System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16462
- **State**: PUBLISHED
- **Published Date**: October 30, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 04, 2018 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A command injection vulnerability in the apex-publish-static-files npm module version <2.0.1 which allows arbitrary shell command execution through a maliciously crafted argument.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**n/a - apex-publish-static-files**
Affected versions:
- 2.0.1 (Status: affected)
### References
1. [](https://hackerone.com/reports/405694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0097
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 19:00 UTC
- **Last Updated**: August 03, 2024 at 15:25 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Path traversal in the BMC firmware for Intel(R) Server Board M10JNP2SB before version EFI BIOS 7215, BMC 8100.01.08 may allow an unauthenticated user to potentially enable a denial of service via adjacent access.
### Affected Products
**n/a - Intel(R) Server Board M10JNP2SB**
Affected versions:
- before version EFI BIOS 7215, BMC 8100.01.08 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00474.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40391
- **State**: PUBLISHED
- **Published Date**: November 19, 2021 at 18:53 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 01, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-390: Security Weakness
### Affected Products
**n/a - Gerbv**
Affected versions:
- Gerbv 2.7.0 , Gerbv dev (commit b5f1eacd) ,Gerbv forked dev (commit 71493260) (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402)
2. [[debian-lts-announce] 20211203 [SECURITY] [DLA 2839-1] gerbv security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00003.html)
3. [FEDORA-2022-4a3ef86baa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUM5GIUZJ7AVHVCXDZW6ZVCAPV2ISN47/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6997
- **State**: REJECTED
- **Published Date**: January 17, 2019 at 17:00 UTC
- **Last Updated**: January 17, 2019 at 16:57 UTC
- **Reserved Date**: February 14, 2018 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6188
- **State**: PUBLISHED
- **Published Date**: February 03, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Memory leak in SOGo 2.3.7 allows remote attackers to cause a denial of service (memory consumption) via a large number of attempts to upload a large attachment, related to temporary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sogo.nu/bugs/view.php?id=3510)
2. [](https://github.com/inverse-inc/sogo/commit/32bb1456e23a32c7f45079c3985bf732dd0d276d)
3. [[oss-security] 20160709 Re: CVE request: several SOGo issues (DOS, XSS, information leakage)](http://www.openwall.com/lists/oss-security/2016/07/09/3)
4. [96007](http://www.securityfocus.com/bid/96007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9228
- **State**: PUBLISHED
- **Published Date**: September 12, 2017 at 08:00 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: September 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In post-new.php in the Photocrati NextGEN Gallery plugin 2.1.10 for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cybersecurityworks/Disclosed/issues/6)
2. [](https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html)
3. [](https://wordpress.org/plugins/nextgen-gallery/#developers)
4. [](http://www.openwall.com/lists/oss-security/2015/10/27/6)
5. [](https://wpvulndb.com/vulnerabilities/9758)
6. [](https://cybersecurityworks.com/zerodays/cve-2015-9228-crony.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5894
- **State**: PUBLISHED
- **Published Date**: December 06, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 15:47 UTC
- **Reserved Date**: November 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors. NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used. NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29457](http://secunia.com/advisories/29457)
2. [SUSE-SR:2008:002](http://www.novell.com/linux/security/advisories/suse_security_summary_report.html)
3. [26750](http://www.securityfocus.com/bid/26750)
4. [](http://wiki.rpath.com/Advisories:rPSA-2008-0112)
5. [20071208 Venustech reports of MIT krb5 vulns [CVE-2007-5894 CVE-2007-5901 CVE-2007-5902 CVE-2007-5971 CVE-2007-5972]](http://seclists.org/fulldisclosure/2007/Dec/0321.html)
6. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112)
7. [20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation](http://www.securityfocus.com/archive/1/489883/100/0/threaded)
8. [](http://bugs.gentoo.org/show_bug.cgi?id=199205)
9. [20071208 MIT Kerberos 5: Multiple vulnerabilities](http://seclists.org/fulldisclosure/2007/Dec/0176.html)
10. [44333](http://osvdb.org/44333)
11. [28636](http://secunia.com/advisories/28636)
12. [](https://issues.rpath.com/browse/RPL-2012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31173
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 15:30 UTC
- **Last Updated**: October 01, 2024 at 17:21 UTC
- **Reserved Date**: April 24, 2023 at 23:20 UTC
- **Assigned By**: SEL
### Vulnerability Description
Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Schweitzer Engineering Laboratories - SEL-5037 SEL Grid Configurator**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://selinc.com/support/security-notifications/external-reports/)
2. [](https://www.nozominetworks.com/blog/)
### Credits
- Gabriele Quagliarella of Nozomi Networks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20990, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20990
- **State**: PUBLISHED
- **Published Date**: April 19, 2021 at 14:05 UTC
- **Last Updated**: September 16, 2024 at 16:42 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
In Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older an internal management service is accessible on port 8000 and some API endpoints could be accessed without authentication to trigger a shutdown, a reboot or a reboot into recovery mode.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Fibar Group S.A - Fibaro Home Center**
Affected versions:
- Home Center 2 (Status: affected)
- Home Center Lite (Status: affected)
### References
1. [](https://www.iot-inspector.com/blog/advisory-fibaro-home-center/)
2. [20210419 [CVE-2021-20989, CVE-2021-20990, CVE-2021-20991, CVE-2021-20992] Multiple vulnerabilities in Fibaro Home Center](http://seclists.org/fulldisclosure/2021/Apr/27)
3. [](http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html)
### Credits
- Marton Illes IoT Inspector Research Lab https://www.iot-inspector.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47454
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 06:19 UTC
- **Last Updated**: May 04, 2025 at 12:41 UTC
- **Reserved Date**: May 21, 2024 at 14:58 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/smp: do not decrement idle task preempt count in CPU offline
With PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we
get:
BUG: scheduling while atomic: swapper/1/0/0x00000000
no locks held by swapper/1/0.
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100
Call Trace:
dump_stack_lvl+0xac/0x108
__schedule_bug+0xac/0xe0
__schedule+0xcf8/0x10d0
schedule_idle+0x3c/0x70
do_idle+0x2d8/0x4a0
cpu_startup_entry+0x38/0x40
start_secondary+0x2ec/0x3a0
start_secondary_prolog+0x10/0x14
This is because powerpc's arch_cpu_idle_dead() decrements the idle task's
preempt count, for reasons explained in commit a7c2bb8279d2 ("powerpc:
Re-enable preemption before cpu_die()"), specifically "start_secondary()
expects a preempt_count() of 0."
