System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0622 - **State**: PUBLISHED - **Published Date**: January 31, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 12:26 UTC - **Reserved Date**: January 31, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in MyBB (aka MyBulletinBoard) 1.2.2 allows remote attackers to send messages to arbitrary users. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23934](http://secunia.com/advisories/23934) 2. [32968](http://osvdb.org/32968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17295 - **State**: PUBLISHED - **Published Date**: October 07, 2019 at 15:05 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the history function by a Regular user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2019-022/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22048, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22048 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22048 - **State**: PUBLISHED - **Published Date**: June 02, 2021 at 15:40 UTC - **Last Updated**: August 04, 2024 at 14:51 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_frame_pool_get function in framepool.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://trac.ffmpeg.org/ticket/8303) 2. [[debian-lts-announce] 20211114 [SECURITY] [DLA 2818-1] ffmpeg security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15203, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15203 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15203 - **State**: PUBLISHED - **Published Date**: August 08, 2018 at 04:00 UTC - **Last Updated**: September 16, 2024 at 17:39 UTC - **Reserved Date**: August 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Ignited CMS through 2017-02-19. ign/index.php/admin/pages/add_page allows a CSRF attack to add pages. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ignitedcms/ignitedcms/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6796 - **State**: PUBLISHED - **Published Date**: March 02, 2020 at 04:05 UTC - **Last Updated**: August 04, 2024 at 09:11 UTC - **Reserved Date**: January 10, 2020 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 73 and Firefox < ESR68.5. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2020-05/) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-06/) 3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1610426) 4. [USN-4278-2](https://usn.ubuntu.com/4278-2/) 5. [GLSA-202003-02](https://security.gentoo.org/glsa/202003-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24834, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24834 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24834 - **State**: PUBLISHED - **Published Date**: November 17, 2021 at 10:15 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability which exists in the Create Poll - Options module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of custom label parameters - vote button label , results link label and back to vote caption label. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - YOP Poll** Affected versions: - 6.3.1 (Status: affected) ### References 1. [](https://plugins.trac.wordpress.org/changeset/2605368) 2. [](https://wpscan.com/vulnerability/72f58b14-e5cb-4f1c-a16f-621238c6ebbf) 3. [](https://www.fortiguard.com/zeroday/FG-VD-21-053) ### Credits - Vishnupriya Ilango
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8474 - **State**: PUBLISHED - **Published Date**: April 12, 2016 at 14:00 UTC - **Last Updated**: August 06, 2024 at 08:20 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open redirect vulnerability in the valid_back_url function in app/controllers/application_controller.rb in Redmine before 2.6.7, 3.0.x before 3.0.5, and 3.1.x before 3.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted back_url parameter, as demonstrated by "@attacker.com," a different vulnerability than CVE-2014-1985. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.redmine.org/news/101) 2. [](https://www.redmine.org/issues/19577) 3. [DSA-3529](http://www.debian.org/security/2016/dsa-3529) 4. [](https://github.com/redmine/redmine/commit/032f2c9be6520d9d1a1608aa4f1d5d1f184f2472) 5. [78625](http://www.securityfocus.com/bid/78625)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1930 - **State**: PUBLISHED - **Published Date**: April 10, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 10, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in download2.php in cattaDoc 2.21, and possibly other versions including 3.0, allows remote attackers to read arbitrary files via a .. (dot dot) in the fn1 parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [3677](https://www.exploit-db.com/exploits/3677) 2. [34736](http://osvdb.org/34736) 3. [24807](http://secunia.com/advisories/24807) 4. [cattadoc-download2-directory-traversal(33474)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33474) 5. [ADV-2007-1297](http://www.vupen.com/english/advisories/2007/1297) 6. [23390](http://www.securityfocus.com/bid/23390)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33763 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 00:00 UTC - **Last Updated**: October 25, 2024 at 19:25 UTC - **Reserved Date**: April 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lunasvg v2.3.9 was discovered to contain a stack-buffer-underflow at lunasvg/source/layoutcontext.cpp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4850 - **State**: PUBLISHED - **Published Date**: September 19, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 19:23 UTC - **Reserved Date**: September 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in system/_b/contentFiles/gBIndex.php in BolinOS 4.5.5 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the gBRootPath parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20037](http://www.securityfocus.com/bid/20037) 2. [2372](https://www.exploit-db.com/exploits/2372) 3. [1593](http://securityreason.com/securityalert/1593) 4. [ADV-2006-3642](http://www.vupen.com/english/advisories/2006/3642) 5. [20060915 BolinOS v.4.5.5 <= (gBRootPath) Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/446113/100/0/threaded) 6. [21965](http://secunia.com/advisories/21965) 7. [bolinos-index-file-include(28991)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28991)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6072 - **State**: PUBLISHED - **Published Date**: February 06, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 11:20 UTC - **Reserved Date**: February 05, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in GraphicsMagick before 1.1.14, and 1.2.x before 1.2.3, allow remote attackers to cause a denial of service (crash) via unspecified vectors in (1) XCF and (2) CINEON images. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sourceforge.net/project/shownotes.php?release_id=604837) 2. [](http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c) 3. [30549](http://secunia.com/advisories/30549) 4. [29583](http://www.securityfocus.com/bid/29583) 5. [](http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485) 6. [](http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c) 7. [](http://sourceforge.net/project/shownotes.php?release_id=604785)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3112 - **State**: PUBLISHED - **Published Date**: September 09, 2009 at 19:00 UTC - **Last Updated**: September 16, 2024 at 17:59 UTC - **Reserved Date**: September 09, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in OXID eShop Professional, Enterprise, and Community Edition before 4.1.0 allows remote attackers to gain administrator privileges and access the shop backend via a crafted parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oxidforge.org/wiki/Security_bulletins/2009-001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2833 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 02:00 UTC - **Last Updated**: October 03, 2024 at 20:14 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Enterprise Management Console). Supported versions that are affected are 2.7, 2.8, 2.9 and 2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Simphony accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). ### Affected Products **Oracle Corporation - Hospitality Simphony** Affected versions: - 2.7 (Status: affected) - 2.8 (Status: affected) - 2.9 (Status: affected) - 2.10 (Status: affected) ### References 1. [103887](http://www.securityfocus.com/bid/103887) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44235 - **State**: PUBLISHED - **Published Date**: December 14, 2021 at 15:44 UTC - **Last Updated**: August 04, 2024 at 04:17 UTC - **Reserved Date**: November 26, 2021 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system. ### Affected Products **SAP SE - SAP NetWeaver AS ABAP** Affected versions: - < 700 (Status: affected) - < 701 (Status: affected) - < 702 (Status: affected) - < 710 (Status: affected) - < 711 (Status: affected) - < 730 (Status: affected) - < 731 (Status: affected) - < 740 (Status: affected) - < 750 (Status: affected) - < 751 (Status: affected) - < 752 (Status: affected) - < 753 (Status: affected) - < 754 (Status: affected) - < 755 (Status: affected) - < 756 (Status: affected) ### References 1. [](https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021) 2. [](https://launchpad.support.sap.com/#/notes/3123196)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7953, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7953 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7953 - **State**: PUBLISHED - **Published Date**: July 18, 2019 at 21:49 UTC - **Last Updated**: August 04, 2024 at 21:02 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager version 6.4 and ealier have a Cross-Site Request Forgery vulnerability. Successful exploitation could lead to Sensitive Information disclosure in the context of the current user. ### Affected Products **n/a - Adobe Experience Manager** Affected versions: - AEM 6.4 and earlier (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb19-38.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-1053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-1053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-1053 - **State**: PUBLISHED - **Published Date**: September 11, 2020 at 17:08 UTC - **Last Updated**: August 04, 2024 at 06:25 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description <p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses the vulnerability by correcting how DirectX handles objects in memory.</p> ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1709** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for 32-bit Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for x64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1053)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39705 - **State**: REJECTED - **Published Date**: March 16, 2022 at 14:04 UTC - **Last Updated**: May 26, 2022 at 16:21 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4133 - **State**: PUBLISHED - **Published Date**: January 25, 2022 at 19:11 UTC - **Last Updated**: August 03, 2024 at 17:16 UTC - **Reserved Date**: December 17, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **n/a - Keycloak** Affected versions: - keycloak 15.1.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2033602) 2. [](https://github.com/keycloak/keycloak/issues/9247) 3. [](https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487) 4. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0011 - **State**: PUBLISHED - **Published Date**: January 13, 2016 at 02:00 UTC - **Last Updated**: August 05, 2024 at 22:08 UTC - **Reserved Date**: December 04, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft SharePoint Server 2013 SP1 and SharePoint Foundation 2013 SP1 allow remote authenticated users to bypass intended Access Control Policy restrictions and conduct cross-site scripting (XSS) attacks by modifying a webpart, aka "Microsoft SharePoint Security Feature Bypass," a different vulnerability than CVE-2015-6117. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS16-004](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-004) 2. [1034653](http://www.securitytracker.com/id/1034653)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0284 - **State**: PUBLISHED - **Published Date**: May 03, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Winamp 2.78 and 2.77, when opening a wma file that requires a license, sends the full path of the Temporary Internet Files directory to the web page that is processing the license, which could allow malicious web servers to obtain the pathname. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20020215 winamp and wma Song Licenses](http://marc.info/?l=bugtraq&m=101408781031527&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0689 - **State**: PUBLISHED - **Published Date**: July 06, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 17:18 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description A denial of service vulnerability in the Android media framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36215950. ### Affected Products **Google Inc. - Android** Affected versions: - Android-5.0.2 Android-5.1.1 Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-07-01) 2. [99478](http://www.securityfocus.com/bid/99478)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49596, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49596 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49596 - **State**: PUBLISHED - **Published Date**: November 26, 2024 at 02:56 UTC - **Last Updated**: November 26, 2024 at 15:01 UTC - **Reserved Date**: October 17, 2024 at 05:03 UTC - **Assigned By**: dell ### Vulnerability Description Dell Wyse Management Suite, version WMS 4.4 and prior, contain a Missing Authorization vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service and arbitrary file deletion ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Dell - Wyse Management Suite** Affected versions: - N/A (Status: affected) **Dell - Wyse Management Suite Repository** Affected versions: - N/A (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000244453/dsa-2024-440) ### Credits - Dell Technologies would like to thank Ahmed Y. Elmogy for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26809, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26809 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26809 - **State**: PUBLISHED - **Published Date**: February 17, 2021 at 14:32 UTC - **Last Updated**: August 03, 2024 at 20:33 UTC - **Reserved Date**: February 05, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHPGurukul Car Rental Project version 2.0 suffers from a remote shell upload vulnerability in changeimage1.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/161267/Car-Rental-Project-2.0-Shell-Upload.html) 2. [](https://www.exploit-db.com/exploits/49520)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32712, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32712 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32712 - **State**: PUBLISHED - **Published Date**: June 01, 2023 at 16:34 UTC - **Last Updated**: February 28, 2025 at 11:03 UTC - **Reserved Date**: May 11, 2023 at 20:55 UTC - **Assigned By**: Splunk ### Vulnerability Description In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vulnerable application. This attack requires a user to use a terminal application that supports the translation of ANSI escape codes to read the malicious log file locally in the vulnerable terminal, and to perform additional user interaction to exploit. Universal Forwarder versions 9.1.0.1, 9.0.5, 8.2.11, and lower can be vulnerable in situations where they have management services active and accessible over the network. Universal Forwarder versions 9.0.x and 9.1.x bind management services to the local machine and are not vulnerable in this specific configuration. See SVD-2022-0605 for more information. Universal Forwarder versions 9.1 use Unix Domain Sockets (UDS) for communication, which further reduces the potential attack surface. The vulnerability does not directly affect Splunk Enterprise or Universal Forwarder. The indirect impact on Splunk Enterprise and Universal Forwarder can vary significantly depending on the permissions in the vulnerable terminal application and where and how the user reads the malicious log file. For example, users can copy the malicious file from the Splunk Enterprise instance and read it on their local machine. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Affected Products **Splunk - Splunk Enterprise** Affected versions: - 8.2 (Status: affected) - 9.0 (Status: affected) - 9.1 (Status: affected) **Splunk - Universal Forwarder** Affected versions: - 8.2 (Status: affected) - 9.0 (Status: affected) - 9.1 (Status: affected) ### References 1. [](https://advisory.splunk.com/advisories/SVD-2023-0606) 2. [](https://research.splunk.com/application/de3908dc-1298-446d-84b9-fa81d37e959b) ### Credits - STÖK / Fredrik Alexandersson
