advisory-release/%2C)
2. [](https://github.com/saltstack/salt/releases%2C)
3. [](https://repo.saltproject.io/)
4. [GLSA-202310-22](https://security.gentoo.org/glsa/202310-22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8907
- **State**: PUBLISHED
- **Published Date**: June 22, 2020 at 13:45 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 12, 2020 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using their membership to the "docker" group, an attacker with this role is able to run docker and mount the host OS. Within docker, it is possible to modify the host OS filesystem and modify /etc/groups to gain administrative privileges. All images created after 2020-May-07 (20200507) are fixed, and if you cannot update, we recommend you edit /etc/group/security.conf and remove the "docker" user from the OS Login entry.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Google LLC - guest-oslogin**
Affected versions:
- 20190304 (Status: affected)
- 20200507 (Status: unaffected)
### References
1. [](https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29)
2. [](https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020)
3. [](https://cloud.google.com/support/bulletins/#gcp-2020-008)
4. [openSUSE-SU-2020:0996](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html)
5. [openSUSE-SU-2020:1014](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html)
### Credits
- Chris Moberly |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0694
- **State**: PUBLISHED
- **Published Date**: February 23, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 00:59 UTC
- **Reserved Date**: February 23, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the PerchaGallery (com_perchagallery) component before 1.5b for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an editunidad action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://docs.joomla.org/Vulnerable_Extensions_List#New_format_Feed_Starts_Here)
2. [perchagallery-index-sql-injection(55447)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55447)
3. [](http://packetstormsecurity.org/1001-exploits/joomlaperchagallery-sql.txt)
4. [37642](http://www.securityfocus.com/bid/37642)
5. [11024](http://www.exploit-db.com/exploits/11024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0299
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in GForge 3.3 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the (1) dir parameter to controller.php or (2) dir_name parameter to controlleroo.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [gforge-dir-dirname-directory-traversal(18988)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18988)
2. [12318](http://www.securityfocus.com/bid/12318)
3. [20050120 STG Security Advisory: [SSA-20050120-24] GForge 3.x directory](http://marc.info/?l=bugtraq&m=110627132209963&w=2)
4. [1012950](http://securitytracker.com/id?1012950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27106
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 17:01 UTC
- **Last Updated**: August 02, 2024 at 00:27 UTC
- **Reserved Date**: February 19, 2024 at 15:22 UTC
- **Assigned By**: GEHC
### Vulnerability Description
Vulnerable data in transit in GE HealthCare EchoPAC products
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**GE HealthCare - EchoPAC Software Only**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - ImageVault**
Affected versions:
- 0 (Status: affected)
**GE HealthCare - EchoPAC Turnkey**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://securityupdate.gehealthcare.com/)
### Credits
- Andrea Palanca and Gabriele Quagliarella of Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0401
- **State**: PUBLISHED
- **Published Date**: May 14, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: April 13, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in libtasn1 0.1.x before 0.1.2, and 0.2.x before 0.2.7, related to the DER parsing functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15126](http://www.osvdb.org/15126)
2. [1010159](http://securitytracker.com/id?1010159)
3. [libtasn1-der-parsing(16157)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16157)
4. [](http://www.backports.org/changelog.html)
5. [10360](http://www.securityfocus.com/bid/10360)
6. [](http://packages.debian.org/changelogs/pool/main/libt/libtasn1-2/libtasn1-2_0.2.13-1/changelog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18316
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 1099/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Siemens - SPPA-T3000 Application Server**
Affected versions:
- All versions < Service Pack R8.2 SP2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13975
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31143
- **State**: REJECTED
- **Published Date**: August 24, 2021 at 18:53 UTC
- **Last Updated**: August 24, 2021 at 18:53 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1986
- **State**: PUBLISHED