However, since commit 2c669ef6979c ("powerpc/preempt: Don't touch the idle
task's preempt_count during hotplug") and commit f1a0a376ca0c ("sched/core:
Initialize the idle task with preemption disabled"), that justification no
longer holds.
The idle task isn't supposed to re-enable preemption, so remove the
vestigial preempt_enable() from the CPU offline path.
Tested with pseries and powernv in qemu, and pseries on PowerVM.
### Affected Products
**Linux - Linux**
Affected versions:
- bdf4d33e8342b90386156204e1da0cdfdb4bf146 (Status: affected)
- 2c669ef6979c370f98d4b876e54f19613c81e075 (Status: affected)
- 2c669ef6979c370f98d4b876e54f19613c81e075 (Status: affected)
- 2b6148ef2bd6d8ddc76e7873114f7769b6aa25f0 (Status: affected)
- 20a015e948b825afb47855de2efce7cae7c2608f (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.10.76 (Status: unaffected)
- 5.14.15 (Status: unaffected)
- 5.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/53770a411559cf7bc0906d1df319cc533d2f4f58)
2. [](https://git.kernel.org/stable/c/3ea0b497a7a2fff6a4b7090310c9f52c91975934)
3. [](https://git.kernel.org/stable/c/787252a10d9422f3058df9a4821f389e5326c440) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3670
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in users.jsp in the Profile Search functionality in Liferay before 7.0.0 CE RC1 allows remote attackers to inject arbitrary web script or HTML via the FirstName field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labs.integrity.pt/advisories/cve-2016-3670/)
2. [39880](https://www.exploit-db.com/exploits/39880/)
3. [20160601 CVE-2016-3670 Stored Cross Site Scripting in Liferay CE](http://seclists.org/fulldisclosure/2016/Jun/5)
4. [](https://issues.liferay.com/browse/LPS-62387)
5. [1036083](http://www.securitytracker.com/id/1036083)
6. [](http://packetstormsecurity.com/files/137279/Liferay-CE-Stored-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20803
- **State**: PUBLISHED
- **Published Date**: November 23, 2020 at 17:30 UTC
- **Last Updated**: September 16, 2024 at 21:02 UTC
- **Reserved Date**: March 15, 2019 at 00:00 UTC
- **Assigned By**: mongodb
### Vulnerability Description
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects MongoDB Server v4.0 versions prior to 4.0.5; MongoDB Server v3.6 versions prior to 3.6.10 and MongoDB Server v3.4 versions prior to 3.4.19.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-835: Security Weakness
### Affected Products
**MongoDB Inc. - MongoDB Server**
Affected versions:
- 4.0 (Status: affected)
- 3.6 (Status: affected)
- 3.4 (Status: affected)
### References
1. [](https://jira.mongodb.org/browse/SERVER-38070) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6710
- **State**: PUBLISHED
- **Published Date**: August 17, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 18:23 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco Virtual Network Function (VNF) Element Manager could allow an authenticated, remote attacker to elevate privileges and run commands in the context of the root user on the server. The vulnerability is due to command settings that allow Cisco VNF Element Manager users to specify arbitrary commands that will run as root on the server. An attacker could use this setting to elevate privileges and run commands in the context of the root user on the server. Cisco Bug IDs: CSCvc76670. Known Affected Releases: prior to 5.0.4 and 5.1.4.
### Affected Products
**Cisco Systems, Inc. - Virtual Network Function (VNF) Element Manager**
Affected versions:
- prior to 5.0.4 and 5.1.4 (Status: affected)
### References
1. [100362](http://www.securityfocus.com/bid/100362)
2. [20170816 Cisco Virtual Network Function Element Manager Arbitrary Command Execution Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-em) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2632
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 16:02 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: System Monitoring). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
### Affected Products
**Oracle Corporation - Enterprise Manager Base Platform**
Affected versions:
- 12.1.0.5 (Status: affected)
- 13.2.0.0 (Status: affected)
- 13.3.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13331
- **State**: PUBLISHED
- **Published Date**: October 03, 2019 at 21:33 UTC
- **Last Updated**: August 04, 2024 at 23:49 UTC
- **Reserved Date**: July 05, 2019 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8838.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.5.0.20723 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-854/)
### Credits
- Natnael Samson (@NattiSamson) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4786
- **State**: PUBLISHED
- **Published Date**: September 10, 2007 at 21:00 UTC
- **Last Updated**: January 17, 2025 at 14:49 UTC
- **Reserved Date**: September 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Adaptive Security Appliance (ASA) running PIX 7.0 before 7.0.7.1, 7.1 before 7.1.2.61, 7.2 before 7.2.2.34, and 8.0 before 8.0.2.11, when AAA is enabled, composes %ASA-5-111008 messages from the "test aaa" command with cleartext passwords and sends them over the network to a remote syslog server or places them in a local logging buffer, which allows context-dependent attackers to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26677](http://secunia.com/advisories/26677)
2. [1018660](http://www.securitytracker.com/id?1018660)
3. [](http://www.kb.cert.org/vuls/id/MIMG-74ZK93)
4. [cisco-asa-aaa-information-disclosure(36473)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36473)
5. [37499](http://osvdb.org/37499)
6. [25548](http://www.securityfocus.com/bid/25548)
7. [](http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsj72903)
8. [VU#563673](http://www.kb.cert.org/vuls/id/563673)
9. [ADV-2007-3076](http://www.vupen.com/english/advisories/2007/3076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3920
- **State**: PUBLISHED
- **Published Date**: March 27, 2020 at 03:50 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: December 20, 2019 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. Any user can access the privileged page to manage accounts through specific system directory.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Unisoon - UltraLog Express**
Affected versions:
- 1.4.0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-3452-937d6-1.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7802
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:12 UTC
- **Reserved Date**: April 12, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2017-19/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1378147)
3. [](https://www.mozilla.org/security/advisories/mfsa2017-20/)
4. [DSA-3968](https://www.debian.org/security/2017/dsa-3968)
5. [](https://www.mozilla.org/security/advisories/mfsa2017-18/)
6. [RHSA-2017:2456](https://access.redhat.com/errata/RHSA-2017:2456)
7. [RHSA-2017:2534](https://access.redhat.com/errata/RHSA-2017:2534)
8. [100202](http://www.securityfocus.com/bid/100202)
9. [1039124](http://www.securitytracker.com/id/1039124)
10. [GLSA-201803-14](https://security.gentoo.org/glsa/201803-14)
11. [DSA-3928](https://www.debian.org/security/2017/dsa-3928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0140
- **State**: PUBLISHED
- **Published Date**: February 08, 2018 at 07:00 UTC
- **Last Updated**: December 02, 2024 at 21:08 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco Email Security Appliance and Cisco Content Security Management Appliance**
Affected versions:
- Cisco Email Security Appliance and Cisco Content Security Management Appliance (Status: affected)
### References
1. [1040339](http://www.securitytracker.com/id/1040339)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm)
3. [103090](http://www.securityfocus.com/bid/103090)
4. [1040338](http://www.securitytracker.com/id/1040338) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5551
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 01:31 UTC
- **Last Updated**: June 04, 2025 at 13:34 UTC
- **Reserved Date**: June 03, 2025 at 16:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. This affects an unknown part of the component SYSTEM Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**FreeFloat - FTP Server**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311001 | FreeFloat FTP Server SYSTEM Command buffer overflow](https://vuldb.com/?id.311001)
2. [VDB-311001 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311001)
3. [Submit #586988 | FreeFloat FTP Server 1.0 Buffer Overflow](https://vuldb.com/?submit.586988)
4. [](https://fitoxs.com/exploit/exploit-538c6a53e2781f3f3842d470c4e7cb8fa36a94d4a028d72c13f61db8c6c4a1fa.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35999
- **State**: REJECTED
- **Last Updated**: July 02, 2023 at 21:50 UTC
- **Reserved Date**: June 20, 2023 at 20:19 UTC
