System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56803 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 22:48 UTC - **Last Updated**: January 02, 2025 at 16:09 UTC - **Reserved Date**: December 30, 2024 at 16:09 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Ghostty is a cross-platform terminal emulator. Ghostty, as allowed by default in 1.0.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. This attack requires an attacker to send malicious escape sequences followed by convincing the user to physically press the "enter" key. Fixed in Ghostty v1.0.1. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **ghostty-org - ghostty** Affected versions: - < 1.0.1 (Status: affected) ### References 1. [https://github.com/ghostty-org/ghostty/security/advisories/GHSA-5hcq-3j4q-4v6p](https://github.com/ghostty-org/ghostty/security/advisories/GHSA-5hcq-3j4q-4v6p) 2. [https://github.com/ghostty-org/ghostty/pull/3908](https://github.com/ghostty-org/ghostty/pull/3908)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37273 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 22:33 UTC - **Last Updated**: October 30, 2024 at 18:46 UTC - **Reserved Date**: June 29, 2023 at 19:35 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Significant-Gravitas - Auto-GPT** Affected versions: - < 0.4.3 (Status: affected) ### References 1. [https://github.com/Significant-Gravitas/Auto-GPT/security/advisories/GHSA-x5gj-2chr-4ch6](https://github.com/Significant-Gravitas/Auto-GPT/security/advisories/GHSA-x5gj-2chr-4ch6) 2. [https://github.com/Significant-Gravitas/Auto-GPT/pull/4761](https://github.com/Significant-Gravitas/Auto-GPT/pull/4761)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10762 - **State**: REJECTED - **Published Date**: June 04, 2018 at 06:00 UTC - **Last Updated**: June 04, 2018 at 05:57 UTC - **Reserved Date**: May 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8075 - **State**: PUBLISHED - **Published Date**: October 09, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 13:10 UTC - **Reserved Date**: October 09, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Tribune module 6.x-1.x and 7.x-3.x for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [65236](http://www.securityfocus.com/bid/65236) 2. [tribune-module-drupal-xss(90830)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90830) 3. [](https://www.drupal.org/node/2184845) 4. [102655](http://osvdb.org/102655)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36202 - **State**: PUBLISHED - **Published Date**: June 13, 2024 at 07:52 UTC - **Last Updated**: October 07, 2024 at 13:14 UTC - **Reserved Date**: May 21, 2024 at 17:07 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18285, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18285 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18285 - **State**: PUBLISHED - **Published Date**: June 04, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: June 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Gentoo app-backup/burp package before 2.1.32 has incorrect group ownership of the /etc/burp directory, which might allow local users to obtain read and write access to arbitrary files by leveraging access to a certain account for a burp-server.conf change. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201806-03](https://security.gentoo.org/glsa/201806-03) 2. [](https://bugs.gentoo.org/641842) 3. [GLSA-201904-05](https://security.gentoo.org/glsa/201904-05)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-2020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-2020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-2020 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 17:54 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Netgear RP114 Cable/DSL Web Safe Router Firmware 3.26 uses a default administrator password and accepts admin logins on the external interface, which allows remote attackers to gain privileges if the password is not changed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5036](http://www.securityfocus.com/bid/5036) 2. [20020617 External access to Netgear RP114 "firewall"](http://archives.neohapsis.com/archives/bugtraq/2002-06/0177.html) 3. [netgear-default-external-access(9371)](http://www.iss.net/security_center/static/9371.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3513 - **State**: PUBLISHED - **Published Date**: August 07, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 09:45 UTC - **Reserved Date**: August 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Book Catalog module 1.0 for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action to modules.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [bookcatalog-modulesphp-sql-injection(44434)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44434) 2. [20081030 PHP-Nuke Module BookCatalog (category&catid) Remote SQL injection Vulnerability](http://www.securityfocus.com/archive/1/497929/100/0/threaded) 3. [32500](http://secunia.com/advisories/32500) 4. [](http://www.securityfocus.com/bid/30511/exploit) 5. [](http://packetstorm.linuxsecurity.com/0810-exploits/phpnukebook-sql.txt) 6. [30511](http://www.securityfocus.com/bid/30511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1585 - **State**: PUBLISHED - **Published Date**: July 19, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 19:24 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 143498. ### Affected Products **IBM - Rational Software Architect Design Manager** Affected versions: - 5.0 (Status: affected) - 5.0.2 (Status: affected) - 5.0.1 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) **IBM - Rational Rhapsody Design Manager** Affected versions: - 5.0 (Status: affected) - 5.0.2 (Status: affected) - 5.0.1 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) - 6.0.5 (Status: affected) ### References 1. [ibm-rhapsody-cve20181585-xss(143498)](https://exchange.xforce.ibmcloud.com/vulnerabilities/143498) 2. [](http://www.ibm.com/support/docview.wss?uid=ibm10716029)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4194 - **State**: PUBLISHED - **Published Date**: May 17, 2025 at 03:24 UTC - **Last Updated**: May 19, 2025 at 15:39 UTC - **Reserved Date**: May 01, 2025 at 13:10 UTC - **Assigned By**: Wordfence ### Vulnerability Description The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **alti5 - AlT Monitoring** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b7290317-418d-4e5c-85fa-f931cc4a865b?source=cve) 2. [](https://wordpress.org/plugins/alt-monitoring/) ### Credits - Johannes Skamletz
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20247 - **State**: PUBLISHED - **Published Date**: February 23, 2021 at 18:45 UTC - **Last Updated**: August 03, 2024 at 17:37 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access data outside the designated mailbox on the opposite end of the synchronization channel. The highest threat from this vulnerability is to data confidentiality and integrity. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - isync/mbsync** Affected versions: - before 1.35 (Status: affected) - before 1.4.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1928963) 2. [](https://www.openwall.com/lists/oss-security/2021/02/22/1) 3. [FEDORA-2021-954ebabcf7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXQLCK35QGRCRENRTGKJO4VVZGUXUJJ/) 4. [FEDORA-2021-ef8c2acfce](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVDEBZQJMWDW5JFK4NTHH6DAFNAZTESW/) 5. [[debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update](https://lists.debian.org/debian-lts-announce/2022/07/msg00001.html) 6. [GLSA-202208-15](https://security.gentoo.org/glsa/202208-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-53098, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-53098 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-53098 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 15:55 UTC - **Last Updated**: May 04, 2025 at 07:49 UTC - **Reserved Date**: May 02, 2025 at 15:51 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: media: rc: gpio-ir-recv: add remove function In case runtime PM is enabled, do runtime PM clean up to remove cpu latency qos request, otherwise driver removal may have below kernel dump: [ 19.463299] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000048 [ 19.472161] Mem abort info: [ 19.474985] ESR = 0x0000000096000004 [ 19.478754] EC = 0x25: DABT (current EL), IL = 32 bits [ 19.484081] SET = 0, FnV = 0 [ 19.487149] EA = 0, S1PTW = 0 [ 19.490361] FSC = 0x04: level 0 translation fault [ 19.495256] Data abort info: [ 19.498149] ISV = 0, ISS = 0x00000004 [ 19.501997] CM = 0, WnR = 0 [ 19.504977] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000049f81000 [ 19.511432] [0000000000000048] pgd=0000000000000000, p4d=0000000000000000 [ 19.518245] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 19.524520] Modules linked in: gpio_ir_recv(+) rc_core [last unloaded: rc_core] [ 19.531845] CPU: 0 PID: 445 Comm: insmod Not tainted 6.2.0-rc1-00028-g2c397a46d47c #72 [ 19.531854] Hardware name: FSL i.MX8MM EVK