- **Published Date**: May 20, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 20, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox 3.6.3 on Windows XP SP3 allows remote attackers to cause a denial of service (memory consumption and application crash) via JavaScript code that creates multiple arrays containing elements with long string values, and then appends long strings to the content of a P element, related to the gfxWindowsFontGroup::MakeTextRun function in xul.dll, a different vulnerability than CVE-2009-1571.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64791](http://www.osvdb.org/64791)
2. [12678](http://www.exploit-db.com/exploits/12678)
3. [](http://www.x90c.org/advisories/firefox_3.6.3_crash_advisory.txt)
4. [20100518 Firefox 3.6.3 (latest) <= memory exhaustion crash vulnerabilities](http://www.securityfocus.com/archive/1/511329/100/0/threaded)
5. [firefox-javascriptcode-dos(58761)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58761)
6. [oval:org.mitre.oval:def:12433](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12248
- **State**: PUBLISHED
- **Published Date**: January 30, 2025 at 18:17 UTC
- **Last Updated**: February 12, 2025 at 16:53 UTC
- **Reserved Date**: December 05, 2024 at 15:20 UTC
- **Assigned By**: icscert
### Vulnerability Description
Contec Health CMS8000 Patient Monitor is vulnerable to an out-of-bounds write, which could allow an attacker to send specially formatted UDP requests in order to write arbitrary data. This could result in remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Contec Health - CMS8000 Patient Monitor**
Affected versions:
- Firmware version smart3250-2.6.27-wlan2.1.7.cramfs (Status: affected)
- Firmware version CMS7.820.075.08/0.74(0.75) (Status: affected)
- Firmware version CMS7.820.120.01/0.93(0.95) (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01)
2. [](https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication)
### Credits
- An anonymous researcher reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9615
- **State**: PUBLISHED
- **Published Date**: June 25, 2020 at 21:21 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a race condition vulnerability. Successful exploitation could lead to security feature bypass.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb20-24.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8657
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 12, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2017:0828](http://rhn.redhat.com/errata/RHSA-2017-0828.html)
2. [RHSA-2017:0827](http://rhn.redhat.com/errata/RHSA-2017-0827.html)
3. [RHSA-2018:1609](https://access.redhat.com/errata/RHSA-2018:1609)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8657)
5. [RHSA-2017:0826](http://rhn.redhat.com/errata/RHSA-2017-0826.html)
6. [RHSA-2017:0829](http://rhn.redhat.com/errata/RHSA-2017-0829.html)
7. [96896](http://www.securityfocus.com/bid/96896) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39118
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 00:00 UTC
- **Last Updated**: March 14, 2025 at 15:59 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mommy Heather Advanced Backups up to v3.5.3 allows attackers to write arbitrary files via restoring a crafted back up.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:N/C:N/I:H/PR:N/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed)
2. [](https://github.com/MommyHeather/AdvancedBackups/commit/1545f499f73bf434ed292c31121fdda8042ff5d6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2497
- **State**: PUBLISHED
- **Published Date**: March 21, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 14, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2014:0868](http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html)
2. [MDVSA-2015:153](http://www.mandriva.com/security/advisories?name=MDVSA-2015:153)
3. [59418](http://secunia.com/advisories/59418)
4. [](https://support.apple.com/HT204659)
5. [59496](http://secunia.com/advisories/59496)
6. [RHSA-2014:1766](http://rhn.redhat.com/errata/RHSA-2014-1766.html)
7. [59652](http://secunia.com/advisories/59652)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=1076676)
9. [SUSE-SU-2014:0869](http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html)
10. [DSA-3215](http://www.debian.org/security/2015/dsa-3215)
11. [59061](http://secunia.com/advisories/59061)
12. [GLSA-201607-04](https://security.gentoo.org/glsa/201607-04)
13. [RHSA-2014:1326](http://rhn.redhat.com/errata/RHSA-2014-1326.html)
14. [](http://advisories.mageia.org/MGASA-2014-0288.html)
15. [APPLE-SA-2015-04-08-2](http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html)
16. [66233](http://www.securityfocus.com/bid/66233)
17. [USN-2987-1](http://www.ubuntu.com/usn/USN-2987-1)
18. [RHSA-2014:1327](http://rhn.redhat.com/errata/RHSA-2014-1327.html)
19. [](http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html)
20. [RHSA-2014:1765](http://rhn.redhat.com/errata/RHSA-2014-1765.html)
21. [](https://bugs.php.net/bug.php?id=66901) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25190
- **State**: PUBLISHED
- **Published Date**: February 10, 2025 at 22:11 UTC
- **Last Updated**: February 11, 2025 at 16:07 UTC