- **Assigned By**: Proofpoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21682
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 22:10 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
### Affected Products
**Jenkins project - Jenkins**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424)
2. [[oss-security] 20211006 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2021/10/06/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4513, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4513
- **State**: PUBLISHED
- **Published Date**: November 12, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:45 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the oz_cdev_write function in drivers/staging/ozwpan/ozcdev.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted write operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2073-1](http://www.ubuntu.com/usn/USN-2073-1)
2. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15)
3. [](https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.12.bz2)
4. [USN-2076-1](http://www.ubuntu.com/usn/USN-2076-1)
5. [USN-2069-1](http://www.ubuntu.com/usn/USN-2069-1)
6. [USN-2070-1](http://www.ubuntu.com/usn/USN-2070-1)
7. [USN-2071-1](http://www.ubuntu.com/usn/USN-2071-1)
8. [[oss-security] 20131104 Re: some unstracked linux kernel security fixes](http://www.openwall.com/lists/oss-security/2013/11/04/22)
9. [USN-2074-1](http://www.ubuntu.com/usn/USN-2074-1)
10. [USN-2068-1](http://www.ubuntu.com/usn/USN-2068-1)
11. [openSUSE-SU-2014:0204](http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html)
12. [USN-2072-1](http://www.ubuntu.com/usn/USN-2072-1)
13. [63508](http://www.securityfocus.com/bid/63508)
14. [](https://github.com/torvalds/linux/commit/c2c65cd2e14ada6de44cb527e7f1990bede24e15)
15. [USN-2075-1](http://www.ubuntu.com/usn/USN-2075-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5020
- **State**: PUBLISHED
- **Published Date**: July 31, 2019 at 16:38 UTC
- **Last Updated**: August 04, 2024 at 19:40 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial of service vulnerability exists in the object lookup functionality of Yara 3.8.1. A specially crafted binary file can cause a negative value to be read to satisfy an assert, resulting in Denial of Service. An attacker can create a malicious binary to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-617: Security Weakness
### Affected Products
**n/a - Yara Object**
Affected versions:
- Yara 3.8.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0781) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29911
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 13:58 UTC
- **Reserved Date**: April 29, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-16/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-18/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-17/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1761981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0431
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:33 UTC
- **Last Updated**: April 22, 2025 at 15:58 UTC
- **Reserved Date**: January 11, 2024 at 16:20 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_set_default_card' function. This makes it possible for unauthenticated attackers to set the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**easynolo - Gestpay for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7d3a6650-5be0-4162-93eb-369538a2ebc5?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/gestpay-for-woocommerce/trunk/inc/class-gestpay-cards.php#L117)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14567
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:39 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.7.29 and prior (Status: affected)
- 8.0.19 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
2. [](https://security.netapp.com/advisory/ntap-20200717-0004/)
3. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4901
- **State**: PUBLISHED
- **Published Date**: November 04, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 10:31 UTC
- **Reserved Date**: November 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/admin.php in Article Publisher Pro 1.5 allows remote attackers to execute arbitrary SQL commands via the username parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32030](http://www.securityfocus.com/bid/32030)
2. [6912](https://www.exploit-db.com/exploits/6912)
3. [articlepublisherpro-admin-sql-injection(46373)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46373)
4. [32519](http://secunia.com/advisories/32519) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1861
- **State**: PUBLISHED
- **Published Date**: June 11, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: June 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35274](http://www.securityfocus.com/bid/35274)
2. [ADV-2009-1547](http://www.vupen.com/english/advisories/2009/1547)
3. [35655](http://secunia.com/advisories/35655)
4. [TA09-161A](http://www.us-cert.gov/cas/techalerts/TA09-161A.html)
5. [35734](http://secunia.com/advisories/35734)
6. [VU#568153](http://www.kb.cert.org/vuls/id/568153)
7. [RHSA-2009:1109](http://www.redhat.com/support/errata/RHSA-2009-1109.html)
8. [](http://www.adobe.com/support/security/bulletins/apsb09-07.html)
9. [SUSE-SA:2009:035](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html)
10. [1022361](http://securitytracker.com/id?1022361)
11. [35295](http://www.securityfocus.com/bid/35295)
12. [GLSA-200907-06](http://security.gentoo.org/glsa/glsa-200907-06.xml)
13. [34580](http://secunia.com/advisories/34580)
14. [35685](http://secunia.com/advisories/35685)
15. [SUSE-SR:2009:012](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html)
16. [35496](http://secunia.com/advisories/35496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3043
- **State**: PUBLISHED
- **Published Date**: June 05, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 13:57 UTC
- **Reserved Date**: June 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Collaboration - File Sharing 01-20 up to 01-20-/B and 01-30 up to 01-30-/B in Hitachi Groupmax Collaboration Portal up to 07-30-/D, Groupmax Collaboration Web Client - Forum/File Sharing up to 07-30-/C, uCosminexus Collaboration Portal up to 06-30-/D, and uCosminexus Collaboration Portal - Forum/File Sharing up to 06-30-/C on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24263](http://www.securityfocus.com/bid/24263)
2. [hitachi-filesharing-xss(34659)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34659)
3. [36828](http://osvdb.org/36828)
4. [ADV-2007-2020](http://www.vupen.com/english/advisories/2007/2020)
5. [](http://www.hitachi-support.com/security_e/vuls_e/HS07-011_e/index-e.html)
6. [25507](http://secunia.com/advisories/25507) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6123
- **State**: PUBLISHED
- **Published Date**: November 26, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Coppermine Photo Gallery (CPG) 1.4.8 stable, with register_globals enabled, allows remote attackers to bypass XSS protection and set arbitrary variables via a query string that causes the variable to be defined in global space, with separate _GET, _REQUEST, or other critical parameters, which are unset by the protection scheme and prevent the original variable from being detected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27618](http://www.osvdb.org/27618)
2. [1914](http://securityreason.com/securityalert/1914)
3. [20060623 [KAPDA]Coppermine 1.4.8~Parameter Cleanup System ByPass~Registering Global Varables](http://archives.neohapsis.com/archives/bugtraq/2006-06/0482.html)
4. [](http://myimei.com/security/2006-06-20/coppermine-148parameter-cleanup-system-bypassregistering-global-varables.html)
5. [20597](http://secunia.com/advisories/20597)
6. [](http://svn.sourceforge.net/viewvc/coppermine?view=rev&revision=3133)
7. [coppermine-init-security-bypass(27376)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27376) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7685
- **State**: PUBLISHED
- **Published Date**: August 31, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:52 UTC
- **Reserved Date**: March 05, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
### Weakness Classification (CWE)
- CWE-358: Security Weakness
### Affected Products
**SUSE - libzypp**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1091624)
2. [](https://www.suse.com/de-de/security/cve/CVE-2018-7685/)
3. [](http://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49310
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:10 UTC
- **Last Updated**: May 04, 2025 at 08:34 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
char: xillybus: fix a refcount leak in cleanup_dev()
usb_get_dev is called in xillyusb_probe. So it is better to call
usb_put_dev before xdev is released.