board (DT) [ 19.531859] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 19.551777] pc : cpu_latency_qos_remove_request+0x20/0x110 [ 19.557277] lr : gpio_ir_recv_runtime_suspend+0x18/0x30 [gpio_ir_recv] [ 19.557294] sp : ffff800008ce3740 [ 19.557297] x29: ffff800008ce3740 x28: 0000000000000000 x27: ffff800008ce3d50 [ 19.574270] x26: ffffc7e3e9cea100 x25: 00000000000f4240 x24: ffffc7e3f9ef0e30 [ 19.574284] x23: 0000000000000000 x22: ffff0061803820f4 x21: 0000000000000008 [ 19.574296] x20: ffffc7e3fa75df30 x19: 0000000000000020 x18: ffffffffffffffff [ 19.588570] x17: 0000000000000000 x16: ffffc7e3f9efab70 x15: ffffffffffffffff [ 19.595712] x14: ffff800008ce37b8 x13: ffff800008ce37aa x12: 0000000000000001 [ 19.602853] x11: 0000000000000001 x10: ffffcbe3ec0dff87 x9 : 0000000000000008 [ 19.609991] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 000000000f0bfe9f [ 19.624261] x5 : 00ffffffffffffff x4 : 0025ab8e00000000 x3 : ffff006180382010 [ 19.631405] x2 : ffffc7e3e9ce8030 x1 : ffffc7e3fc3eb810 x0 : 0000000000000020 [ 19.638548] Call trace: [ 19.640995] cpu_latency_qos_remove_request+0x20/0x110 [ 19.646142] gpio_ir_recv_runtime_suspend+0x18/0x30 [gpio_ir_recv] [ 19.652339] pm_generic_runtime_suspend+0x2c/0x44 [ 19.657055] __rpm_callback+0x48/0x1dc [ 19.660807] rpm_callback+0x6c/0x80 [ 19.664301] rpm_suspend+0x10c/0x640 [ 19.667880] rpm_idle+0x250/0x2d0 [ 19.671198] update_autosuspend+0x38/0xe0 [ 19.675213] pm_runtime_set_autosuspend_delay+0x40/0x60 [ 19.680442] gpio_ir_recv_probe+0x1b4/0x21c [gpio_ir_recv] [ 19.685941] platform_probe+0x68/0xc0 [ 19.689610] really_probe+0xc0/0x3dc [ 19.693189] __driver_probe_device+0x7c/0x190 [ 19.697550] driver_probe_device+0x3c/0x110 [ 19.701739] __driver_attach+0xf4/0x200 [ 19.705578] bus_for_each_dev+0x70/0xd0 [ 19.709417] driver_attach+0x24/0x30 [ 19.712998] bus_add_driver+0x17c/0x240 [ 19.716834] driver_register+0x78/0x130 [ 19.720676] __platform_driver_register+0x28/0x34 [ 19.725386] gpio_ir_recv_driver_init+0x20/0x1000 [gpio_ir_recv] [ 19.731404] do_one_initcall+0x44/0x2ac [ 19.735243] do_init_module+0x48/0x1d0 [ 19.739003] load_module+0x19fc/0x2034 [ 19.742759] __do_sys_finit_module+0xac/0x12c [ 19.747124] __arm64_sys_finit_module+0x20/0x30 [ 19.751664] invoke_syscall+0x48/0x114 [ 19.755420] el0_svc_common.constprop.0+0xcc/0xec [ 19.760132] do_el0_svc+0x38/0xb0 [ 19.763456] el0_svc+0x2c/0x84 [ 19.766516] el0t_64_sync_handler+0xf4/0x120 [ 19.770789] el0t_64_sync+0x190/0x194 [ 19.774460] Code: 910003fd a90153f3 aa0003f3 91204021 (f9401400) [ 19.780556] ---[ end trace 0000000000000000 ]--- ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.10.175 (Status: unaffected) - 5.15.103 (Status: unaffected) - 6.1.20 (Status: unaffected) - 6.2.7 (Status: unaffected) - 6.3 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/a5c140d88a69eb43de2a030f1d7ff7b16bff3b1a) 2. [](https://git.kernel.org/stable/c/513572bb89e8075f5d2a2bb4c89f1152e44da9d8) 3. [](https://git.kernel.org/stable/c/00e81f191bc00cb6faabf468960e96ebf0404a6c) 4. [](https://git.kernel.org/stable/c/2ece4d2f7eac1cb51dc0e9859e09bfdb00faa28e) 5. [](https://git.kernel.org/stable/c/30040818b338b8ebc956ce0ebd198f8d593586a6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11870 - **State**: PUBLISHED - **Published Date**: October 29, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 08:24 UTC - **Reserved Date**: June 07, 2018 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Buffer overwrite can occur when the legacy rates count received from the host is not checked against the maximum number of legacy rates in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8996AU, QCA4531, QCA6174A, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, SD 210/SD 212/SD 205, SD 425, SD 600, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDX20. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8996AU, QCA4531, QCA6174A, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, SD 210/SD 212/SD 205, SD 425, SD 600, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDX20 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins) 2. [107681](http://www.securityfocus.com/bid/107681)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32520 - **State**: PUBLISHED - **Published Date**: January 30, 2023 at 00:00 UTC - **Last Updated**: February 05, 2025 at 20:07 UTC - **Reserved Date**: June 07, 2022 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-522: Insufficiently Protected Credentials vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. This CVE is unique from CVE-2022-32518. Affected Products: Data Center Expert (Versions prior to V7.9.0) ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **Schneider Electric - Data Center Expert** Affected versions: - All (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-165-04_+Data_Center_Expert_Security_Notification.pdf&p_Doc_Ref=SEVD-2022-165-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12667 - **State**: PUBLISHED - **Published Date**: May 19, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 12:04 UTC - **Reserved Date**: May 05, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://en.blog.nic.cz/2020/05/19/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack/) 2. [](https://www.knot-resolver.cz/2020-05-19-knot-resolver-5.1.1.html) 3. [[oss-security] 20200519 [CVE-2020-12667] Knot Resolver 5.1.1 NXNSAttack mitigation](http://www.openwall.com/lists/oss-security/2020/05/19/2) 4. [](http://cyber-security-group.cs.tau.ac.il/#) 5. [FEDORA-2020-bf68101ad3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76Y4FITMOH6RVPWAANGV7NB2ZHPJJGDQ/) 6. [[debian-lts-announce] 20240426 [SECURITY] [DLA 3795-1] knot-resolver security update](https://lists.debian.org/debian-lts-announce/2024/04/msg00017.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0223 - **State**: PUBLISHED - **Published Date**: January 16, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 16:25 UTC - **Reserved Date**: January 16, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in Shanghai TopCMM 123 Flash Chat Server Software 5.1 allows attackers to create or overwrite arbitrary files on the server via ".." (dot dot) sequences in the username field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18455](http://secunia.com/advisories/18455) 2. [16235](http://www.securityfocus.com/bid/16235) 3. [ADV-2006-0198](http://www.vupen.com/english/advisories/2006/0198) 4. [](http://www.123flashchat.com/flash-chat-server-v512.html) 5. [22440](http://www.osvdb.org/22440) 6. [123flashchat-user-directory-traversal(24137)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24137)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5343 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 10, 2007 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27582 - **State**: PUBLISHED - **Published Date**: February 23, 2021 at 17:58 UTC - **Last Updated**: August 03, 2024 at 21:26 UTC - **Reserved Date**: February 23, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c) 2. [](http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html) 3. [](https://portswigger.net/research/hidden-oauth-attack-vectors)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6731 - **State**: PUBLISHED - **Published Date**: July 14, 2024 at 22:00 UTC - **Last Updated**: August 26, 2024 at 04:53 UTC - **Reserved Date**: July 13, 2024 at 17:22 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. This affects an unknown part of the file /Master.php?f=save_student. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Student Study Center Desk Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-271449 | SourceCodester Student Study Center Desk Management System Master.php sql injection](https://vuldb.com/?id.271449) 2. [VDB-271449 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.271449) 3. [Submit #374362 | SourceCodester Student Study Center Desk Management System 1.0 SQLi](https://vuldb.com/?submit.374362) 4. [](https://reports.kunull.net/CVEs/2024/CVE-2024-6731) 5. [](https://www.sourcecodester.com/) ### Credits - Kunal Walavalkar