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23452 - **State**: PUBLISHED - **Published Date**: September 01, 2022 at 20:57 UTC - **Last Updated**: August 03, 2024 at 03:43 UTC - **Reserved Date**: January 19, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An authorization flaw was found in openstack-barbican, where anyone with an admin role could add secrets to a different project container. This flaw allows an attacker on the network to consume protected resources and cause a denial of service. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **n/a - openstack/barbican** Affected versions: - Fixed in v14.0.0 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2025090) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=2022908) 3. [](https://storyboard.openstack.org/#%21/story/2009297) 4. [](https://review.opendev.org/c/openstack/barbican/+/814200) 5. [](https://access.redhat.com/security/cve/CVE-2022-23452)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7781 - **State**: PUBLISHED - **Published Date**: June 27, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 07:59 UTC - **Reserved Date**: October 09, 2015 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description ManageEngine Firewall Analyzer before 8.0 does not restrict access permissions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [JVNDB-2015-000186](http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000186.html) 2. [JVN#12991684](http://jvn.jp/en/jp/JVN12991684/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8421 - **State**: PUBLISHED - **Published Date**: February 08, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: October 05, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451104. References: QC-CR#1087797. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.10 (Status: affected) - Kernel-3.18 (Status: affected) ### References 1. [96047](http://www.securityfocus.com/bid/96047) 2. [1037798](http://www.securitytracker.com/id/1037798) 3. [](https://source.android.com/security/bulletin/2017-02-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9463 - **State**: PUBLISHED - **Published Date**: February 28, 2020 at 17:55 UTC - **Last Updated**: August 04, 2024 at 10:26 UTC - **Reserved Date**: February 28, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Centreon 19.10 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the server_ip field in JSON data in an api/internal.php?object=centreon_configuration_remote request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code610.blogspot.com/2020/02/postauth-rce-in-centreon-1910.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-47612, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-47612 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-47612 - **State**: PUBLISHED - **Published Date**: November 09, 2023 at 12:07 UTC - **Last Updated**: September 04, 2024 at 13:47 UTC - **Reserved Date**: November 07, 2023 at 10:06 UTC - **Assigned By**: Kaspersky ### Vulnerability Description A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **Telit Cinterion - BGS5** **Telit Cinterion - EHS5** **Telit Cinterion - EHS6** **Telit Cinterion - EHS8** **Telit Cinterion - PDS5** **Telit Cinterion - PDS6** **Telit Cinterion - PDS8** **Telit Cinterion - ELS61** **Telit Cinterion - ELS81** **Telit Cinterion - PLS62** ### References 1. [KLCERT-22-194: Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability](https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/) ### Credits - Alexander Kozlov from Kaspersky - Sergey Anufrienko from Kaspersky
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4805, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4805 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4805 - **State**: PUBLISHED - **Published Date**: May 25, 2006 at 10:00 UTC - **Last Updated**: September 17, 2024 at 02:52 UTC - **Reserved Date**: May 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Sun Java System Application Server 7 Standard and Platform Edition 6 and earlier, and 2004Q2 Standard and Platform Edition Update 2 and earlier, allows remote attackers to obtain the source code for Java Server pages (JSP) via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17164](http://secunia.com/advisories/17164) 2. [15084](http://www.securityfocus.com/bid/15084) 3. [1015047](http://securitytracker.com/id?1015047) 4. [19950](http://www.osvdb.org/19950) 5. [101910](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101910-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-28445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-28445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-28445 - **State**: PUBLISHED - **Published Date**: July 25, 2022 at 14:10 UTC - **Last Updated**: September 16, 2024 at 17:03 UTC - **Reserved Date**: November 12, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects all versions of package npm-help. The injection point is located in line 13 in index.js file in export.latestVersion() function. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P` ### Affected Products **n/a - npm-help** Affected versions: - 0 (Status: affected) ### References 1. [](https://security.snyk.io/vuln/SNYK-JS-NPMHELP-1050983) 2. [](https://security.netapp.com/advisory/ntap-20220901-0012/) ### Credits - JHU System Security Lab
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1965, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1965 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1965 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:07 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [openbb-multiple-scripts-xss(15966)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15966) 2. [10214](http://www.securityfocus.com/bid/10214) 3. [20040425 Multiple Vulnerabilities In OpenBB](http://marc.info/?l=bugtraq&m=108301983206107&w=2) 4. [11481](http://secunia.com/advisories/11481) 5. [1009935](http://securitytracker.com/id?1009935)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2079, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2079 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2079 - **State**: PUBLISHED - **Published Date**: April 28, 2025 at 00:00 UTC - **Last Updated**: April 28, 2025 at 15:26 UTC - **Reserved Date**: February 24, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open. ### CVSS Metrics - **CVSS Base Score**: 9.9/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-96: Security Weakness ### Affected Products **Usermin - Usermin** Affected versions: - 0.980 (Status: affected) ### References 1. [](https://code-white.com/public-vulnerability-list/) 2. [](https://code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7119 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:40 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The GNAM 2013 (aka com.beepeers.gndam) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 2. [VU#803377](http://www.kb.cert.org/vuls/id/803377) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4166 - **State**: PUBLISHED - **Published Date**: December 26, 2022 at 12:28 UTC - **Last Updated**: April 11, 2025 at 23:13 UTC - **Reserved Date**: November 28, 2022 at 15:04 UTC - **Assigned By**: WPScan ### Vulnerability Description The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the addCountS POST parameter before concatenating it to an SQL query in 4_activate.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Contest Gallery** Affected versions: - 0 (Status: affected) **Unknown - Contest Gallery Pro** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f) 2. [](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12) ### Credits - Kunal Sharma (University of Kaiserslautern) - Daniel Krohmer (Fraunhofer IESE) - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0449 - **State**: PUBLISHED - **Published Date**: June 15, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:21 UTC - **Reserved Date**: June 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Omnis Studio 2.4 uses weak encryption (trivial encoding) for encrypting database fields. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1255](http://www.securityfocus.com/bid/1255) 2. [20000525 Omnis Weak Encryption - Many products affected](http://archives.neohapsis.com/archives/bugtraq/2000-05/0311.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0044, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0044 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0044 - **State**: PUBLISHED - **Published Date**: February 11, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 03:55 UTC - **Reserved Date**: November 18, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0050. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031723](http://www.securitytracker.com/id/1031723) 2. [72414](http://www.securityfocus.com/bid/72414) 3. [MS15-009](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1006 - **State**: PUBLISHED - **Published Date**: February 24, 2023 at 08:21 UTC - **Last Updated**: March 11, 2025 at 15:51 UTC - **Reserved Date**: February 24, 2023 at 08:20 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument Firstname/Middlename/Lastname/Suffix/Nationality/Doctor Fullname/Doctor Suffix with the input "><script>prompt(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SourceCodester - Medical Certificate Generator App** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.221739) 2. [](https://vuldb.com/?ctiid.221739) ### Credits - sk3l10x1ng (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24397 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 16:47 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: February 03, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver Enterprise Portal - versions 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.This reflected cross-site scripting attack can be used to non-permanently deface or modify displayed content of portal Website. The execution of the script content by a victim registered on the portal could compromise the confidentiality and integrity of victim’s web browser. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SAP SE - SAP NetWeaver Enterprise Portal** Affected versions: - < 7.30 (Status: affected) - < 7.31 (Status: affected) - < 7.40 (Status: affected) - < 7.50 (Status: affected) ### References 1. [](https://dam.sap.com/mac/embed/public/pdf/a/ucQrx6G.htm?rc=10) 2. [](https://launchpad.support.sap.com/#/notes/3146260)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10003, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10003 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10003 - **State**: PUBLISHED - **Published Date**: October 22, 2024 at 04:31 UTC - **Last Updated**: October 22, 2024 at 14:25 UTC - **Reserved Date**: October 15, 2024 at 16:24 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Rover IDX plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 3.0.0.2903. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **stevemullen - Rover IDX** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/cdf67099-5514-45ba-9a4c-10af984bf593?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L76) 3. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L120) 4. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L152) 5. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L199) 6. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L225) 7. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L240) 8. [](https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L270) 9. [](https://plugins.trac.wordpress.org/changeset/3171681/rover-idx) ### Credits - István Márton
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46663, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46663 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46663 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 14:54 UTC - **Last Updated**: March 12, 2025 at 04:00 UTC - **Reserved Date**: September 11, 2024 at 12:14 UTC - **Assigned By**: fortinet ### Vulnerability Description A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail CLI version 7.6.0 through 7.6.1 and before 7.4.3 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Fortinet - FortiMail** Affected versions: - 7.6.0 (Status: affected) - 7.4.0 (Status: affected) - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) ### References 1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-331](https://fortiguard.fortinet.com/psirt/FG-IR-24-331)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42141 - **State**: PUBLISHED - **Published Date**: December 13, 2022 at 00:00 UTC - **Last Updated**: April 22, 2025 at 15:28 UTC - **Reserved Date**: October 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2247 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: June 02, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47971, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47971 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47971 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 19:21 UTC - **Last Updated**: February 10, 2025 at 22:54 UTC - **Reserved Date**: October 07, 2024 at 18:03 UTC - **Assigned By**: Solidigm ### Vulnerability Description Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Solidigm - D5-P5316** Affected versions: - ACV10340 (Status: unaffected) - ACV1MA10 (Status: unaffected) **Solidigm - D7-P5520** Affected versions: - 9CV10410 (Status: unaffected) - 9CV1MA70 (Status: unaffected) **Solidigm - D7-P5620** Affected versions: - 9CV10410 (Status: unaffected) ### References 1. [](https://www.solidigm.com/support-page/support-security.htmlhttps://)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26301, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26301 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26301 - **State**: PUBLISHED - **Published Date**: July 21, 2023 at 16:06 UTC - **Last Updated**: August 02, 2024 at 11:46 UTC - **Reserved Date**: February 21, 2023 at 21:14 UTC - **Assigned By**: hp ### Vulnerability Description Certain HP LaserJet Pro print products are potentially vulnerable to an Elevation of Privilege and/or Information Disclosure related to a lack of authentication with certain endpoints. ### Affected Products **HP Inc. - HP LaserJet Pro** Affected versions: - See HP Security Bulletin reference for affected versions. (Status: affected) ### References 1. [](https://support.hp.com/us-en/document/ish_8746769-8746795-16/hpsbpi03855)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10487 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 00:15 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, in a QuRT API function, an untrusted pointer dereference can occur. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDX20 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6893 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 10, 2015 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-0677, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-0677 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-0677 - **State**: PUBLISHED - **Published Date**: July 13, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 00:24 UTC - **Reserved Date**: July 12, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fastream NETFile FTP Server 6.7.2.1085 and earlier allows remote attackers to cause a denial of service (temporary hang) via the cd command with an unusual argument, possibly due to multiple leading slashes and/or an access to the floppy drive ("A"). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040704 Fastream NETFile FTP/Web Server Input validation Errors](http://marc.info/?l=bugtraq&m=108904874104880&w=2) 2. [fastream-cd-dos(16615)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16615)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27370 - **State**: PUBLISHED - **Published Date**: June 05, 2024 at 18:35 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: February 25, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on hal_req->num_config_discovery_attr coming from userspace, which can lead to a heap overwrite. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2528 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: August 10, 2005 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2125 - **State**: PUBLISHED - **Published Date**: June 01, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 02:25 UTC - **Reserved Date**: June 01, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Rotor Banner module 5.x before 5.x-1.8 and 6.x before 6.x-2.5 for Drupal allow remote authenticated users, with "create rotor item" or "edit any rotor item" privileges, to inject arbitrary web script or HTML via the (1) srs, (2) title, or (3) alt image attribute. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [64770](http://www.osvdb.org/64770) 2. [39883](http://secunia.com/advisories/39883) 3. [](http://drupal.org/node/803930) 4. [rotorbanner-image-xss(58719)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58719)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47343, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47343 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47343 - **State**: PUBLISHED - **Published Date**: February 06, 2023 at 05:26 UTC - **Last Updated**: March 26, 2025 at 13:40 UTC - **Reserved Date**: December 13, 2022 at 05:23 UTC - **Assigned By**: Unisoc ### Vulnerability Description In engineermode services, there is a missing permission check. This could lead to local denial of service in engineermode services. ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000** Affected versions: - Android10/Android11 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1621031430231134210)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-28114, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-28114 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-28114 - **State**: PUBLISHED - **Published Date**: July 16, 2021 at 12:16 UTC - **Last Updated**: August 03, 2024 at 21:33 UTC - **Reserved Date**: March 09, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://labs.bishopfox.com/advisories) 2. [](https://froala.com/wysiwyg-editor/) 3. [](https://labs.bishopfox.com/advisories/froala-editor-v3.2.6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26933, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26933 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26933 - **State**: PUBLISHED - **Published Date**: March 10, 2025 at 14:34 UTC - **Last Updated**: March 11, 2025 at 16:06 UTC - **Reserved Date**: February 17, 2025 at 11:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **Nitin Prakash - WC Place Order Without Payment** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wc-place-order-without-payment/vulnerability/wordpress-place-order-without-payment-for-woocommerce-plugin-2-6-7-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27942 - **State**: PUBLISHED - **Published Date**: March 26, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 05:41 UTC - **Reserved Date**: March 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/appneta/tcpreplay/issues/719) 2. [FEDORA-2022-680ea95f71](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/) 3. [FEDORA-2022-47484afa15](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/) 4. [FEDORA-2022-d31a521866](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/) 5. [GLSA-202210-08](https://security.gentoo.org/glsa/202210-08)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46332 - **State**: PUBLISHED - **Published Date**: May 02, 2025 at 17:06 UTC - **Last Updated**: May 02, 2025 at 17:47 UTC - **Reserved Date**: April 22, 2025 at 22:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Flags SDK is an open-source feature flags toolkit for Next.js and SvelteKit. Impacted versions include flags from 3.2.0 and prior and @vercel/flags from 3.1.1 and prior as certain circumstances allows a bad actor with detailed knowledge of the vulnerability to list all flags returned by the flags discovery endpoint (.well-known/vercel/flags). This vulnerability allows for information disclosure, where a bad actor could gain access to a list of all feature flags exposed through the flags discovery endpoint, including the flag names, flag descriptions, available options and their labels (e.g. true, false), and default flag values. This issue has been patched in flags@4.0.0, users of flags and @vercel/flags should also migrate to flags@4.0.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **vercel - flags** Affected versions: - < 4.0.0 (Status: affected) ### References 1. [https://github.com/vercel/flags/security/advisories/GHSA-892p-pqrr-hxqr](https://github.com/vercel/flags/security/advisories/GHSA-892p-pqrr-hxqr) 2. [https://github.com/vercel/flags/blob/main/packages/flags/guides/upgrade-to-v4.md](https://github.com/vercel/flags/blob/main/packages/flags/guides/upgrade-to-v4.md) 3. [https://vercel.com/changelog/information-disclosure-in-flags-sdk-cve-2025-46332](https://vercel.com/changelog/information-disclosure-in-flags-sdk-cve-2025-46332)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40486, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40486 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40486 - **State**: PUBLISHED - **Published Date**: September 28, 2022 at 12:59 UTC - **Last Updated**: May 21, 2025 at 14:49 UTC - **Reserved Date**: September 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md) 2. [](https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/) 3. [](https://www.tp-link.com/br/support/download/archer-ax10/v1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0780, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0780 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0780 - **State**: PUBLISHED - **Published Date**: February 04, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The PDF event handler in Google Chrome before 9.0.597.84 does not properly interact with print operations, which allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://code.google.com/p/chromium/issues/detail?id=64051) 2. [oval:org.mitre.oval:def:14530](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14530) 3. [](http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9851 - **State**: PUBLISHED - **Published Date**: August 05, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in SMA Solar Technology products. By sending nonsense data or setting up a TELNET session to the database port of Sunny Explorer, the application can be crashed. NOTE: the vendor reports that the maximum possible damage is a communication failure. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.sma.de/en/statement-on-cyber-security.html) 2. [](https://horusscenario.com/CVE-information/) 3. [](http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0515 - **State**: PUBLISHED - **Published Date**: March 18, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:13 UTC - **Reserved Date**: February 23, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.webroot.com/services/mfp_advisory.php) 2. [12842](http://www.securityfocus.com/bid/12842) 3. [13577](http://secunia.com/advisories/13577) 4. [](http://secunia.com/secunia_research/2004-20/advisory/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0118 - **State**: PUBLISHED - **Published Date**: February 25, 2010 at 00:00 UTC - **Last Updated**: August 07, 2024 at 00:37 UTC - **Reserved Date**: January 04, 2010 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Bournal before 1.4.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified temporary files associated with a --hack_the_gibson update check. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100222 Secunia Research: Bournal Insecure Temporary Files Security Issue](http://www.securityfocus.com/archive/1/509685/100/0/threaded) 2. [FEDORA-2010-3221](http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036701.html) 3. [FEDORA-2010-3168](http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036764.html) 4. [38554](http://secunia.com/advisories/38554) 5. [](http://secunia.com/secunia_research/2010-6/) 6. [38814](http://secunia.com/advisories/38814) 7. [FEDORA-2010-3301](http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036697.html) 8. [38353](http://www.securityfocus.com/bid/38353)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-5078, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-5078 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-5078 - **State**: PUBLISHED - **Published Date**: February 08, 2012 at 21:00 UTC - **Last Updated**: September 16, 2024 at 20:58 UTC - **Reserved Date**: February 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The web administration interface in the server in Sybase M-Business Anywhere 6.7 before ESD# 3 and 7.0 before ESD# 7 does not require admin authentication for unspecified scripts, which allows remote authenticated users to list or delete user accounts, modify passwords, or read log files via HTTP requests, aka Bug IDs 678497 and 678499. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.sybase.com/detail?id=1095200) 2. [20111014 Sybase M-Business Anywhere Insecure Permissions Vulnerability](http://www.verisigninc.com/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=952)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38986 - **State**: PUBLISHED - **Published Date**: July 30, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:19 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/mestrtee/b20c3aee8bea16e1863933778da6e4cb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8743, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8743 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8743 - **State**: PUBLISHED - **Published Date**: September 13, 2017 at 01:00 UTC - **Last Updated**: September 17, 2024 at 04:10 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8742. ### Affected Products **Microsoft Corporation - Microsoft Office** Affected versions: - Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server (Status: affected) ### References 1. [100746](http://www.securityfocus.com/bid/100746) 2. [1039323](http://www.securitytracker.com/id/1039323) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8743)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1892 - **State**: PUBLISHED - **Published Date**: September 15, 2011 at 10:00 UTC - **Last Updated**: August 06, 2024 at 22:46 UTC - **Reserved Date**: May 04, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Office Groove 2007 SP2, SharePoint Workspace 2010 Gold and SP1, Office Forms Server 2007 SP2, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Office Groove Data Bridge Server 2007 SP2, Office Groove Management Server 2007 SP2, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, and Office Web Apps 2010 Gold and SP1 do not properly handle Web Parts containing XML classes referencing external entities, which allows remote authenticated users to read arbitrary files via a crafted XML and XSL file, aka "SharePoint Remote File Disclosure Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS11-074](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-074) 2. [8386](http://securityreason.com/securityalert/8386) 3. [TA11-256A](http://www.us-cert.gov/cas/techalerts/TA11-256A.html) 4. [oval:org.mitre.oval:def:12907](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12907)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26998, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26998 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26998 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 05:28 UTC - **Last Updated**: May 04, 2025 at 12:55 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: serial: core: Clearing the circular buffer before NULLifying it The circular buffer is NULLified in uart_tty_port_shutdown() under the spin lock. However, the PM or other timer based callbacks may still trigger after this event without knowning that buffer pointer is not valid. Since the serial code is a bit inconsistent in checking the buffer state (some rely on the head-tail positions, some on the buffer pointer), it's better to have both aligned, i.e. buffer pointer to be NULL and head-tail possitions to be the same, meaning it's empty. This will prevent asynchronous calls to dereference NULL pointer as reported recently in 8250 case: BUG: kernel NULL pointer dereference, address: 00000cf5 Workqueue: pm pm_runtime_work EIP: serial8250_tx_chars (drivers/tty/serial/8250/8250_port.c:1809) ... ? serial8250_tx_chars (drivers/tty/serial/8250/8250_port.c:1809) __start_tx (drivers/tty/serial/8250/8250_port.c:1551) serial8250_start_tx (drivers/tty/serial/8250/8250_port.c:1654) serial_port_runtime_suspend (include/linux/serial_core.h:667 drivers/tty/serial/serial_port.c:63) __rpm_callback (drivers/base/power/runtime.c:393) ? serial_port_remove (drivers/tty/serial/serial_port.c:50) rpm_suspend (drivers/base/power/runtime.c:447) The proposed change will prevent ->start_tx() to be called during suspend on shut down port. ### Affected Products **Linux - Linux** Affected versions: - 434beb66368d4fb4d3119c2116b9398500adbf47 (Status: affected) - 43066e32227ecde674e8ae1fcdd4a1ede67680c2 (Status: affected) - 43066e32227ecde674e8ae1fcdd4a1ede67680c2 (Status: affected) - a629a9b2f7699314a4abe8fbc37b0ee667b60f33 (Status: affected) **Linux - Linux** Affected versions: - 6.8 (Status: affected) - 0 (Status: unaffected) - 6.6.29 (Status: unaffected) - 6.8.8 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/7ae7104d54342433a3a73975f6569beefdd86350) 2. [](https://git.kernel.org/stable/c/bb1118905e875c111d7ccef9aee86ac5e4e7f985) 3. [](https://git.kernel.org/stable/c/9cf7ea2eeb745213dc2a04103e426b960e807940)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2583 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26650 - **State**: PUBLISHED - **Published Date**: May 17, 2022 at 08:05 UTC - **Last Updated**: August 03, 2024 at 05:11 UTC - **Reserved Date**: March 07, 2022 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3. ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **Apache Software Foundation - Apache ShenYu (incubating) ** Affected versions: - unspecified (Status: affected) ### References 1. [](https://lists.apache.org/thread/8rp33m3nm4bwtx3qx76mqynth3t3d673) 2. [[oss-security] 20220517 CVE-2022-26650: Apache ShenYu (incubating) Regular expression denial of service](http://www.openwall.com/lists/oss-security/2022/05/17/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6239 - **State**: PUBLISHED - **Published Date**: November 28, 2023 at 14:07 UTC - **Last Updated**: August 28, 2024 at 08:17 UTC - **Reserved Date**: November 21, 2023 at 12:03 UTC - **Assigned By**: M-Files Corporation ### Vulnerability Description Under rare conditions, the effective permissions of an object might be incorrectly calculated if the object has a specific configuration of metadata-driven permissions in M-Files Server versions 23.9, 23.10, and 23.11 before 23.11.13168.7, potentially enabling unauthorized access to the object. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-281: Security Weakness ### Affected Products **M-Files - M-Files Server** Affected versions: - 23.9 (Status: affected) - 23.10 (Status: affected) - 23.11 (Status: affected) ### References 1. [](https://product.m-files.com/security-advisories/cve-2023-6239/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17613 - **State**: PUBLISHED - **Published Date**: December 13, 2017 at 09:00 UTC - **Last Updated**: August 05, 2024 at 20:59 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Freelance Website Script 2.0.6 has SQL Injection via the jobdetails.php pr_id parameter or the searchbycat_list.php catid parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43283](https://www.exploit-db.com/exploits/43283/) 2. [](https://packetstormsecurity.com/files/145323/Freelance-Website-Script-2.0.6-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3359 - **State**: PUBLISHED - **Published Date**: December 12, 2022 at 17:54 UTC - **Last Updated**: April 22, 2025 at 15:41 UTC - **Reserved Date**: September 29, 2022 at 13:30 UTC - **Assigned By**: WPScan ### Vulnerability Description The Shortcodes and extra features for Phlox theme WordPress plugin before 2.10.7 unserializes the content of an imported file, which could lead to PHP object injection when a user imports (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. ### Weakness Classification (CWE) - CWE-502 Deserialization of Untrusted Data: Deserialization of Untrusted Data ### Affected Products **Unknown - Shortcodes and extra features for Phlox theme** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6) ### Credits - Nguyen Duy Quoc Khanh - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39694, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39694 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39694 - **State**: PUBLISHED - **Published Date**: July 31, 2024 at 15:44 UTC - **Last Updated**: July 31, 2024 at 16:51 UTC - **Reserved Date**: June 27, 2024 at 18:44 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Duende IdentityServer is an OpenID Connect and OAuth 2.x framework for ASP.NET Core. It is possible for an attacker to craft malicious Urls that certain functions in IdentityServer will incorrectly treat as local and trusted. If such a Url is returned as a redirect, some browsers will follow it to a third-party, untrusted site. Note: by itself, this vulnerability does **not** allow an attacker to obtain user credentials, authorization codes, access tokens, refresh tokens, or identity tokens. An attacker could however exploit this vulnerability as part of a phishing attack designed to steal user credentials. This vulnerability is fixed in 7.0.6, 6.3.10, 6.2.5, 6.1.8, and 6.0.5. Duende.IdentityServer 5.1 and earlier and all versions of IdentityServer4 are no longer supported and will not be receiving updates. If upgrading is not possible, use `IUrlHelper.IsLocalUrl` from ASP.NET Core to validate return Urls in user interface code in the IdentityServer host. ### CVSS Metrics - **CVSS Base Score**: 4.