### Affected Products
**Linux - Linux**
Affected versions:
- a53d1202aef122894b6e46116a92174a9123db5d (Status: affected)
- a53d1202aef122894b6e46116a92174a9123db5d (Status: affected)
- a53d1202aef122894b6e46116a92174a9123db5d (Status: affected)
- a53d1202aef122894b6e46116a92174a9123db5d (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.47 (Status: unaffected)
- 5.17.15 (Status: unaffected)
- 5.18.4 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bc8fceda3b89006e8a7dda8a097d36045d044c25)
2. [](https://git.kernel.org/stable/c/21f1f167d727f3f857e26d509ef5a6d47fd31bc3)
3. [](https://git.kernel.org/stable/c/e277b95acdab84cd5d2f8d537a37aef6d21e988b)
4. [](https://git.kernel.org/stable/c/b67d19662fdee275c479d21853bc1239600a798f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2294
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 04:22 UTC
- **Last Updated**: March 28, 2025 at 15:36 UTC
- **Reserved Date**: March 13, 2025 at 18:41 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**extendthemes - Kubio AI Page Builder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2fb44c6e-520e-4a9f-9987-8b770feb710d?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/kubio/tags/2.5.1/lib/integrations/third-party-themes/editor-hooks.php#L32)
### Credits
- Michael Mazzolini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32194
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:59 UTC
- **Last Updated**: April 04, 2025 at 20:12 UTC
- **Reserved Date**: April 04, 2025 at 10:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS. This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.4.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**LA-Studio - LA-Studio Element Kit for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/lastudio-element-kit/vulnerability/wordpress-la-studio-element-kit-for-elementor-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Michael (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25560
- **State**: PUBLISHED
- **Published Date**: February 10, 2023 at 22:03 UTC
- **Last Updated**: March 10, 2025 at 21:13 UTC
- **Reserved Date**: February 07, 2023 at 17:10 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DataHub is an open-source metadata platform. The AuthServiceClient which is responsible for creation of new accounts, verifying credentials, resetting them or requesting access tokens, crafts multiple JSON strings using format strings with user-controlled data. This means that an attacker may be able to augment these JSON strings to be sent to the backend and that can potentially be abused by including new or colliding values. This issue may lead to an authentication bypass and the creation of system accounts, which effectively can lead to full system compromise. Users are advised to upgrade. There are no known workarounds for this vulnerability. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-080.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-913: Security Weakness
### Affected Products
**datahub-project - datahub**
Affected versions:
- < 0.8.45 (Status: affected)
### References
1. [https://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3](https://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12970
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 11:19 UTC
- **Last Updated**: January 06, 2025 at 13:34 UTC
- **Reserved Date**: December 26, 2024 at 08:52 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM Pardus OS My Computer allows OS Command Injection.This issue affects Pardus OS My Computer: before 0.7.2.
### CVSS Metrics
- **CVSS Base Score**: 3.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**TUBITAK BILGEM - Pardus OS My Computer**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-24-1900)
### Credits
- Osman Can VURAL |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2937, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2937 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2937
- **State**: PUBLISHED
- **Published Date**: April 13, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:32 UTC
- **Reserved Date**: April 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ("quadratic blowup" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201510-05](https://security.gentoo.org/glsa/201510-05)
2. [MDVSA-2015:200](http://www.mandriva.com/security/advisories?name=MDVSA-2015:200)
3. [73477](http://www.securityfocus.com/bid/73477)
4. [[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24](http://www.openwall.com/lists/oss-security/2015/04/07/3)
5. [[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24](http://www.openwall.com/lists/oss-security/2015/04/01/1)
6. [[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2](https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html)
7. [](https://phabricator.wikimedia.org/T71210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41720
- **State**: PUBLISHED
- **Published Date**: December 07, 2022 at 16:11 UTC
- **Last Updated**: April 23, 2025 at 15:43 UTC
- **Reserved Date**: September 28, 2022 at 17:00 UTC
- **Assigned By**: Go
### Vulnerability Description
On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error.