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6240 - **State**: PUBLISHED - **Published Date**: September 06, 2019 at 14:18 UTC - **Last Updated**: August 05, 2024 at 06:01 UTC - **Reserved Date**: January 25, 2018 at 00:00 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA Tegra contains a vulnerability in BootRom where a user with kernel level privileges can write an arbitrary value to an arbitrary physical address ### Affected Products **n/a - Android** Affected versions: - N/A (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4804) 2. [](https://source.android.com/security/bulletin/2019-09-01) 3. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4910)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40846, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40846 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40846 - **State**: PUBLISHED - **Published Date**: March 04, 2022 at 21:33 UTC - **Last Updated**: August 04, 2024 at 02:51 UTC - **Reserved Date**: September 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Rhinode Trading Paints through 2.0.36. TP Updater.exe uses cleartext HTTP to check, and request, updates. Thus, attackers can man-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.tradingpaints.com/page/Privacy) 2. [](https://axelp.io/YWDAC)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3651 - **State**: PUBLISHED - **Published Date**: April 17, 2025 at 14:58 UTC - **Last Updated**: April 17, 2025 at 19:10 UTC - **Reserved Date**: April 15, 2025 at 18:23 UTC - **Assigned By**: iManage ### Vulnerability Description Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions 10.8.1.46 and earlier allows attackers to execute arbitrary commands via unauthorized access to the Agent service.  This has been remediated in Work Desktop for Mac version 10.8.2.33. ### Weakness Classification (CWE) - CWE-346: Security Weakness - CWE-668: Security Weakness ### Affected Products **iManage - Work Desktop for Mac** Affected versions: - 0 (Status: affected) ### References 1. [](https://docs.imanage.com/security/CVE-2025-3651.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15031 - **State**: PUBLISHED - **Published Date**: September 13, 2019 at 12:45 UTC - **Last Updated**: August 05, 2024 at 00:34 UTC - **Reserved Date**: August 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97) 2. [](http://www.openwall.com/lists/oss-security/2019/09/10/4) 3. [USN-4135-2](https://usn.ubuntu.com/4135-2/) 4. [openSUSE-SU-2019:2173](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html) 5. [openSUSE-SU-2019:2181](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html) 6. [USN-4135-1](https://usn.ubuntu.com/4135-1/) 7. [](https://security.netapp.com/advisory/ntap-20191004-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2486 - **State**: PUBLISHED - **Published Date**: May 03, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in download.asp in Motobit 1.3 and 1.5 (aka PStruh-CZ) allows remote attackers to read arbitrary files via a .. (dot dot) in the File parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [pstruhcz-download-directory-traversal(34005)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34005) 2. [ADV-2007-1629](http://www.vupen.com/english/advisories/2007/1629) 3. [23757](http://www.securityfocus.com/bid/23757) 4. [38458](http://osvdb.org/38458) 5. [3831](https://www.exploit-db.com/exploits/3831)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5183, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5183 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5183 - **State**: PUBLISHED - **Published Date**: August 25, 2012 at 21:00 UTC - **Last Updated**: September 17, 2024 at 04:00 UTC - **Reserved Date**: August 25, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Race condition in Webroot Internet Security Essentials 6.1.0.145 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html) 2. [](http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/) 3. [39924](http://www.securityfocus.com/bid/39924) 4. [](http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php) 5. [20100505 KHOBE - 8.0 earthquake for Windows desktop security software](http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html) 6. [67660](http://www.osvdb.org/67660) 7. [](http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/) 8. [](http://www.f-secure.com/weblog/archives/00001949.html) 9. [](http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35946 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 19:04 UTC - **Last Updated**: August 04, 2024 at 00:47 UTC - **Reserved Date**: June 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A receiver of a federated share with access to the database with ownCloud version before 10.8 could update the permissions and therefore elevate their own permissions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://doc.owncloud.com/server/admin_manual/release_notes.html) 2. [](https://owncloud.com/security-advisories/cve-2021-35946/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46451 - **State**: PUBLISHED - **Published Date**: April 24, 2025 at 16:09 UTC - **Last Updated**: April 24, 2025 at 20:00 UTC - **Reserved Date**: April 24, 2025 at 14:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Floating Social Bar allows Stored XSS. This issue affects Floating Social Bar: from n/a through 1.1.7. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Syed Balkhi - Floating Social Bar** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/floating-social-bar/vulnerability/wordpress-floating-social-bar-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Nabil Irawan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21995 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 07:18 UTC - **Last Updated**: May 04, 2025 at 07:27 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix fence reference count leak The last_scheduled fence leaks when an entity is being killed and adding the cleanup callback fails. Decrement the reference count of prev when dma_fence_add_callback() fails, ensuring proper balance. [phasta: add git tag info for stable kernel] ### Affected Products **Linux - Linux** Affected versions: - 2fdb8a8f07c2f1353770a324fd19b8114e4329ac (Status: affected) - 2fdb8a8f07c2f1353770a324fd19b8114e4329ac (Status: affected) - 2fdb8a8f07c2f1353770a324fd19b8114e4329ac (Status: affected) - 2fdb8a8f07c2f1353770a324fd19b8114e4329ac (Status: affected) **Linux - Linux** Affected versions: - 6.2 (Status: affected) - 0 (Status: unaffected) - 6.6.85 (Status: unaffected) - 6.12.21 (Status: unaffected) - 6.13.9 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c76bd3c99293834de7d1dca5de536616d5655e38) 2. [](https://git.kernel.org/stable/c/1135a9431160575466ea9ac37ebd756ecbe35fff) 3. [](https://git.kernel.org/stable/c/35399c84dcedd6d31448fb9e1336ef52673f2882) 4. [](https://git.kernel.org/stable/c/a952f1ab696873be124e31ce5ef964d36bce817f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-22611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-22611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-22611 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 00:00 UTC - **Last Updated**: April 04, 2025 at 15:34 UTC - **Reserved Date**: January 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenEMR 7.0.2 is vulnerable to SQL Injection via \openemr\library\classes\Pharmacy.class.php, \controllers\C_Pharmacy.class.php and \openemr\controller.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/baolqinfosec/CVE-Reseach/blob/main/OpenERM_CVE-2024-22611.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0276 - **State**: PUBLISHED - **Published Date**: February 10, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:05 UTC - **Reserved Date**: February 10, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple format string vulnerabilities in the FTP service in 3Com 3CDaemon 2.0 revision 10 allow remote attackers to cause a denial of service (application crash) via format string specifiers in (1) the username, (2) cd, (3) delete, (4) rename, (5) rmdir, (6) literal, (7) stat, or (8) CWD commands. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [12155](http://www.securityfocus.com/bid/12155) 2. [3cdaemon-login-dos(18751)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18751) 3. [20050104 3Com 3CDaemon Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=110485674622696&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28677 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 15:18 UTC - **Last Updated**: August 03, 2024 at 21:47 UTC - **Reserved Date**: March 18, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open) 2. [](https://github.com/python-pillow/Pillow/pull/5377) 3. [FEDORA-2021-77756994ba](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/) 4. [GLSA-202107-33](https://security.gentoo.org/glsa/202107-33) 5. [[debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update](https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0870 - **State**: PUBLISHED - **Published Date**: January 04, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:55 UTC - **Reserved Date**: December 08, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Internet Explorer 4.01 allows remote attackers to read arbitrary files by pasting a file name into the file upload control, aka untrusted scripted paste. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS98-015](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-015)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47420 - **State**: PUBLISHED - **Published Date**: November 06, 2023 at 07:41 UTC - **Last Updated**: September 05, 2024 at 19:57 UTC - **Reserved Date**: December 15, 2022 at 00:08 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.12. ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Online ADA - Accessibility Suite by Online ADA** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/online-accessibility/wordpress-accessibility-suite-by-online-ada-plugin-4-11-sql-injection?