System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31971
- **State**: PUBLISHED
- **Published Date**: June 01, 2022 at 17:58 UTC
- **Last Updated**: August 03, 2024 at 07:32 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=responses/view_response&id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/chatbot-app-suggestion/SQLi-3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12421
- **State**: PUBLISHED
- **Published Date**: June 14, 2018 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 03:03 UTC
- **Reserved Date**: June 14, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a user password (without knowing the old password) via a crafted POST request, because the ldap_bind return value is mishandled and the PHP data type is not constrained to be a string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ltb-project/self-service-password/issues/211)
2. [](https://lists.ltb-project.org/pipermail/ltb-announce/2018-June/000023.html)
3. [](https://github.com/ltb-project/self-service-password/issues/209) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52397
- **State**: PUBLISHED
- **Published Date**: November 16, 2024 at 22:10 UTC
- **Last Updated**: November 19, 2024 at 15:20 UTC
- **Reserved Date**: November 11, 2024 at 06:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Davor Zeljkovic Convert Docx2post allows Upload a Web Shell to a Web Server.This issue affects Convert Docx2post: from n/a through 1.4.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Davor Zeljkovic - Convert Docx2post**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/convert-docx2post/wordpress-convert-docx2post-plugin-1-4-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- C_T_R_L - Chance (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2160
- **State**: PUBLISHED
- **Published Date**: May 03, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:43 UTC
- **Reserved Date**: May 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Russcom Network Loginphp (Russcom.Loginphp) allows remote attackers to inject arbitrary web script or HTML via the username field when registering.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [russcom-loginphp-register-xss(26249)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26249)
2. [19930](http://secunia.com/advisories/19930)
3. [17785](http://www.securityfocus.com/bid/17785)
4. [20060502 Russcom.net Loginphp multiple vulnerabilties](http://www.securityfocus.com/archive/1/432729/100/0/threaded)
5. [25213](http://www.osvdb.org/25213) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0942
- **State**: PUBLISHED
- **Published Date**: February 25, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in GradebookStuScores.asp in Eagle Software Aeries Browser Interface (ABI) 3.8.2.8 allows remote attackers to execute arbitrary SQL commands via the GrdBk parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20080221 aeries browser interface(ABI) 3.8.2.8 Remote SQL Injection](http://www.securityfocus.com/archive/1/488456/100/0/threaded)
2. [3695](http://securityreason.com/securityalert/3695)
3. [27924](http://www.securityfocus.com/bid/27924)
4. [abi-gradebookstuscores-sql-injection(40847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40847) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24978
- **State**: PUBLISHED
- **Published Date**: September 03, 2020 at 23:20 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: August 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In NASM 2.15.04rc3, there is a double-free vulnerability in pp_tokline asm/preproc.c. This is fixed in commit 8806c3ca007b84accac21dd88b900fb03614ceb7.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392712) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30663, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30663
- **State**: PUBLISHED
- **Published Date**: June 16, 2022 at 17:00 UTC
- **Last Updated**: April 23, 2025 at 18:10 UTC
- **Reserved Date**: May 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - InDesign**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/indesign/apsb22-30.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7295
- **State**: PUBLISHED
- **Published Date**: January 17, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: January 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2014:0143](http://lists.opensuse.org/opensuse-updates/2014-01/msg00095.html)
2. [[tor-talk] 20131223 Tor 0.2.4.20 is released](https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26945
- **State**: PUBLISHED
- **Published Date**: October 10, 2020 at 19:41 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MyBatis before 3.5.6 mishandles deserialization of object streams.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mybatis/mybatis-3/pull/2079)
2. [](https://github.com/mybatis/mybatis-3/compare/mybatis-3.5.5...mybatis-3.5.6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28162
- **State**: PUBLISHED
- **Published Date**: March 06, 2024 at 17:02 UTC
- **Last Updated**: February 13, 2025 at 17:47 UTC
- **Reserved Date**: March 05, 2024 at 19:29 UTC
- **Assigned By**: jenkins
### Vulnerability Description
In Jenkins Delphix Plugin 3.0.1 through 3.1.0 (both inclusive) a global option for administrators to enable or disable SSL/TLS certificate validation for Data Control Tower (DCT) connections fails to take effect until Jenkins is restarted when switching from disabled validation to enabled validation.
### Affected Products
**Jenkins Project - Jenkins Delphix Plugin**
Affected versions:
- 3.0.1 (Status: affected)
### References
1. [Jenkins Security Advisory 2024-03-06](https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3330)
2. [](http://www.openwall.com/lists/oss-security/2024/03/06/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20139
- **State**: PUBLISHED
- **Published Date**: December 09, 2021 at 15:24 UTC
- **Last Updated**: August 03, 2024 at 17:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.