### Affected Products
**Go standard library - os**
Affected versions:
- 0 (Status: affected)
- 1.19.0-0 (Status: affected)
**Go standard library - net/http**
Affected versions:
- 0 (Status: affected)
- 1.19.0-0 (Status: affected)
### References
1. [](https://go.dev/issue/56694)
2. [](https://go.dev/cl/455716)
3. [](https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ)
4. [](https://pkg.go.dev/vuln/GO-2022-1143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3975
- **State**: PUBLISHED
- **Published Date**: July 27, 2023 at 14:34 UTC
- **Last Updated**: October 15, 2024 at 15:32 UTC
- **Reserved Date**: July 27, 2023 at 14:34 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
OS Command Injection in GitHub repository jgraph/drawio prior to 21.5.0.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**jgraph - jgraph/drawio**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/4da96d20-78ac-462e-910c-a14db9062161)
2. [](https://github.com/jgraph/drawio/commit/8ec95cb03e0a80cf908a282522ac1651306db340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7857
- **State**: PUBLISHED
- **Published Date**: August 25, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html)
2. [20150528 [SEARCH-LAB advisory] More than fifty vulnerabilities in D-Link NAS and NVR devices](http://www.securityfocus.com/archive/1/535626/100/200/threaded)
3. [20150531 [SEARCH-LAB advisory] More than fifty vulnerabilities in D-Link NAS and NVR devices](http://seclists.org/fulldisclosure/2015/May/125)
4. [](http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf)
5. [74880](http://www.securityfocus.com/bid/74880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4546
- **State**: PUBLISHED
- **Published Date**: December 16, 2010 at 19:45 UTC
- **Last Updated**: September 16, 2024 at 19:01 UTC
- **Reserved Date**: December 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Lotus Notes Traveler before 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-10.lotus.com/ldd/dominowiki.nsf/page.xsp?documentId=A6604E906E0DF2DF8525778B005D4466&action=openDocument)
2. [](http://www-10.lotus.com/ldd/dominowiki.nsf/dx/Lotus_Notes_Traveler_851_FP3_Release_Notes)
3. [LO49840](http://www-1.ibm.com/support/docview.wss?uid=swg1LO49840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1426
- **State**: PUBLISHED
- **Published Date**: April 18, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 14, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20110412 ZDI-11-122: RealNetworks RealPlayer OpenURLInDefaultBrowser Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/517470/100/0/threaded)
2. [](http://service.real.com/realplayer/security/04122011_player/en/)
3. [1025351](http://securitytracker.com/id?1025351)
4. [ADV-2011-0979](http://www.vupen.com/english/advisories/2011/0979)
5. [realplayer-openurlindefaultbrowser-code-exe(66728)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66728)
6. [47335](http://www.securityfocus.com/bid/47335)
7. [](http://zerodayinitiative.com/advisories/ZDI-11-122/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4828, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4828
- **State**: PUBLISHED
- **Published Date**: January 30, 2023 at 20:31 UTC
- **Last Updated**: March 27, 2025 at 20:42 UTC
- **Reserved Date**: December 29, 2022 at 08:42 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Bold Timeline Lite WordPress plugin before 1.1.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Bold Timeline Lite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1948, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1948 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1948
- **State**: PUBLISHED
- **Published Date**: April 08, 2023 at 06:31 UTC
- **Last Updated**: August 02, 2024 at 06:05 UTC
- **Reserved Date**: April 08, 2023 at 06:12 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PHPGurukul - BP Monitoring Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.225335)
2. [](https://vuldb.com/?ctiid.225335)
3. [](https://github.com/vsdwef/BP-Monitoring-Management-System/blob/main/XSS_English.pdf)
### Credits
- carrie.lee (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24511
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Pkp OJS v.3.4 allows an attacker to execute arbitrary code via the Input Title component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drive.google.com/file/d/1IhU9tNhc6enKL1Dgq9--R05biJBjodKv/view?usp=sharing)
2. [](https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3283
- **State**: PUBLISHED
- **Published Date**: September 24, 2010 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 18:18 UTC
- **Reserved Date**: September 13, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Open redirect vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBMA02584](http://marc.info/?l=bugtraq&m=128525419119241&w=2)
2. [SSRT100230](http://marc.info/?l=bugtraq&m=128525419119241&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40899
- **State**: PUBLISHED
- **Published Date**: August 24, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 13:14 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetMacFilterCfg/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8001
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 09:47 UTC
- **Last Updated**: January 09, 2025 at 16:32 UTC
- **Reserved Date**: August 20, 2024 at 08:04 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
- CWE-863: Incorrect Authorization
### Affected Products
**VIWIS - LMS**
Affected versions:
- 9.11 (Status: affected)
### References
1. [VDB-284352 | VIWIS LMS Print authorization](https://vuldb.com/?id.284352)
2. [VDB-284352 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.284352)
3. [](https://www.scip.ch/?news.20241203)
### Credits
- Ralph Meier |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8570
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11.
### Affected Products
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
### References
1. [105783](http://www.securityfocus.com/bid/105783)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8570)
3. [1042131](http://www.securitytracker.com/id/1042131) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1999042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1999042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1999042
- **State**: PUBLISHED
- **Published Date**: August 23, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in XStream2.java that allows attackers to have Jenkins resolve a domain name when deserializing an instance of java.net.URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-08-15/#SECURITY-637) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4778
- **State**: PUBLISHED
- **Published Date**: May 25, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:27 UTC
- **Reserved Date**: July 09, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21701389) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11270
- **State**: PUBLISHED
- **Published Date**: August 11, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:46 UTC
- **Reserved Date**: July 13, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data representing icons. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe Systems Incorporated - Acrobat Reader**
Affected versions:
- 2017.009.20058 and earlier (Status: affected)
- 2017.008.30051 and earlier (Status: affected)
- 2015.006.30306 and earlier (Status: affected)
- 11.0.20 and earlier (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb17-24.html)
2. [1039098](http://www.securitytracker.com/id/1039098)
3. [100179](http://www.securityfocus.com/bid/100179) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1618
- **State**: PUBLISHED
- **Published Date**: February 17, 2015 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:44 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated users to obtain sensitive password information via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39543
- **State**: PUBLISHED
- **Published Date**: August 21, 2023 at 08:14 UTC
- **Last Updated**: October 04, 2024 at 17:54 UTC
- **Reserved Date**: August 09, 2023 at 02:20 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product.
### Affected Products
**LuxSoft - LuxCal Web Calendar**
Affected versions:
- prior to 5.2.3M (MySQL version) (Status: affected)
**LuxSoft - LuxCal Web Calendar**
Affected versions:
- prior to 5.2.3L (SQLite version) (Status: affected)
### References
1. [](https://www.luxsoft.eu/)
2. [](https://www.luxsoft.eu/?download)
3. [](https://jvn.jp/en/jp/JVN04876736/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1215
- **State**: PUBLISHED
- **Published Date**: April 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: April 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The default configuration of Lotus Domino server 5.0.8 includes system information (version, operating system, and build date) in the HTTP headers of replies, which allows remote attackers to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010919 lotus domino server 5.08 is very gabby](http://marc.info/?l=bugtraq&m=100094373621813&w=2)
2. [VU#984555](http://www.kb.cert.org/vuls/id/984555)
3. [](http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0%2CAWHN4A8QWM)
4. [lotus-domino-information-disclosure(10685)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10685) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14588
- **State**: PUBLISHED
- **Published Date**: October 11, 2017 at 18:00 UTC
- **Last Updated**: October 15, 2024 at 19:14 UTC
- **Reserved Date**: September 19, 2017 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Various resources in Atlassian Fisheye and Crucible before version 4.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the dialog parameter.