_s_id=cve) ### Credits - minhtuanact (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2646 - **State**: PUBLISHED - **Published Date**: July 06, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 02:39 UTC - **Reserved Date**: July 06, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 5.0.375.99 does not properly isolate sandboxed IFRAME elements, which has unspecified impact and remote attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:11981](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11981) 2. [](http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html) 3. [](http://code.google.com/p/chromium/issues/detail?id=42575) 4. [](http://code.google.com/p/chromium/issues/detail?id=42980)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-23660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-23660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-23660 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 12:42 UTC - **Last Updated**: September 26, 2024 at 15:11 UTC - **Reserved Date**: January 17, 2023 at 05:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP MainWP Maintenance Extension plugin <= 4.1.1 versions. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **MainWP - MainWP Maintenance Extension** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/mainwp-maintenance-extension/wordpress-mainwp-maintenance-extension-plugin-4-1-1-subscriber-sql-injection-vulnerability?_s_id=cve) 2. [](https://patchstack.com/articles/multiple-vulnerabilities-affecting-mainwp-extensions?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33191 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 11:20 UTC - **Last Updated**: August 03, 2024 at 23:42 UTC - **Reserved Date**: May 19, 2021 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an "agent-update" command which was designed to patch the application binary. This "patching" command defaults to calling a trusted binary, but might be modified to an arbitrary value through a "c2-update" command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0 ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Apache Software Foundation - Apache NiFi - MiNiFi C++** Affected versions: - 0.5.0 (Status: affected) ### References 1. [](https://www.openwall.com/lists/oss-security/2021/08/24/1) 2. [[oss-security] 20210824 CVE-2021-33191: Apache NiFi - MiNiFi C++: MiNiFi CPP arbitrary script execution is possible on the agent's host machine through the c2 protocol](http://www.openwall.com/lists/oss-security/2021/08/24/1) 3. [[announce] 20210824 CVE-2021-33191: Apache NiFi - MiNiFi C++: MiNiFi CPP arbitrary script execution is possible on the agent's host machine through the c2 protocol](https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032%40%3Cannounce.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18352 - **State**: PUBLISHED - **Published Date**: December 11, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 11:08 UTC - **Reserved Date**: October 15, 2018 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/849942) 2. [](https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html) 3. [RHSA-2018:3803](https://access.redhat.com/errata/RHSA-2018:3803) 4. [DSA-4352](https://www.debian.org/security/2018/dsa-4352) 5. [106084](http://www.securityfocus.com/bid/106084) 6. [GLSA-201908-18](https://security.gentoo.org/glsa/201908-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3954 - **State**: PUBLISHED - **Published Date**: December 16, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 03:26 UTC - **Reserved Date**: October 14, 2010 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Publisher 2002 SP3, 2003 SP3, and 2010 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Publisher file, aka "Microsoft Publisher Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:12381](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12381) 2. [TA10-348A](http://www.us-cert.gov/cas/techalerts/TA10-348A.html) 3. [MS10-103](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-103) 4. [1024885](http://www.securitytracker.com/id?1024885)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1407, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1407 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1407 - **State**: PUBLISHED - **Published Date**: May 16, 2022 at 14:30 UTC - **Last Updated**: August 03, 2024 at 00:03 UTC - **Reserved Date**: April 20, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.8 does not have CSRF check in place when adding a tracking campaign, and does not escape the campaign fields when outputting them In attributes. As a result, attackers could make a logged in admin add tracking campaign with XSS payloads in them via a CSRF attack ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - VikBooking Hotel Booking Engine & PMS** Affected versions: - 1.5.8 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d) ### Credits - Gabriel3476
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0445 - **State**: PUBLISHED - **Published Date**: January 15, 2014 at 02:50 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 12, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote attackers to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2014-0381. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [64867](http://www.securityfocus.com/bid/64867) 2. [56478](http://secunia.com/advisories/56478) 3. [102038](http://osvdb.org/102038) 4. [1029623](http://www.securitytracker.com/id/1029623) 5. [64758](http://www.securityfocus.com/bid/64758) 6. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0048, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0048 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0048 - **State**: PUBLISHED - **Published Date**: February 02, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:06 UTC - **Reserved Date**: February 01, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The "Configure Your Server" tool in Microsoft 2000 domain controllers installs a blank password for the Directory Service Restore Mode, which allows attackers with physical access to the controller to install malicious programs, aka the "Directory Service Restore Mode Password" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2133](http://www.securityfocus.com/bid/2133) 2. [MS00-099](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29965 - **State**: PUBLISHED - **Published Date**: June 24, 2021 at 13:14 UTC - **Last Updated**: August 03, 2024 at 22:24 UTC - **Reserved Date**: April 01, 2021 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A malicious website that causes an HTTP Authentication dialog to be spawned could trick the built-in password manager to suggest passwords for the currently active website instead of the website that triggered the dialog. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2021-23/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1709257)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4567 - **State**: REJECTED - **Last Updated**: October 04, 2023 at 13:45 UTC - **Reserved Date**: August 28, 2023 at 15:15 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27142, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27142 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27142 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 20:03 UTC - **Last Updated**: February 26, 2025 at 16:28 UTC - **Reserved Date**: February 19, 2025 at 16:30 UTC - **Assigned By**: GitHub_M ### Vulnerability Description LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in the `POST /api/localsend/v2/prepare-upload` and the `POST /api/localsend/v2/upload` endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the `Quick Save` feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **localsend - localsend** Affected versions: - < 1.17.0 (Status: affected) ### References 1. [https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522](https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522) 2. [https://github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687](https://github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38186 - **State**: PUBLISHED - **Published Date**: August 08, 2023 at 17:08 UTC - **Last Updated**: January 01, 2025 at 01:58 UTC - **Reserved Date**: July 12, 2023 at 23:41 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Mobile Device Management Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-306: Security Weakness ### Affected Products **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) ### References 1. [Windows Mobile Device Management Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22972 - **State**: PUBLISHED - **Published Date**: February 22, 2023 at 00:00 UTC - **Last Updated**: March 12, 2025 at 14:53 UTC - **Reserved Date**: January 11, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Reflected Cross-site scripting (XSS) vulnerability in interface/forms/eye_mag/php/eye_mag_functions.php in OpenEMR < 7.0.0 allows remote authenticated users to inject arbitrary web script or HTML via the REQUEST_URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43302, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43302 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43302 - **State**: PUBLISHED - **Published Date**: November 01, 2024 at 14:17 UTC - **Last Updated**: November 04, 2024 at 15:21 UTC - **Reserved Date**: August 09, 2024 at 09:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Fonts Plugin Fonts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fonts: from n/a through 3.7.7. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Fonts Plugin - Fonts** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/olympus-google-fonts/wordpress-fonts-plugin-3-7-7-broken-access-control-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7380, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7380 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7380 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Cedar Kiosk (aka com.apps2you.cedarkiosk) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#921297](http://www.kb.cert.org/vuls/id/921297) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26133 - **State**: PUBLISHED - **Published Date**: April 20, 2022 at 18:30 UTC - **Last Updated**: October 03, 2024 at 14:55 UTC - **Reserved Date**: February 25, 2022 at 00:00 UTC - **Assigned By**: atlassian ### Vulnerability Description SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization. ### Affected Products **Atlassian - Bitbucket Data Center** Affected versions: - 5.14.0 (Status: affected) - unspecified (Status: affected) - 7.7.0 (Status: affected) - unspecified (Status: affected) - 7.18.0 (Status: affected) - unspecified (Status: affected) - 7.19.0 (Status: affected) - unspecified (Status: affected) - 7.20.0 (Status: affected) ### References 1. [](https://jira.atlassian.com/browse/BSERV-13173) 2. [](https://confluence.atlassian.com/security/multiple-products-security-advisory-hazelcast-vulnerable-to-remote-code-execution-cve-2016-10750-1116292387.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34654 - **State**: PUBLISHED - **Published Date**: August 16, 2021 at 18:22 UTC - **Last Updated**: May 05, 2025 at 18:43 UTC - **Reserved Date**: June 10, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Custom Post Type Relations WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the cptr[name] parameter found in the ~/pages/admin-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Custom Post Type Relations - Custom Post Type Relations** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34654) 2. [](https://plugins.trac.wordpress.org/browser/custom-post-type-relations/trunk/pages/admin-page.php#L60) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8020 - **State**: PUBLISHED - **Published Date**: November 28, 2017 at 07:00 UTC - **Last Updated**: August 05, 2024 at 16:19 UTC - **Reserved Date**: April 21, 2017 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server. ### Affected Products **n/a - EMC ScaleIO EMC ScaleIO 2.0.1.x version family (2.0.1.3, 2.0.1.2, 2.0.1.1, 2.0.1)** Affected versions: - EMC ScaleIO EMC ScaleIO 2.0.1.x version family (2.0.1.3, 2.0.1.2, 2.0.1.1, 2.0.1) (Status: affected) ### References 1. [](http://seclists.org/fulldisclosure/2017/Nov/35) 2. [101995](http://www.securityfocus.com/bid/101995)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1969, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1969 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1969 - **State**: PUBLISHED - **Published Date**: July 22, 2010 at 01:00 UTC - **Last Updated**: September 16, 2024 at 22:30 UTC - **Reserved Date**: May 19, 2010 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Cross-site scripting (XSS) vulnerability in HP Virtual Connect Enterprise Manager for Windows before 6.1 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1024181](http://www.securitytracker.com/id?1024181) 2. [40552](http://secunia.com/advisories/40552) 3. [ADV-2010-1797](http://www.vupen.com/english/advisories/2010/1797) 4. [SSRT100165](http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02283465&admit=109447626+1279054975923+28353475) 5. [HPSBMA02551](http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02283465&admit=109447626+1279054975923+28353475)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4809 - **State**: PUBLISHED - **Published Date**: December 14, 2011 at 00:00 UTC - **Last Updated**: September 16, 2024 at 19:52 UTC - **Reserved Date**: December 13, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the HM Community (com_hmcommunity) component before 1.01 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) language[], (2) university[], (3) persent[], (4) company_name[], (5) designation[], (6) music[], (7) books[], (8) movies[], (9) games[], (10) syp[], (11) ft[], and (12) fa[] parameters in a save task for a profile to index.php. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://joomlaextensions.co.in/index.php?option=com_jeshop&view=category_detail&Itemid=118&id=38) 2. [46656](http://secunia.com/advisories/46656) 3. [76726](http://www.osvdb.org/76726) 4. [18050](http://www.exploit-db.com/exploits/18050)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23903, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23903 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23903 - **State**: PUBLISHED - **Published Date**: January 24, 2024 at 17:52 UTC - **Last Updated**: February 13, 2025 at 17:39 UTC - **Reserved Date**: January 23, 2024 at 12:46 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. ### Affected Products **Jenkins Project - Jenkins GitLab Branch Source Plugin** Affected versions: - 0 (Status: affected) ### References 1. [Jenkins Security Advisory 2024-01-24](https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-2871) 2. [](http://www.openwall.com/lists/oss-security/2024/01/24/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7518 - **State**: PUBLISHED - **Published Date**: December 17, 2015 at 19:00 UTC - **Last Updated**: August 06, 2024 at 07:51 UTC - **Reserved Date**: September 29, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in information popups in Foreman before 1.10.0 allow remote attackers to inject arbitrary web script or HTML via (1) global parameters, (2) smart class parameters, or (3) smart variables in the (a) host or (b) hostgroup edit forms. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2016:0174](https://access.redhat.com/errata/RHSA-2016:0174) 2. [[oss-security] 20151209 CVE-2015-7518: Foreman stored XSS in parameter information popup](http://www.openwall.com/lists/oss-security/2015/12/09/6) 3. [](http://projects.theforeman.org/issues/12611) 4. [](http://theforeman.org/security.html#2015-7518)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2478, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2478 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2478 - **State**: PUBLISHED - **Published Date**: October 15, 2014 at 15:15 UTC - **Last Updated**: August 06, 2024 at 10:14 UTC - **Reserved Date**: March 13, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote attackers to affect confidentiality via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17170 - **State**: PUBLISHED - **Published Date**: March 09, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 20:43 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900. ### Affected Products **n/a - DP300, RP200, TE30, TE40, TE50, TE60, eSpace U1981** Affected versions: - V500R002C00 (Status: affected) - V500R002C00B010 (Status: affected) - V500R002C00B011 (Status: affected) - V500R002C00B012 (Status: affected) - V500R002C00B013 (Status: affected) - V500R002C00B014 (Status: affected) - V500R002C00B017 (Status: affected) - V500R002C00B018 (Status: affected) - V500R002C00SPC100 (Status: affected) - V500R002C00SPC200 (Status: affected) - V500R002C00SPC300 (Status: affected) - V500R002C00SPC400 (Status: affected) - V500R002C00SPC500 (Status: affected) - V500R002C00SPC600 (Status: affected) - V500R002C00SPC800 (Status: affected) - V500R002C00SPC900 (Status: affected) - V500R002C00SPCa00 (Status: affected) - V600R006C00 (Status: affected) - V600R006C00SPC200 (Status: affected) - V600R006C00SPC300 (Status: affected) - V600R006C00SPC400 (Status: affected) - V600R006C00SPC500 (Status: affected) - V100R001C10SPC300 (Status: affected) - V100R001C10SPC500 (Status: affected) - V100R001C10SPC600 (Status: affected) - V100R001C10SPC700B010 (Status: affected) - V500R002C00SPC700 (Status: affected) - V500R002C00SPCb00 (Status: affected) - V100R001C10 (Status: affected) - V100R001C10B001 (Status: affected) - V100R001C10B002 (Status: affected) - V100R001C10B010 (Status: affected) - V100R001C10B011 (Status: affected) - V100R001C10B012 (Status: affected) - V100R001C10B013 (Status: affected) - V100R001C10B014 (Status: affected) - V100R001C10B016 (Status: affected) - V100R001C10B017 (Status: affected) - V100R001C10B018 (Status: affected) - V100R001C10B019 (Status: affected) - V100R001C10SPC400 (Status: affected) - V100R001C10SPC700 (Status: affected) - V100R001C10SPC800B011 (Status: affected) - V100R001C10SPC900 (Status: affected) - V500R002C00SPCd00 (Status: affected) - V500R002C00SPCe00 (Status: affected) - V600R006C00SPC100 (Status: affected) - V200R003C20SPC900 (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-02-cidam-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3765 - **State**: PUBLISHED - **Published Date**: September 24, 2011 at 00:00 UTC - **Last Updated**: August 06, 2024 at 23:46 UTC - **Reserved Date**: September 23, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open-Realty 2.5.8 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by install/versions/upgrade_115.inc.php and certain other files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openrealty-upgrade115inc-path-disclosure(70607)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70607) 2. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6) 3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/open-realty-2.5.8) 4. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8096 - **State**: PUBLISHED - **Published Date**: August 20, 2019 at 20:23 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43463 - **State**: PUBLISHED - **Published Date**: November 18, 2022 at 18:51 UTC - **Last Updated**: September 17, 2024 at 02:36 UTC - **Reserved Date**: October 19, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Custom Product Tabs for WooCommerce plugin <= 1.7.9 on WordPress. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **YIKES, Inc. - Custom Product Tabs for WooCommerce (WordPress plugin)** Affected versions: - <= 1.7.9 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/yikes-inc-easy-custom-woocommerce-product-tabs/wordpress-custom-product-tabs-for-woocommerce-plugin-1-7-9-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Vulnerability discovered by Muhammad Daffa (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35144 - **State**: REJECTED - **Published Date**: December 11, 2020 at 15:37 UTC - **Last Updated**: December 11, 2020 at 15:37 UTC - **Reserved Date**: December 11, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33938 - **State**: PUBLISHED - **Published Date**: September 02, 2021 at 14:58 UTC - **Last Updated**: August 04, 2024 at 00:05 UTC - **Reserved Date**: June 07, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/openSUSE/libsolv/issues/420)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27623, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27623 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27623 - **State**: PUBLISHED - **Published Date**: November 12, 2023 at 22:43 UTC - **Last Updated**: August 30, 2024 at 14:30 UTC - **Reserved Date**: March 05, 2023 at 01:56 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Jens Törnell WP Page Numbers plugin <= 0.5 versions. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Jens Törnell - WP Page Numbers** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-page-numbers/wordpress-wp-page-numbers-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Abdi Pranata (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21197, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21197 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21197 - **State**: PUBLISHED - **Published Date**: October 15, 2024 at 19:52 UTC - **Last Updated**: March 25, 2025 at 16:46 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) - * (Status: affected) - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31905 - **State**: PUBLISHED - **Published Date**: May 11, 2021 at 11:40 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In JetBrains YouTrack before 2020.6.8801, information disclosure in an issue preview was possible. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com) 2. [](https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26652, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26652 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26652 - **State**: PUBLISHED - **Published Date**: March 27, 2024 at 13:53 UTC - **Last Updated**: May 04, 2025 at 08:53 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: net: pds_core: Fix possible double free in error handling path When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), Callback function pdsc_auxbus_dev_release calls kfree(padev) to free memory. We shouldn't call kfree(padev) again in the error handling path. Fix this by cleaning up the redundant kfree() and putting the error handling back to where the errors happened. ### Affected Products **Linux - Linux** Affected versions: - 4569cce43bc61e4cdd76597a1cf9b608846c18cc (Status: affected) - 4569cce43bc61e4cdd76597a1cf9b608846c18cc (Status: affected) - 4569cce43bc61e4cdd76597a1cf9b608846c18cc (Status: affected) **Linux - Linux** Affected versions: - 6.4 (Status: affected) - 0 (Status: unaffected) - 6.6.22 (Status: unaffected) - 6.7.10 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3) 2. [](https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3) 3. [](https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1758 - **State**: PUBLISHED - **Published Date**: May 26, 2011 at 18:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 19, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=700867) 2. [](https://fedorahosted.org/sssd/ticket/856) 3. [[oss-security] 20110429 vulnerability in sssd 1.5.0+ (CVE-2011-1758)](http://openwall.com/lists/oss-security/2011/04/29/4) 4. [FEDORA-2011-5815](http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059619.html) 5. [FEDORA-2011-6279](http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059532.html) 6. [[sssd-devel] 20110429 SSSD Security Release 1.5.7](https://fedorahosted.org/pipermail/sssd-devel/2011-April/006138.html) 7. [](https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.7) 8. [](http://git.fedorahosted.org/git/?p=sssd.git%3Ba=commit%3Bh=fffdae81651b460f3d2c119c56d5caa09b4de42a) 9. [](https://bugzilla.redhat.com/show_bug.cgi?id=700891)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1355 - **State**: PUBLISHED - **Published Date**: January 19, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: January 06, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unknown vulnerability in the TCP/IP stack for Sun Solaris 8 and 9 allows local users to cause a denial of service (system panic) via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [solaris-tcp-ip-dos(15955)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15955) 2. [57545](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57545-1&searchclause=%22category:security%22%20%20111313-02) 3. [11483](http://secunia.com/advisories/11483/) 4. [5665](http://www.osvdb.org/displayvuln.php?osvdb_id=5665) 5. [oval:org.mitre.oval:def:2972](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2972) 6. [ESB-2004.0308](http://www.auscert.org.au/render.html?it=4057) 7. [10216](http://www.securityfocus.com/bid/10216)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4638 - **State**: PUBLISHED - **Published Date**: December 30, 2010 at 20:00 UTC - **Last Updated**: September 16, 2024 at 17:23 UTC - **Reserved Date**: December 30, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the submitSurvey function in controller.php in JQuarks4s (com_jquarks4s) component 1.0.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the q parameter in a submitSurvey action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [42164](http://secunia.com/advisories/42164) 2. [15466](http://www.exploit-db.com/exploits/15466) 3. [](http://adv.salvatorefresta.net/JQuarks4s_Joomla_Component_1.0.0_Blind_SQL_Injection_Vulnerability-08112010.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4235 - **State**: PUBLISHED - **Published Date**: December 14, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:38 UTC - **Reserved Date**: December 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in knowledgebase.php in WHMCompleteSolution 2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21697](http://www.osvdb.org/21697) 2. [15856](http://www.securityfocus.com/bid/15856) 3. [ADV-2005-2883](http://www.vupen.com/english/advisories/2005/2883) 4. [](http://pridels0.blogspot.com/2005/12/whmcompletesolution-xss-vuln.html) 5. [18029](http://secunia.com/advisories/18029)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9103, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9103 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9103 - **State**: PUBLISHED - **Published Date**: December 09, 2016 at 22:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: October 28, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[qemu-devel] 20161010 Re: [PATCH 1/2] 9pfs: fix information leak in xattr read](https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01790.html) 2. [GLSA-201611-11](https://security.gentoo.org/glsa/201611-11) 3. [[oss-security] 20161030 Re: CVE request Qemu: 9pfs: information leakage via xattribute](http://www.openwall.com/lists/oss-security/2016/10/30/7) 4. [[oss-security] 20161028 CVE request Qemu: 9pfs: information leakage via xattribute](http://www.openwall.com/lists/oss-security/2016/10/28/1) 5. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=eb687602853b4ae656e9236ee4222609f3a6887d) 6. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html) 7. [93955](http://www.securityfocus.com/bid/93955)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30617 - **State**: PUBLISHED - **Published Date**: September 03, 2021 at 19:25 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Chromium: CVE-2021-30617 Policy bypass in Blink ### Affected Products **Microsoft - Microsoft Edge (Chromium-based)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-30617) 2. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38984, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38984 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38984 - **State**: PUBLISHED - **Published Date**: October 14, 2022 at 00:00 UTC - **Last Updated**: May 15, 2025 at 14:38 UTC - **Reserved Date**: August 29, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/10/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8141 - **State**: PUBLISHED - **Published Date**: March 15, 2020 at 17:04 UTC - **Last Updated**: August 04, 2024 at 09:48 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype. ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **n/a - dot** Affected versions: - 1.1.2 (Status: affected) ### References 1. [](https://hackerone.com/reports/390929)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22170 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 00:21 UTC - **Last Updated**: September 17, 2024 at 04:23 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description A Missing Release of Resource after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a Denial of Service (DoS) by sending specific packets over VXLAN which cause heap memory to leak and on exhaustion the PFE to reset. The heap memory utilization can be monitored with the command: user@host> show chassis fpc This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions of Junos OS prior to 19.4R1. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-772: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - unspecified (Status: unaffected) - 19.4 (Status: affected) - 20.1 (Status: affected) - 20.2 (Status: affected) - 20.3 (Status: affected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11277)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2381 - **State**: PUBLISHED - **Published Date**: August 15, 2022 at 08:37 UTC - **Last Updated**: August 03, 2024 at 00:39 UTC - **Reserved Date**: July 11, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The E Unlocked - Student Result WordPress plugin through 1.0.4 is lacking CSRF and validation when uploading the School logo, which could allow attackers to make a logged in admin upload arbitrary files, such as PHP via a CSRF attack ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - E Unlocked – Student Result** Affected versions: - 1.0.4 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f) ### Credits - Raad Haddad
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13133 - **State**: PUBLISHED - **Published Date**: August 23, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 22, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [100479](http://www.securityfocus.com/bid/100479) 2. [GLSA-201711-07](https://security.gentoo.org/glsa/201711-07) 3. [](https://github.com/ImageMagick/ImageMagick/issues/679) 4. [[debian-lts-announce] 20190514 [SECURITY] [DLA 1785-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html) 5. [[debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2519 - **State**: PUBLISHED - **Published Date**: May 04, 2023 at 16:31 UTC - **Last Updated**: November 22, 2024 at 15:59 UTC - **Reserved Date**: May 04, 2023 at 15:56 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability has been found in Caton CTP Relay Server 1.2.9 and classified as critical. This vulnerability affects unknown code of the file /server/api/v1/login of the component API. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. VDB-228010 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Caton - CTP Relay Server** Affected versions: - 1.2.9 (Status: affected) ### References 1. [](https://vuldb.com/?id.228010) 2. [](https://vuldb.com/?ctiid.228010) ### Credits - mrempy (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40484, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40484 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40484 - **State**: PUBLISHED - **Published Date**: August 08, 2024 at 00:00 UTC - **Last Updated**: August 09, 2024 at 17:48 UTC - **Reserved Date**: July 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Reflected Cross Site Scripting (XSS) vulnerability was found in "/oahms/search.php" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the "searchdata" parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Reflected%20XSS.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27940, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27940 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27940 - **State**: PUBLISHED - **Published Date**: May 14, 2024 at 10:02 UTC - **Last Updated**: August 02, 2024 at 00:41 UTC - **Reserved Date**: February 28, 2024 at 16:38 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected systems allow any authenticated user to send arbitrary SQL commands to the SQL server. An attacker could use this vulnerability to compromise the whole database. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Siemens - RUGGEDCOM CROSSBOW** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-916916.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1566 - **State**: PUBLISHED - **Published Date**: February 09, 2015 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:51 UTC - **Reserved Date**: February 09, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.dnnsoftware.com/platform/manage/security-center) 2. [62832](http://secunia.com/advisories/62832)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4406 - **State**: PUBLISHED - **Published Date**: September 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:12 UTC - **Reserved Date**: June 20, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Xcode Server in CoreCollaboration in Apple OS X Server before 3.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT6448) 2. [macosx-cve20144406-xss(96047)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96047) 3. [APPLE-SA-2014-10-16-3](http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html) 4. [69935](http://www.securityfocus.com/bid/69935) 5. [](http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html) 6. [](https://support.apple.com/kb/HT6536) 7. [1030870](http://www.securitytracker.com/id/1030870) 8. [61307](http://secunia.com/advisories/61307)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0524 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 00:00 UTC - **Last Updated**: March 27, 2025 at 14:40 UTC - **Reserved Date**: January 27, 2023 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055. ### Affected Products **n/a - Tenable.io, Tenable.sc, Nessus** Affected versions: - Tenable plugin feed serial numbers less than #202212212055. (Status: affected) ### References 1. [](https://www.tenable.com/security/tns-2023-04)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23101, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23101 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23101 - **State**: PUBLISHED - **Published Date**: June 04, 2025 at 00:00 UTC - **Last Updated**: June 04, 2025 at 20:37 UTC - **Reserved Date**: January 10, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Samsung Mobile Processor Exynos 1380. A Use-After-Free in the mobile processor leads to privilege escalation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/) 2. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23101/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2877 - **State**: PUBLISHED - **Published Date**: October 04, 2011 at 20:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 20, 2011 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1026774](http://www.securitytracker.com/id?1026774) 2. [](http://code.google.com/p/chromium/issues/detail?id=95072) 3. [48377](http://secunia.com/advisories/48377) 4. [APPLE-SA-2012-03-12-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html) 5. [48274](http://secunia.com/advisories/48274) 6. [](http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html) 7. [APPLE-SA-2012-03-07-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html) 8. [oval:org.mitre.oval:def:14694](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694) 9. [48288](http://secunia.com/advisories/48288) 10. [APPLE-SA-2012-03-07-2](http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26931, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26931 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26931 - **State**: REJECTED - **Last Updated**: June 02, 2023 at 00:00 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47341, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47341 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47341 - **State**: PUBLISHED - **Published Date**: October 06, 2024 at 10:50 UTC - **Last Updated**: October 07, 2024 at 17:50 UTC - **Reserved Date**: September 24, 2024 at 13:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Lester ‘GaMerZ’ Chan WP-DownloadManager allows Reflected XSS.This issue affects WP-DownloadManager: from n/a through 1.68.8. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Lester ‘GaMerZ’ Chan - WP-DownloadManager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-downloadmanager/wordpress-wp-downloadmanager-plugin-1-68-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11521 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 20:49 UTC - **Last Updated**: November 22, 2024 at 21:35 UTC - **Reserved Date**: November 20, 2024 at 21:53 UTC - **Assigned By**: zdi ### Vulnerability Description IrfanView DJVU File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DJVU files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24578. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **IrfanView - IrfanView** Affected versions: - 4.67.0.0 (Status: affected) ### References 1. [ZDI-24-1579](https://www.zerodayinitiative.com/advisories/ZDI-24-1579/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9156 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 16, 2024 at 22:56 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, when making a high speed Dual Carrier Downlink Data call in a multicell environment, a buffer overflow may occur. ### Affected Products **Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, SD 810 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000154 - **State**: PUBLISHED - **Published Date**: November 03, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: November 02, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mahara 15.04 before 15.04.8 and 15.10 before 15.10.4 and 16.04 before 16.04.2 are vulnerable to some authentication methods, which do not use Mahara's built-in login form, still allowing users to log in even if their institution was expired or suspended. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.launchpad.net/mahara/+bug/1580399)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3396 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 08, 2024 at 20:18 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). ### Affected Products **Oracle - Advanced Outbound Telephony** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) ### References 1. [95531](http://www.securityfocus.com/bid/95531) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14721 - **State**: PUBLISHED - **Published Date**: January 02, 2019 at 18:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44) 2. [](https://github.com/FasterXML/jackson-databind/issues/2097) 3. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) 4. [](https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7) 5. [[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html) 6. [[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1](https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E) 7. [](https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html) 8. [RHSA-2019:0782](https://access.redhat.com/errata/RHSA-2019:0782) 9. [RHBA-2019:0959](https://access.redhat.com/errata/RHBA-2019:0959) 10. [RHSA-2019:1107](https://access.redhat.com/errata/RHSA-2019:1107) 11. [RHSA-2019:1108](https://access.redhat.com/errata/RHSA-2019:1108) 12. [RHSA-2019:1106](https://access.redhat.com/errata/RHSA-2019:1106) 13. [RHSA-2019:1140](https://access.redhat.com/errata/RHSA-2019:1140) 14. [DSA-4452](https://www.debian.org/security/2019/dsa-4452) 15. [20190527 [SECURITY] [DSA 4452-1] jackson-databind security update](https://seclists.org/bugtraq/2019/May/68) 16. [](https://security.netapp.com/advisory/ntap-20190530-0003/) 17. [](https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html) 18. [RHSA-2019:1822](https://access.redhat.com/errata/RHSA-2019:1822) 19. [RHSA-2019:1823](https://access.redhat.com/errata/RHSA-2019:1823) 20. [RHSA-2019:2858](https://access.redhat.com/errata/RHSA-2019:2858) 21. [](https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html) 22. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E) 23. [RHSA-2019:3149](https://access.redhat.com/errata/RHSA-2019:3149) 24. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E) 25. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E) 26. [RHSA-2019:3892](https://access.redhat.com/errata/RHSA-2019:3892) 27. [RHSA-2019:4037](https://access.redhat.com/errata/RHSA-2019:4037) 28. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 29. [[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12](https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26292 - **State**: PUBLISHED - **Published Date**: January 04, 2021 at 18:10 UTC - **Last Updated**: August 04, 2024 at 15:56 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Creeper is an experimental dynamic, interpreted language. The binary release of Creeper Interpreter 1.1.3 contains potential malware. The compromised binary release was available for a few hours between December 26, 2020 at 3:22 PM EST to December 26, 2020 at 11:00 PM EST. If you used the source code, you are **NOT** affected. This only affects the binary releases. The binary of unknown quality has been removed from the release. If you have downloaded the binary, please delete it and run a reputable antivirus scanner to ensure that your computer is clean. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-507: Security Weakness ### Affected Products **chatter-social - Creeper** Affected versions: - = 1.1.3 (Status: affected) ### References 1. [](https://github.com/chatter-social/Creeper/security/advisories/GHSA-9v67-g2rg-m33j)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2430, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2430 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2430 - **State**: PUBLISHED - **Published Date**: July 10, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in auditconfig in Sun Solaris 8, 9, 10, and OpenSolaris snv_01 through snv_58, when Solaris Auditing is enabled, allows local users with an RBAC execution profile for auditconfig to gain privileges via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [35501](http://www.securityfocus.com/bid/35501) 2. [262088](http://sunsolve.sun.com/search/document.do?assetkey=1-26-262088-1) 3. [35580](http://secunia.com/advisories/35580)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4453 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0571 - **State**: PUBLISHED - **Published Date**: October 05, 2020 at 13:51 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Improper conditions check in BIOS firmware for 8th Generation Intel(R) Core(TM) Processors and Intel(R) Pentium(R) Silver Processor Series may allow an authenticated user to potentially enable information disclosure via local access. ### Affected Products **n/a - Intel BIOS** Affected versions: - 8th Generation Intel(R) Core(TM) Processors and Intel(R) Pentium(R) Silver Processor Series (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00347.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45717, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45717 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45717 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 21:45 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2021-0128.html) 2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2822 - **State**: PUBLISHED - **Published Date**: June 27, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 19:42 UTC - **Reserved Date**: May 19, 2012 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description The PDF functionality in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html) 2. [oval:org.mitre.oval:def:15166](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15166)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15898, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15898 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15898 - **State**: PUBLISHED - **Published Date**: September 03, 2019 at 21:39 UTC - **Last Updated**: August 05, 2024 at 01:03 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Nagios Log Server before 2.0.8 allows Reflected XSS via the username on the Login page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/lucaottoni/reflectedxss_nagios/blob/master/README.md) 2. [](https://www.nagios.com/downloads/nagios-log-server/change-log/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3860 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 15:14 UTC - **Last Updated**: November 20, 2024 at 16:02 UTC - **Reserved Date**: April 15, 2024 at 20:26 UTC - **Assigned By**: mozilla ### Vulnerability Description An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1881417) 2. [](https://www.mozilla.org/security/advisories/mfsa2024-18/) ### Credits - Gary Kwong