- **Reserved Date**: February 03, 2025 at 19:30 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The ZOO-Project is an open source processing platform. The ZOO-Project Web Processing Service (WPS) Server contains a Cross-Site Scripting (XSS) vulnerability in its EchoProcess service prior to commit 7a5ae1a. The vulnerability exists because the EchoProcess service directly reflects user input in its output without proper sanitization when handling complex inputs.The service accepts various input formats including XML, JSON, and SVG, and returns the content based on the requested MIME type. When processing SVG content and returning it with the image/svg+xml MIME type, the server fails to sanitize potentially malicious JavaScript in attributes like onload, allowing arbitrary JavaScript execution in the victim's browser context. This vulnerability is particularly dangerous because it exists in a service specifically designed to echo back user input, and the lack of proper sanitization in combination with SVG handling creates a reliable XSS vector. Commit 7a5ae1a contains a fix for the issue.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ZOO-Project - ZOO-Project**
Affected versions:
- < 7a5ae1a (Status: affected)
### References
1. [https://github.com/ZOO-Project/ZOO-Project/security/advisories/GHSA-2569-6r9f-j7jv](https://github.com/ZOO-Project/ZOO-Project/security/advisories/GHSA-2569-6r9f-j7jv)
2. [https://github.com/ZOO-Project/ZOO-Project/commit/7a5ae1a10faa2f9877d18ec72550dc23e8ce1aac](https://github.com/ZOO-Project/ZOO-Project/commit/7a5ae1a10faa2f9877d18ec72550dc23e8ce1aac) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23624
- **State**: PUBLISHED
- **Published Date**: February 07, 2022 at 22:15 UTC
- **Last Updated**: April 23, 2025 at 19:06 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**frouriojs - frourio-express**
Affected versions:
- < 0.26.0 (Status: affected)
### References
1. [](https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9)
2. [](https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12667
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/553)
2. [](https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20668
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 02:49 UTC
- **Last Updated**: May 07, 2025 at 14:57 UTC
- **Reserved Date**: November 01, 2024 at 01:21 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In scp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09625562; Issue ID: MSV-3027.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**MediaTek, Inc. - MT6878, MT6897, MT6899, MT6989, MT6991, MT8775, MT8796**
Affected versions:
- Android 14.0, 15.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/May-2025) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28633
- **State**: PUBLISHED
- **Published Date**: April 18, 2022 at 16:56 UTC
- **Last Updated**: April 23, 2025 at 18:35 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sedge() seh->prev().
### Weakness Classification (CWE)
- CWE-129: Security Weakness
### Affected Products
**CGAL Project - libcgal**
Affected versions:
- CGAL-5.1.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225)
2. [[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update](https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html)
3. [GLSA-202305-34](https://security.gentoo.org/glsa/202305-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47464
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:09 UTC
- **Reserved Date**: November 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via the upload API function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5352
- **State**: PUBLISHED
- **Published Date**: February 19, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 19, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2015-2347](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html)
2. [](http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt)
3. [RHSA-2015:0794](http://rhn.redhat.com/errata/RHSA-2015-0794.html)
4. [FEDORA-2015-2382](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html)
5. [DSA-3153](http://www.debian.org/security/2015/dsa-3153)
6. [openSUSE-SU-2015:0255](http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html)
7. [RHSA-2015:0439](http://rhn.redhat.com/errata/RHSA-2015-0439.html)
8. [SUSE-SU-2015:0290](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html)
9. [MDVSA-2015:069](http://www.mandriva.com/security/advisories?name=MDVSA-2015:069)
10. [USN-2498-1](http://www.ubuntu.com/usn/USN-2498-1)
11. [SUSE-SU-2015:0257](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html)
12. [72495](http://www.securityfocus.com/bid/72495)
13. [](https://github.com/krb5/krb5/commit/82dc33da50338ac84c7b4102dc6513d897d0506a)
14. [](http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1270
- **State**: PUBLISHED
- **Published Date**: March 08, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 05:40 UTC
- **Reserved Date**: March 08, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting in GitHub repository btcpayserver/btcpayserver prior to 1.8.3.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**btcpayserver - btcpayserver/btcpayserver**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b)