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **DuendeSoftware - IdentityServer** Affected versions: - < 6.0.5 (Status: affected) - >= 6.1.0-preview.1, <= 6.1.7 (Status: affected) - >= 6.2.0-preview.1, <= 6.2.4 (Status: affected) - >= 6.3.0-preview.1, <= 6.3.9 (Status: affected) - >= 7.0.0-preview.1, <= 7.0.5 (Status: affected) ### References 1. [https://github.com/DuendeSoftware/IdentityServer/security/advisories/GHSA-ff4q-64jc-gx98](https://github.com/DuendeSoftware/IdentityServer/security/advisories/GHSA-ff4q-64jc-gx98) 2. [https://github.com/DuendeSoftware/IdentityServer/commit/269ca2171fe1e901c87f2f0797bbc7c230db87c6](https://github.com/DuendeSoftware/IdentityServer/commit/269ca2171fe1e901c87f2f0797bbc7c230db87c6) 3. [https://github.com/DuendeSoftware/IdentityServer/commit/765116a2d4fb0671b6eba015e698533900c61c8e](https://github.com/DuendeSoftware/IdentityServer/commit/765116a2d4fb0671b6eba015e698533900c61c8e) 4. [https://github.com/DuendeSoftware/IdentityServer/commit/d0d8eab35ad9183b14925496803ed8b36658d0a1](https://github.com/DuendeSoftware/IdentityServer/commit/d0d8eab35ad9183b14925496803ed8b36658d0a1) 5. [https://github.com/DuendeSoftware/IdentityServer/commit/f04cf0be859b93f43563f8f812eb92206ad94011](https://github.com/DuendeSoftware/IdentityServer/commit/f04cf0be859b93f43563f8f812eb92206ad94011) 6. [https://github.com/DuendeSoftware/IdentityServer/commit/fe817b499933d6ed6141b153492d7335c28b184a](https://github.com/DuendeSoftware/IdentityServer/commit/fe817b499933d6ed6141b153492d7335c28b184a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9199 - **State**: PUBLISHED - **Published Date**: September 03, 2020 at 17:58 UTC - **Last Updated**: August 04, 2024 at 10:19 UTC - **Reserved Date**: February 18, 2020 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description B2368-22 V100R001C00;B2368-57 V100R001C00;B2368-66 V100R001C00 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the LAN. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject commands to the target device. ### Affected Products **n/a - B2368-22;B2368-57;B2368-66** Affected versions: - V100R001C00 (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-01-command-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21195 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 20:00 UTC - **Last Updated**: September 16, 2024 at 20:47 UTC - **Reserved Date**: February 24, 2022 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **n/a - url-regex** Affected versions: - 0 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643) 2. [](https://github.com/AlexFlipnote/url_regex/blob/master/url_regex/url_regex.py) ### Credits - yousukezan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-4204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-4204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-4204 - **State**: PUBLISHED - **Published Date**: August 16, 2023 at 15:12 UTC - **Last Updated**: October 01, 2024 at 18:25 UTC - **Reserved Date**: August 07, 2023 at 11:03 UTC - **Assigned By**: Moxa ### Vulnerability Description NPort IAW5000A-I/O Series firmware version v2.2 and prior is affected by a hardcoded credential vulnerabilitywhich poses a potential risk to the security and integrity of the affected device. This vulnerability is attributed to the presence of a hardcoded key, which could potentially facilitate firmware manipulation. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-798: Cross-site Scripting (XSS) ### Affected Products **Moxa - NPort IAW5000A-I/O Series** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230304-nport-iaw5000a-i-o-series-hardcoded-credential-vulnerability)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1001 - **State**: PUBLISHED - **Published Date**: January 18, 2000 at 05:00 UTC - **Last Updated**: August 01, 2024 at 16:55 UTC - **Reserved Date**: December 21, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cisco Cache Engine allows a remote attacker to gain access via a null username and password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1001)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0326, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0326 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0326 - **State**: PUBLISHED - **Published Date**: August 17, 2014 at 23:00 UTC - **Last Updated**: August 06, 2024 at 09:13 UTC - **Reserved Date**: December 05, 2013 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Pilot Below Deck Equipment (BDE) and OpenPort implementations on Iridium satellite terminals allow remote attackers to read hardcoded credentials via the web interface. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#578598](http://www.kb.cert.org/vuls/id/578598)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1364 - **State**: PUBLISHED - **Published Date**: July 26, 2022 at 21:30 UTC - **Last Updated**: January 29, 2025 at 16:28 UTC - **Reserved Date**: April 14, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://crbug.com/1315901) 2. [](https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_14.html) 3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5246 - **State**: PUBLISHED - **Published Date**: October 06, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The LDAP Authentication functionality in Foreman might allow remote attackers with knowledge of old passwords to gain access via vectors involving the password lifetime period in Active Directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://projects.theforeman.org/issues/11471) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1258700)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18431 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 04:00 UTC - **Last Updated**: August 05, 2024 at 11:08 UTC - **Reserved Date**: October 16, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in DESTOON B2B 7.0. XSS exists via certain text boxes to the admin.php?moduleid=2&action=add URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AvaterXXX/DESTOON/blob/master/XSS.md#xss2) 2. [](https://www.patec.cn/newsshow.php?cid=24&id=134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43461 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 16:54 UTC - **Last Updated**: December 31, 2024 at 23:03 UTC - **Reserved Date**: August 14, 2024 at 01:08 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows MSHTML Platform Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-451: Security Weakness ### Affected Products **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows MSHTML Platform Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33299 - **State**: PUBLISHED - **Published Date**: January 10, 2025 at 00:00 UTC - **Last Updated**: January 14, 2025 at 16:07 UTC - **Reserved Date**: April 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross Site Scripting vulnerability in Microweber v.2.0.9 allows a remote attacker to execute arbitrary code via the First Name and Last Name parameters in the endpoint /admin/module/view?type=users ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/MathSabo/CVE-2024-33299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8716, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8716 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8716 - **State**: PUBLISHED - **Published Date**: April 11, 2017 at 19:00 UTC - **Last Updated**: August 06, 2024 at 13:26 UTC - **Reserved Date**: November 09, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26456) 2. [70992](http://www.securityfocus.com/bid/70992) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1164248)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0885 - **State**: PUBLISHED - **Published Date**: January 25, 2024 at 21:00 UTC - **Last Updated**: August 01, 2024 at 18:18 UTC - **Reserved Date**: January 25, 2024 at 13:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in SpyCamLizard 1.230. Affected is an unknown function of the component HTTP GET Request Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252036. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **n/a - SpyCamLizard** Affected versions: - 1.230 (Status: affected) ### References 1. [](https://vuldb.com/?id.252036) 2. [](https://vuldb.com/?ctiid.252036) 3. [](https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html) ### Credits - fernando.mengali (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3594 - **State**: PUBLISHED - **Published Date**: November 06, 2020 at 18:17 UTC - **Last Updated**: November 13, 2024 at 17:41 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted options to a specific command. A successful exploit could allow the attacker to gain root privileges. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Cisco - Cisco SD-WAN Solution** Affected versions: - n/a (Status: affected) ### References 1. [20201104 Cisco SD-WAN Software Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepestd-8C3J9Vc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-10001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-10001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-10001 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 03:00 UTC - **Last Updated**: August 05, 2024 at 07:32 UTC - **Reserved Date**: April 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The decode_init function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via an AVI file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=47b7c68ae54560e2308bdb6be4fb076c73b93081) 2. [DSA-4249](https://www.debian.org/security/2018/dsa-4249) 3. [103732](http://www.securityfocus.com/bid/103732) 4. [GLSA-202003-65](https://security.gentoo.org/glsa/202003-65)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6588 - **State**: PUBLISHED - **Published Date**: April 03, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:34 UTC - **Reserved Date**: April 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [aztech-router-default-password(50068)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50068) 2. [51229](http://osvdb.org/51229) 3. [20080418 Aztech ADSL2/2+ 4 Port default password](http://archives.neohapsis.com/archives/vuln-dev/2008-q2/0010.html) 4. [20080421 Re: Aztech ADSL2/2+ 4 Port default password](http://archives.neohapsis.com/archives/vuln-dev/2008-q2/0012.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3270 - **State**: PUBLISHED - **Published Date**: August 18, 2008 at 17:15 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 24, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2008:0815](http://www.redhat.com/support/errata/RHSA-2008-0815.html) 2. [31472](http://secunia.com/advisories/31472) 3. [oval:org.mitre.oval:def:10864](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10864) 4. [1020698](http://securitytracker.com/id?1020698) 5. [30695](http://www.securityfocus.com/bid/30695) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=457113)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1331 - **State**: PUBLISHED - **Published Date**: February 04, 2021 at 16:41 UTC - **Last Updated**: November 08, 2024 at 23:48 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210203 Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5213 - **State**: PUBLISHED - **Published Date**: January 19, 2017 at 05:43 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: May 31, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **n/a - Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android** Affected versions: - Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android (Status: affected) ### References 1. [RHSA-2016:2919](http://rhn.redhat.com/errata/RHSA-2016-2919.html) 2. [94633](http://www.securityfocus.com/bid/94633) 3. [](https://crbug.com/652548) 4. [](https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html) 5. [GLSA-201612-11](https://security.gentoo.org/glsa/201612-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4251 - **State**: PUBLISHED - **Published Date**: June 12, 2020 at 13:10 UTC - **Last Updated**: September 17, 2024 at 02:05 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM API Connect 5.0.0.0 through 5.0.8.8 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 175489. ### Affected Products **IBM - API Connect** Affected versions: - 5.0.0.0 (Status: affected) - 5.0.8.8 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6209125) 2. [ibm-api-cve20204251-xss (175489)](https://exchange.xforce.ibmcloud.com/vulnerabilities/175489)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0373 - **State**: PUBLISHED - **Published Date**: May 23, 2017 at 18:00 UTC - **Last Updated**: August 05, 2024 at 13:03 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous "use lib" line, which allows remote attackers to have an unspecified impact via a crafted Debian package file. ### Affected Products **n/a - libconfig-model-perl** Affected versions: - libconfig-model-perl (Status: affected) ### References 1. [](https://anonscm.debian.org/cgit/pkg-perl/packages/libconfig-model-perl.git/commit/?h=stretch&id=e7e5dd1a650939a0e021d1d5b311dbb3c4884773) 2. [](http://cpansearch.perl.org/src/DDUMONT/Config-Model-2.102/Changes) 3. [](https://security-tracker.debian.org/tracker/CVE-2017-0373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41037 - **State**: PUBLISHED - **Published Date**: July 08, 2022 at 03:50 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: eclipse ### Vulnerability Description In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source. ### CVSS Metrics - **CVSS Base Score**: 10/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-829: Security Weakness ### Affected Products **The Eclipse Foundation - Eclipse Equinox p2** Affected versions: - 1.0.0 (Status: affected) ### References 1. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029) 2. [](https://github.com/eclipse-equinox/p2/issues/235)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14840 - **State**: PUBLISHED - **Published Date**: October 17, 2022 at 00:00 UTC - **Last Updated**: May 13, 2025 at 20:38 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in the RHDM, where sensitive HTML form fields like Password has auto-complete enabled which may lead to leak of credentials. ### Weakness Classification (CWE) - CWE-522: Security Weakness ### Affected Products **n/a - Business-central** Affected versions: - Business-central as shipped in RHDM 7 and RHPAM 7 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1748185) 2. [](https://access.redhat.com/security/cve/CVE-2019-14840)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6523 - **State**: PUBLISHED - **Published Date**: February 02, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 06:10 UTC - **Reserved Date**: February 01, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKFsAv.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x22045c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://inca.co.kr/include_file/pdf_down/nProtect%20AVS%20V4%20Vulnerability%20Response%20Release%20Notes.pdf) 2. [](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x22045c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6052 - **State**: PUBLISHED - **Published Date**: July 03, 2024 at 14:30 UTC - **Last Updated**: September 16, 2024 at 13:57 UTC - **Reserved Date**: June 17, 2024 at 10:10 UTC - **Assigned By**: Checkmk ### Vulnerability Description Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-80: Security Weakness ### Affected Products **Checkmk GmbH - Checkmk** Affected versions: - 2.3.0 (Status: affected) - 2.2.0 (Status: affected) - 2.1.0 (Status: affected) - 2.0.0 (Status: affected) ### References 1. [](https://checkmk.com/werk/17010)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2170 - **State**: REJECTED - **Published Date**: January 20, 2014 at 02:00 UTC - **Last Updated**: January 20, 2014 at 02:57 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10139 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 13:40 UTC - **Last Updated**: August 04, 2024 at 10:50 UTC - **Reserved Date**: March 05, 2020 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Acronis - True Image 2021** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.kb.cert.org/vuls/id/114757) ### Credits - Will Dormann
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57072, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57072 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57072 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 00:00 UTC - **Last Updated**: February 06, 2025 at 15:31 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A prototype pollution in the lib.requireFromString function of module-from-string v3.3.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/tariqhawis/8b1fe301dd1ea52952cef347daddee67)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22519, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22519 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22519 - **State**: PUBLISHED - **Published Date**: May 28, 2021 at 19:22 UTC - **Last Updated**: August 03, 2024 at 18:44 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description Execute arbitrary code vulnerability in Micro Focus SiteScope product, affecting versions 11.40,11.41 , 2018.05(11.50), 2018.08(11.51), 2018.11(11.60), 2019.02(11.70), 2019.05(11.80), 2019.08(11.90), 2019.11(11.91), 2020.05(11.92), 2020.10(11.93). The vulnerability could allow remote attackers to execute arbitrary code on affected installations of SiteScope. ### Affected Products **n/a - SiteScope** Affected versions: - 11.40,11.41 , 2018.05(11.50), 2018.08(11.51), 2018.11(11.60), 2019.02(11.70), 2019.05(11.80), 2019.08(11.90), 2019.11(11.91), 2020.05(11.92), 2020.10(11.93) (Status: affected) ### References 1. [](https://softwaresupport.softwaregrp.com/doc/KM03811028)