### Affected Products
**n/a - Gryphon Tower router**
Affected versions:
- <= 04.0004.12 (Current) (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2021-51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55452
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 00:00 UTC
- **Last Updated**: December 17, 2024 at 14:42 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dromara/ujcms)
2. [](https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/OpenRedirect-BlockItemUpload.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17372
- **State**: PUBLISHED
- **Published Date**: October 09, 2019 at 12:06 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000, WNDR4500, WNDR4500v2, WNR1000, WNR1000v3, WNR3500L, and WNR3500L.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32996
- **State**: PUBLISHED
- **Published Date**: May 11, 2024 at 10:02 UTC
- **Last Updated**: August 02, 2024 at 02:27 UTC
- **Reserved Date**: April 23, 2024 at 03:44 UTC
- **Assigned By**: huawei
### Vulnerability Description
Privilege escalation vulnerability in the account module
Impact: Successful exploitation of this vulnerability will affect availability.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 4.2.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.1.0 (Status: affected)
- 3.0.0 (Status: affected)
- 2.1.0 (Status: affected)
- 2.0.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 14.0.0 (Status: affected)
- 13.0.0 (Status: affected)
- 12.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/5/)
2. [](https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1512
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 06:52 UTC
- **Last Updated**: April 01, 2025 at 14:23 UTC
- **Reserved Date**: February 20, 2025 at 19:37 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The PowerPack Elementor Addons (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Cursor Extension in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ideaboxcreations - PowerPack Elementor Addons (Free Widgets, Extensions and Templates)**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/90579442-b05c-459e-93cb-f4883b6472ff?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3262339/powerpack-lite-for-elementor/trunk/assets/js/pp-custom-cursor.js)
### Credits
- D.Sim |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0550
- **State**: REJECTED
- **Published Date**: July 16, 2018 at 15:00 UTC
- **Last Updated**: July 16, 2018 at 14:57 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1063
- **State**: PUBLISHED
- **Published Date**: July 15, 2019 at 18:56 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
### Affected Products
**Microsoft - Internet Explorer 9**
Affected versions:
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows Server 2019 (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Internet Explorer 11 on Windows Server 2012**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 10**
Affected versions:
- Windows Server 2012 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1063) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4472
- **State**: PUBLISHED
- **Published Date**: September 12, 2024 at 18:26 UTC
- **Last Updated**: September 13, 2024 at 14:17 UTC
- **Reserved Date**: May 03, 2024 at 19:01 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-532: Security Weakness
### Affected Products
**GitLab - GitLab**
Affected versions:
- 16.5 (Status: affected)
- 17.3 (Status: affected)
- 17.2 (Status: affected)
### References
1. [GitLab Issue #460289](https://gitlab.com/gitlab-org/gitlab/-/issues/460289)
2. [HackerOne Bug Bounty Report #2477062](https://hackerone.com/reports/2477062)
### Credits
- Thanks [ac7n0w](https://hackerone.com/ac7n0w) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12519
- **State**: PUBLISHED
- **Published Date**: December 17, 2020 at 22:43 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: April 30, 2020 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Phoenix Contact - AXC F 1152 (1151412)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - AXC F 2152 (2404267)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - AXC F 3152 (1069208)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - RFC 4072S (1051328**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - AXC F 2152 Starterkit (1046568)**
Affected versions:
- unspecified (Status: affected)
**Phoenix Contact - PLCnext Technology Starterkit (1188165)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://cert.vde.com/en-us/advisories/vde-2020-049)
### Credits
- Discovered by Patrick Muench, Torsten Loebner, Maurice Rothe, Pascal Keul and Daniel Hackel of SVA Systemvertrieb Alexander GmbH, coordinated by CERT@VDE |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3841
- **State**: PUBLISHED
- **Published Date**: February 22, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 14:39 UTC
- **Reserved Date**: December 21, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to disclose sensitive information. More Information: CSCvc04854. Known Affected Releases: 5.8(2.5).