### Affected Products
**Atlassian - Atlassian Fisheye and Crucible**
Affected versions:
- All versions prior to version 4.4.2 (Status: affected)
### References
1. [101268](http://www.securityfocus.com/bid/101268)
2. [](https://jira.atlassian.com/browse/FE-6935)
3. [](https://jira.atlassian.com/browse/CRUC-8113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20233
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 13:24 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In param_find_digests_internal and related functions of the Titan-M source, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222472803References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2022-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26587
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 13:30 UTC
- **Last Updated**: March 03, 2025 at 15:20 UTC
- **Reserved Date**: February 12, 2025 at 13:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound sidebarTabs allows Reflected XSS. This issue affects sidebarTabs: from n/a through 3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - sidebarTabs**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sidebartabs/vulnerability/wordpress-sidebartabs-plugin-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32554
- **State**: PUBLISHED
- **Published Date**: June 12, 2021 at 03:40 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: May 10, 2021 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
- CWE-61: Security Weakness
### Affected Products
**Canonical - apport**
Affected versions:
- 2.20.1 (Status: affected)
- 2.20.9 (Status: affected)
- 2.20.11-0ubuntu27 (Status: affected)
- 2.20.11-0ubuntu50 (Status: affected)
- 2.20.11-0ubuntu65 (Status: affected)
- 2.14.1-0ubuntu3 (Status: affected)
### References
1. [](https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904)
### Credits
- maik@secfault-security.com (@fktio) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19797
- **State**: PUBLISHED
- **Published Date**: December 03, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 11:44 UTC
- **Reserved Date**: December 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Selector_List::populate_extends in SharedPtr.hpp (used by ast.cpp and ast_selectors.cpp) may cause a Denial of Service (application crash) via a crafted sass input file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sass/libsass/issues/2779)
2. [openSUSE-SU-2019:1791](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html)
3. [openSUSE-SU-2019:1800](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html)
4. [openSUSE-SU-2019:1883](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38532
- **State**: PUBLISHED
- **Published Date**: June 28, 2024 at 21:25 UTC
- **Last Updated**: August 02, 2024 at 04:12 UTC
- **Reserved Date**: June 18, 2024 at 16:37 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The NXP Data Co-Processor (DCP) is a built-in hardware module for specific NXP SoCs¹ that implements a dedicated AES cryptographic engine for encryption/decryption operations. The dcp_tool reference implementation included in the repository selected the test key, regardless of its `-t` argument. This issue has been patched in commit 26a7.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**usbarmory - mxs-dcp**
Affected versions:
- >= commit 6151, < commit 26a7 (Status: affected)
### References
1. [https://github.com/usbarmory/mxs-dcp/security/advisories/GHSA-g85c-rh49-p8cq](https://github.com/usbarmory/mxs-dcp/security/advisories/GHSA-g85c-rh49-p8cq)
2. [https://github.com/usbarmory/mxs-dcp/commit/e5a99cb3d9429e6145495da7d01525c75af426a7](https://github.com/usbarmory/mxs-dcp/commit/e5a99cb3d9429e6145495da7d01525c75af426a7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45002
- **State**: PUBLISHED
- **Published Date**: September 04, 2024 at 19:54 UTC
- **Last Updated**: May 04, 2025 at 09:30 UTC
- **Reserved Date**: August 21, 2024 at 05:34 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
rtla/osnoise: Prevent NULL dereference in error handling
If the "tool->data" allocation fails then there is no need to call
osnoise_free_top() and, in fact, doing so will lead to a NULL dereference.
### Affected Products
**Linux - Linux**
Affected versions:
- 1eceb2fc2ca549a170d7ee7cd1fde2daeda646ac (Status: affected)
- 1eceb2fc2ca549a170d7ee7cd1fde2daeda646ac (Status: affected)
- 1eceb2fc2ca549a170d7ee7cd1fde2daeda646ac (Status: affected)
- 1eceb2fc2ca549a170d7ee7cd1fde2daeda646ac (Status: affected)
**Linux - Linux**
Affected versions:
- 5.17 (Status: affected)
- 0 (Status: unaffected)
- 6.1.107 (Status: unaffected)
- 6.6.48 (Status: unaffected)
- 6.10.7 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fc575212c6b75d538e1a0a74f4c7e2ac73bc46ac)
2. [](https://git.kernel.org/stable/c/753f1745146e03abd17eec8eee95faffc96d743d)
3. [](https://git.kernel.org/stable/c/abdb9ddaaab476e62805e36cce7b4ef8413ffd01)
4. [](https://git.kernel.org/stable/c/90574d2a675947858b47008df8d07f75ea50d0d0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30569
- **State**: PUBLISHED
- **Published Date**: August 03, 2021 at 19:40 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html)
2. [](https://crbug.com/1218707)
3. [FEDORA-2021-78b9d84299](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/)
4. [FEDORA-2021-6225d60814](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/)
5. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13662
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 11:11 UTC
- **Last Updated**: February 18, 2025 at 18:41 UTC
- **Reserved Date**: January 23, 2025 at 17:04 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The eHive Objects Image Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ehive_objects_image_grid' shortcode in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**vernonsystems - eHive Objects Image Grid**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/638d8ef6-dab0-4cfa-8ecc-af2ded3c6d79?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ehive-objects-image-grid/trunk/templates/eHiveObjectsImageGrid.php#L22)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3230975%40ehive-objects-image-grid&new=3230975%40ehive-objects-image-grid&sfp_email=&sfph_mail=)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6745
- **State**: PUBLISHED
- **Published Date**: September 27, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Family Location (aka com.sosocome.family) application 3.4 2014-5-20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#493793](http://www.kb.cert.org/vuls/id/493793)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2667
- **State**: PUBLISHED
- **Published Date**: May 12, 2023 at 06:31 UTC
- **Last Updated**: August 02, 2024 at 06:26 UTC
- **Reserved Date**: May 12, 2023 at 06:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228883.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Lost and Found Information System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.228883)
2. [](https://vuldb.com/?ctiid.228883)
3. [](https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md)
### Credits
- huutuanbg97 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21242
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:03 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 10, 2024 at 23:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kerberos Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Kerberos Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40832
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:28 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php having() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md)
2. [](https://github.com/bcit-ci/CodeIgniter/issues/6161) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3625
- **State**: PUBLISHED
- **Published Date**: July 18, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 30, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The NVIDIA GPU driver for FreeBSD R352 before 352.09, 346 before 346.72, R349 before 349.16, R343 before 343.36, R340 before 340.76, R337 before 337.25, R334 before 334.21, R331 before 331.113, and R304 before 304.125 allows local users with certain permissions to read or write arbitrary kernel memory via unspecified vectors that trigger an untrusted pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/3693)
2. [1032981](http://www.securitytracker.com/id/1032981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41942
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 14:36 UTC
- **Last Updated**: August 08, 2024 at 15:17 UTC
- **Reserved Date**: July 24, 2024 at 16:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user is granted the `admin:users` scope, they may escalate their own privileges by making themselves a full admin user. The impact is relatively small in that `admin:users` is already an extremely privileged scope only granted to trusted users.