2. [](https://github.com/btcpayserver/btcpayserver/commit/7b5ce8f70c060b01990d3f7109e97e0144d878a4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22655
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:17 UTC
- **Last Updated**: April 17, 2025 at 15:45 UTC
- **Reserved Date**: January 07, 2025 at 21:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Caio Web Dev CWD – Stealth Links allows SQL Injection. This issue affects CWD – Stealth Links: from n/a through 1.3.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Caio Web Dev - CWD – Stealth Links**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cwd-stealth-links/vulnerability/wordpress-cwd-stealth-links-plugin-1-3-sql-injection-vulnerability?_s_id=cve)
### Credits
- Thái An (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0232
- **State**: PUBLISHED
- **Published Date**: January 27, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2015:032](http://www.mandriva.com/security/advisories?name=MDVSA-2015:032)
2. [DSA-3195](http://www.debian.org/security/2015/dsa-3195)
3. [72541](http://www.securityfocus.com/bid/72541)
4. [HPSBMU03409](http://marc.info/?l=bugtraq&m=144050155601375&w=2)
5. [SUSE-SU-2015:0365](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html)
6. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df)
7. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html)
8. [HPSBMU03380](http://marc.info/?l=bugtraq&m=143748090628601&w=2)
9. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
10. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html)
12. [](https://bugs.php.net/bug.php?id=68799)
13. [openSUSE-SU-2015:0325](http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html)
14. [](https://support.apple.com/HT205267)
15. [](http://www.php.net/ChangeLog-5.php)
16. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf)
17. [](https://bugzilla.redhat.com/show_bug.cgi?id=1185472)
18. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html)
19. [RHSA-2015:1053](http://rhn.redhat.com/errata/RHSA-2015-1053.html)
20. [GLSA-201503-03](https://security.gentoo.org/glsa/201503-03)
21. [](http://advisories.mageia.org/MGASA-2015-0040.html)
22. [RHSA-2015:1066](http://rhn.redhat.com/errata/RHSA-2015-1066.html)
23. [RHSA-2015:1218](http://rhn.redhat.com/errata/RHSA-2015-1218.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38169
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 17:08 UTC
- **Last Updated**: February 27, 2025 at 21:07 UTC
- **Reserved Date**: July 12, 2023 at 23:41 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft SQL OLE DB Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft OLE DB Driver 19 for SQL Server**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft OLE DB Driver 18 for SQL Server**
Affected versions:
- 18.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Linux**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on MacOS**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (CU 5)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Linux**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on MacOS**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (CU 21)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Windows**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Windows**
Affected versions:
- 18.0.0.0 (Status: affected)
### References
1. [Microsoft SQL OLE DB Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4310
- **State**: PUBLISHED
- **Published Date**: January 09, 2023 at 22:13 UTC
- **Last Updated**: April 09, 2025 at 19:23 UTC
- **Reserved Date**: December 06, 2022 at 15:29 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Slimstat Analytics WordPress plugin before 4.9.3 does not sanitise and escape the URI when logging requests, which could allow unauthenticated attackers to perform Stored Cross-Site Scripting attacks against logged in admin viewing the logs
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Slimstat Analytics**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821)
### Credits
- Bilal Chawich
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36686
- **State**: PUBLISHED
- **Published Date**: January 26, 2023 at 00:00 UTC
- **Last Updated**: April 01, 2025 at 14:03 UTC
- **Reserved Date**: July 12, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/YMFE/yapi/issues/2190)
2. [](https://github.com/YMFE/yapi/issues/2240) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10275
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:09 UTC
- **Last Updated**: March 20, 2025 at 18:57 UTC
- **Reserved Date**: October 23, 2024 at 05:23 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation scenario where an administrator can manage billing, effectively bypassing the intended role-based access control. Only users with the 'owner' role should be allowed to invite members with billing permissions. This flaw allows admins to circumvent those restrictions, gaining unauthorized access and control over billing information, posing a risk to the organization’s financial resources.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**lunary-ai - lunary-ai/lunary**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/863ee34b-c4c6-4325-bf7a-82a7feebf88f)