In effect, `admin:users` is equivalent to `admin=True`, which is not intended. Note that the change here only prevents escalation to the built-in JupyterHub admin role that has unrestricted permissions. It does not prevent users with e.g. `groups` permissions from granting themselves or other users permissions via group membership, which is intentional. Versions 4.1.6 and 5.1.0 fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-274: Security Weakness
### Affected Products
**jupyterhub - jupyterhub**
Affected versions:
- < 4.1.6 (Status: affected)
- >= 5.0.0, < 5.1.0 (Status: affected)
### References
1. [https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f](https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f)
2. [https://github.com/jupyterhub/jupyterhub/commit/99e2720b0fc626cbeeca3c6337f917fdacfaa428](https://github.com/jupyterhub/jupyterhub/commit/99e2720b0fc626cbeeca3c6337f917fdacfaa428)
3. [https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba](https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19705
- **State**: PUBLISHED
- **Published Date**: August 26, 2021 at 02:23 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
thinkphp-zcms as of 20190715 allows SQL injection via index.php?m=home&c=message&a=add.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jorycn/thinkphp-zcms/issues/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1181
- **State**: PUBLISHED
- **Published Date**: January 22, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:46 UTC
- **Reserved Date**: December 13, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
htmlheadline before 21.8 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-622](http://www.debian.org/security/2005/dsa-622)
2. [12147](http://www.securityfocus.com/bid/12147)
3. [htmlheadline-symlink(18737)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18737)
4. [13715](http://secunia.com/advisories/13715)
5. [1012756](http://securitytracker.com/id?1012756) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19696
- **State**: PUBLISHED
- **Published Date**: January 17, 2020 at 23:45 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 09, 2019 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
### Affected Products
**Trend Micro - Trend Micro Password Manager**
Affected versions:
- 5.0.0.1076 and below (Windows) and 5.0.1047 and below (Mac) (Status: affected)
### References
1. [](https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124092.aspx)
2. [](https://jvn.jp/en/jp/JVN37183636/index.html)
3. [](https://esupport.trendmicro.com/support/pwm/solution/ja-jp/1124091.aspx)
4. [](https://jvn.jp/jp/JVN37183636/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44172
- **State**: PUBLISHED
- **Published Date**: November 21, 2022 at 00:00 UTC
- **Last Updated**: April 29, 2025 at 19:44 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function R7WebsSecurityHandler.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/RobinWang825/IoT_vuln/blob/main/Tenda/AC18/R7WebsSecurityHandler/Tenda_AC18_V15.03.05.19_Vuln_password.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4274, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4274
- **State**: PUBLISHED
- **Published Date**: November 03, 2011 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 00:01 UTC
- **Reserved Date**: November 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the A-Form PC and PC/Mobile before 3.1 plug-ins for Movable Type allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-2676.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ark-web.jp/movabletype/a-form/docs/security_patch.html)
2. [](http://www.ark-web.jp/movabletype/blog/2011/09/aform_update110927.html)
3. [movabletype-aformplugins-unspecified-xss(70405)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70405) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1719
- **State**: PUBLISHED
- **Published Date**: May 24, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 18:34 UTC
- **Reserved Date**: May 24, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in ALWIL avast! antivirus 4 (4.6.6230) and earlier, when running on Windows NT 4.0, does not properly detect certain viruses.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013991](http://securitytracker.com/id?1013991)
2. [](http://www.avast.com/eng/av4_revision_history.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1314, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1314
- **State**: PUBLISHED
- **Published Date**: April 08, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 08, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12086](http://www.exploit-db.com/exploits/12086)
2. [](http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt)
3. [39239](http://www.securityfocus.com/bid/39239)
4. [39359](http://secunia.com/advisories/39359) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21343
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 18:02 UTC
- **Last Updated**: May 03, 2025 at 01:37 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Network Address Translation (NAT) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Network Address Translation (NAT) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40933
- **State**: PUBLISHED
- **Published Date**: September 19, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 20:38 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in Nagios XI v5.11.1 and below allows authenticated attackers with announcement banner configuration privileges to execute arbitrary SQL commands via the ID parameter sent to the update_banner_message() function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://nagios.com)
2. [](https://www.nagios.com/products/security/)
3. [](https://outpost24.com/blog/nagios-xi-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3724
- **State**: PUBLISHED
- **Published Date**: November 21, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:24 UTC
- **Reserved Date**: November 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 allows remote attackers to obtain sensitive information and possibly cause a denial of service via a direct connection to UDP port 9090, which is undocumented and does not require authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21292](http://www.osvdb.org/21292)
2. [15478](http://www.securityfocus.com/bid/15478)
3. [ADV-2005-2476](http://www.vupen.com/english/advisories/2005/2476)
4. [zyxel-p2000-udp-obtain-information(23092)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23092)
5. [20051116 Zyxel P2000W (Version1) VoIP Wifi phone multiple](http://marc.info/?l=full-disclosure&m=113217443126673&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3329
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: September 14, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
mshtmled.dll in Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code via a crafted Microsoft Office document that causes the HtmlDlgHelper class destructor to access uninitialized memory, aka "Uninitialized Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS10-071](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071)
2. [oval:org.mitre.oval:def:7482](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7482)
3. [43706](http://www.securityfocus.com/bid/43706)
4. [TA10-285A](http://www.us-cert.gov/cas/techalerts/TA10-285A.html)
5. [](http://support.avaya.com/css/P8/documents/100113324) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8242
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 15:29 UTC
- **Last Updated**: May 05, 2025 at 17:09 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Media Encoder versions 13.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Media Encoder**
Affected versions:
- 13.1 and earlier versions (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-19-904/)
2. [](https://helpx.adobe.com/security/products/media-encoder/apsb19-52.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2836
- **State**: PUBLISHED
- **Published Date**: September 07, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 19:24 UTC
- **Reserved Date**: September 07, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Phorum 5.0.17a and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter to register.php or (2) a signature of a logged-in user in "My Control Center," which is not properly handled by control.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16667](http://secunia.com/advisories/16667)
2. [20050901 Multiple Phorum XSS and Session Hijacking vulnerabilities](http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0018.html)
3. [20050902 Re: Multiple Phorum XSS and Session Hijacking vulnerabilities](http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0048.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47195
- **State**: PUBLISHED
- **Published Date**: October 08, 2024 at 08:40 UTC
- **Last Updated**: October 08, 2024 at 16:51 UTC
- **Reserved Date**: September 20, 2024 at 15:14 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Siemens - ModelSim**
Affected versions:
- 0 (Status: affected)
**Siemens - Questa**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-426509.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41621
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 00:00 UTC
- **Last Updated**: November 26, 2024 at 15:22 UTC
- **Reserved Date**: August 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross Site Scripting (XSS) vulnerability was discovered in Emlog Pro v2.1.14 via the component /admin/store.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41621) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0168
- **State**: PUBLISHED
- **Published Date**: August 26, 2022 at 17:25 UTC
- **Last Updated**: August 02, 2024 at 23:18 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**n/a - kernel**
Affected versions:
- Affects v5.4–5.12, v5.13-rc+HEAD (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2037386)
2. [](https://access.redhat.com/security/cve/CVE-2022-0168)
3. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6f5e358452479fa8a773b5c6ccc9e4ec5a20880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5008, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5008 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5008
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 23:16 UTC
- **Last Updated**: October 09, 2024 at 13:57 UTC
- **Reserved Date**: September 15, 2023 at 22:26 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
Student Information System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'regno' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Kashipara Group - Student Information System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/blechacz/)
2. [](https://www.kashipara.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1527
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
easyNews 1.5 and earlier stores administration passwords in cleartext in settings.php, which allows local users to obtain the passwords and gain access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [easynews-php-admin-passwd(7659)](http://www.iss.net/security_center/static/7659.php)
2. [20011201 easynews 1.5 let's remote users modify database](http://archives.neohapsis.com/archives/bugtraq/2001-12/0000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20399
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 19:15 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the SEPolicy configuration of system apps, there is a possible access to the 'ip' utility due to an insecure default value. This could lead to local information disclosure of network data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219808546References: Upstream kernel
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14422
- **State**: PUBLISHED
- **Published Date**: September 13, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25461
- **State**: PUBLISHED
- **Published Date**: March 18, 2022 at 20:53 UTC
- **Last Updated**: August 03, 2024 at 04:42 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the startip parameter in the SetPptpServerCfg function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37306
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 00:00 UTC
- **Last Updated**: March 26, 2025 at 18:30 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jeecgboot/jeecg-boot/issues/2794) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40998
- **State**: PUBLISHED
- **Published Date**: January 26, 2023 at 21:24 UTC
- **Last Updated**: March 28, 2025 at 16:03 UTC
- **Reserved Date**: September 19, 2022 at 18:30 UTC
- **Assigned By**: talos
### Vulnerability Description
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no gre index <1-8> destination A.B.C.D/M description (WORD|null)' command template.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Siretta - QUARTZ-GOLD**
Affected versions:
- G5.0.1.5-210720-141020 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40650
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 00:09 UTC
- **Last Updated**: September 12, 2024 at 13:14 UTC
- **Reserved Date**: July 08, 2024 at 18:53 UTC
- **Assigned By**: google_android
### Vulnerability Description
In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 14 (Status: affected)
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f)
2. [](https://source.android.com/security/bulletin/2024-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8395, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8395 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8395
- **State**: REJECTED
- **Published Date**: April 13, 2021 at 20:41 UTC
- **Last Updated**: April 13, 2021 at 20:41 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2155
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 14:01 UTC
- **Last Updated**: April 07, 2025 at 15:06 UTC
- **Reserved Date**: June 21, 2022 at 16:47 UTC
- **Assigned By**: Hitachi Energy
### Vulnerability Description
A vulnerability exists in the affected versions of Lumada APM’s User Asset Group feature
due to a flaw in access control mechanism implementation on the “Limited Engineer” role, granting it access to the embedded Power BI reports
feature. An attacker that manages to exploit the vulnerability on a customer’s Lumada APM could access unauthorized information by gaining
unauthorized access to any Power BI reports installed by the customer.
Furthermore, the vulnerability enables an attacker to manipulate asset issue comments on assets, which should not be available to the attacker.
Affected versions
* Lumada APM on-premises version 6.0.0.0 - 6.4.0.*
List of CPEs:
* cpe:2.3:a:hitachienergy:lumada_apm:6.0.0.0:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:lumada_apm:6.1.0.0:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:lumada_apm:6.2.0.0:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:lumada_apm:6.3.0.0:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:lumada_apm:6.4.0.0:*:*:*:*:*:*:*
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Hitachi Energy - Lumada APM**
Affected versions:
- 6.0.0.* (Status: affected)
- 6.1.0.* (Status: affected)
- 6.2.0.* (Status: affected)
- 6.3.0.* (Status: affected)
- 6.4.0.0 (Status: affected)
- 6.4.0.1 (Status: unaffected)
- 6.5.0.0 (Status: unaffected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000112&LanguageCode=en&DocumentPartId=&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6077
- **State**: PUBLISHED
- **Published Date**: November 11, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6073, CVE-2015-6075, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034112](http://www.securitytracker.com/id/1034112)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-542)
3. [MS15-112](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112)
4. [77450](http://www.securityfocus.com/bid/77450) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7035
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 14:31 UTC
- **Last Updated**: August 02, 2024 at 08:50 UTC
- **Reserved Date**: December 21, 2023 at 08:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in automad up to 1.10.9 and classified as problematic. Affected by this issue is some unknown functionality of the file packages\standard\templates\post.php of the component Setting Handler. The manipulation of the argument sitename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248684. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - automad**
Affected versions:
- 1.10.0 (Status: affected)
- 1.10.1 (Status: affected)
- 1.10.2 (Status: affected)
- 1.10.3 (Status: affected)
- 1.10.4 (Status: affected)
- 1.10.5 (Status: affected)
- 1.10.6 (Status: affected)
- 1.10.7 (Status: affected)
- 1.10.8 (Status: affected)
- 1.10.9 (Status: affected)
### References
1. [](https://vuldb.com/?id.248684)
2. [](https://vuldb.com/?ctiid.248684)
3. [](https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Stored%20Cross%20Site%20Scripting%20(XSS))
### Credits
- Maland (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24410
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:37 UTC
- **Last Updated**: February 27, 2025 at 20:38 UTC
- **Reserved Date**: January 21, 2025 at 17:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb25-08.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.