2. [](https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35902
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 08:22 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: December 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the actix-codec crate before 0.3.0-beta.1 for Rust. There is a use-after-free in Framed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0049.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21619
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 16:28 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u341 (Status: affected)
- Oracle Java SE:8u345-perf (Status: affected)
- Oracle Java SE:11.0.16.1 (Status: affected)
- Oracle Java SE:17.0.4.1 (Status: affected)
- Oracle Java SE:19 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.7 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.3 (Status: affected)
- Oracle GraalVM Enterprise Edition:22.2.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2022.html)
2. [](https://security.netapp.com/advisory/ntap-20221028-0012/)
3. [FEDORA-2022-b050ae8974](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/)
4. [FEDORA-2022-5d494ab9ab](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/)
5. [FEDORA-2022-1c07902a5e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/)
6. [FEDORA-2022-361f34f2a9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/)
7. [FEDORA-2022-f76014ae17](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/)
8. [FEDORA-2022-d989953883](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/)
9. [](https://security.gentoo.org/glsa/202401-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4588
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 11:43 UTC
- **Last Updated**: September 06, 2024 at 14:12 UTC
- **Reserved Date**: August 29, 2023 at 07:44 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
File accessibility vulnerability in Delinea Secret Server, in its v10.9.000002 and v11.4.000002 versions. Exploitation of this vulnerability could allow an authenticated user with administrative privileges to create a backup file in the application's webroot directory, changing the default backup directory to the wwwroot folder, and download it with some configuration files such as encryption.config/ and database.config stored in the wwwroot directory, exposing the database credentials in plain text.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**Delinea - Secret Server**
Affected versions:
- v10.9.000002 (Status: affected)
- v11.4.000002 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-delinea-secret-server)
### Credits
- Héctor de Armas Padrón (@3v4SI0N) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8602
- **State**: PUBLISHED
- **Published Date**: December 17, 2015 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 02:56 UTC
- **Reserved Date**: December 17, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Token Insert Entity module 7.x-1.x before 7.x-1.1 for Drupal does not properly check permissions, which allows remote authenticated users with certain permissions to bypass intended access restrictions and possibly obtain sensitive information by inserting a token, which embeds a rendered entity in the main node.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2627638)
2. [](https://www.drupal.org/node/2571905) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43786
- **State**: PUBLISHED
- **Published Date**: November 29, 2021 at 19:30 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**NodeBB - NodeBB**
Affected versions:
- >= 1.15.0, < 1.18.5 (Status: affected)
### References
1. [](https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5)
2. [](https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw)
3. [](https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500)
4. [](https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30559
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 17:50 UTC
- **Last Updated**: August 02, 2024 at 14:28 UTC
- **Reserved Date**: April 12, 2023 at 16:30 UTC
- **Assigned By**: BD
### Vulnerability Description
The firmware update package for the wireless card is not properly signed and can be modified.
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
- CWE-345: Security Weakness
### Affected Products
**Becton Dickinson & Co - BD Alaris™ Point-of-Care Unit (PCU) Model 8015**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3480
- **State**: PUBLISHED
- **Published Date**: May 20, 2021 at 12:14 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**n/a - slapi-nis**
Affected versions:
- slapi-nis 0.56.7 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1944640)
2. [FEDORA-2021-f93243d461](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MXMOMPTZTGOVFOZUUNXHOVCAYIPST74W/)
3. [FEDORA-2021-a4ee3426c4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVQCDRQRFHXVR3Z3FQYM3UMC7QZUDDRJ/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.