### Affected Products
**n/a - Cisco Secure Access Control System**
Affected versions:
- Cisco Secure Access Control System (Status: affected)
### References
1. [96237](http://www.securityfocus.com/bid/96237)
2. [1037838](http://www.securitytracker.com/id/1037838)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-acs3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31612
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 20:58 UTC
- **Last Updated**: April 10, 2025 at 14:36 UTC
- **Reserved Date**: March 31, 2025 at 10:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Sabuj Kundu CBX Poll allows Object Injection. This issue affects CBX Poll: from n/a through 1.2.7.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Sabuj Kundu - CBX Poll**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cbxpoll/vulnerability/wordpress-cbx-poll-plugin-1-2-7-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6921
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201610-10](https://security.gentoo.org/glsa/201610-10)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb16-29.html)
3. [RHSA-2016:1865](http://rhn.redhat.com/errata/RHSA-2016-1865.html)
4. [92927](http://www.securityfocus.com/bid/92927)
5. [1036791](http://www.securitytracker.com/id/1036791) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30399
- **State**: PUBLISHED
- **Published Date**: May 13, 2022 at 14:11 UTC
- **Last Updated**: August 03, 2024 at 06:48 UTC
- **Reserved Date**: May 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/admin/?page=maintenance/manage_category&id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/merchandise-online-store/SQLi-11.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51621
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:15 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 20, 2023 at 21:52 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DIR-X3260 prog.cgi SetDeviceSettings Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-size stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21670.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**D-Link - DIR-X3260**
Affected versions:
- 1.04B01 (Status: affected)
### References
1. [ZDI-24-041](https://www.zerodayinitiative.com/advisories/ZDI-24-041/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10365) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2202
- **State**: PUBLISHED
- **Published Date**: April 24, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 13:23 UTC
- **Reserved Date**: April 24, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in inc_ACVS/SOAP/Transport.php in Accueil et Conseil en Visites et Sejours Web Services (ACVSWS) PHP5 (ACVSWS_PHP5) 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the CheminInclude parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23603](http://www.securityfocus.com/bid/23603)
2. [24983](http://secunia.com/advisories/24983)
3. [ADV-2007-1509](http://www.vupen.com/english/advisories/2007/1509)
4. [20070423 acvsws_php5_v1.0 <= Multiple Remote File Include Vulnerablitiy](http://www.securityfocus.com/archive/1/466695/100/0/threaded)
5. [2609](http://securityreason.com/securityalert/2609)
6. [acvswebservices-transport-file-include(33840)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27306
- **State**: PUBLISHED
- **Published Date**: March 18, 2021 at 14:02 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.konghq.com/enterprise/changelog/#core-1)
2. [](https://medium.com/%40sew.campos/cve-2021-27306-access-an-authenticated-route-on-kong-api-gateway-6ae3d81968a3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2097
- **State**: PUBLISHED
- **Published Date**: February 12, 2020 at 15:09 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
ZPanel through 10.1.0 has Remote Command Execution
### Affected Products
**ZPanel - ZPanel**
Affected versions:
- 10.1.0 (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html)
2. [](http://www.exploit-db.com/exploits/25519)
3. [](http://www.openwall.com/lists/oss-security/2013/05/16/12)
4. [](http://www.openwall.com/lists/oss-security/2013/05/16/16)
5. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/84364) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16931
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 23:27 UTC
- **Last Updated**: November 05, 2020 at 23:27 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35461
- **State**: PUBLISHED
- **Published Date**: August 16, 2022 at 20:12 UTC
- **Last Updated**: August 03, 2024 at 09:36 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0a32.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cvjark.github.io/2022/07/06/CVE-2022-33047/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12170
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 21:52 UTC
- **Last Updated**: August 04, 2024 at 23:10 UTC
- **Reserved Date**: May 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File)
2. [](http://incidentsecurity.com/atutor-2-2-4-backup-remote-command-execution/)
3. [](http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1599
- **State**: PUBLISHED
- **Published Date**: March 07, 2019 at 20:00 UTC
- **Last Updated**: November 19, 2024 at 19:15 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a).
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Nexus 1000V Switch for Microsoft Hyper-V**
Affected versions:
- unspecified (Status: affected)
**Cisco - Nexus 1000V Switch for VMware vSphere**
Affected versions:
- unspecified (Status: affected)
**Cisco - Nexus 3000 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 3500 Platform Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 3600 Platform Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 5500, 5600, and 6000 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 7000 and 7700 Series Switches**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 9000 Series Switches in Standalone NX-OS Mode**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - Nexus 9500 R-Series Line Cards and Fabric Modules**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - UCS 6200 and 6300 Series Fabric Interconnect**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Cisco - UCS 6400 Series Fabric Interconnect**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190306 Cisco NX-OS Software Netstack Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack)
2. [107342](http://www.securityfocus.com/bid/107342) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50650
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 00:00 UTC
- **Last Updated**: December 03, 2024 at 16:19 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
python_book V1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yllxx03/CVE/blob/main/python_book/BrokenAccessControl.md)
2. [](https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50650) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4188
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 14:35 UTC
- **Last Updated**: August 12, 2024 at 20:09 UTC
- **Reserved Date**: April 25, 2024 at 14:39 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Unprotected Transport of Credentials vulnerability in OpenText™ Documentum™ Server could allow Credential Stuffing.This issue affects Documentum™ Server: from 16.7 through 23.4.
### Weakness Classification (CWE)
- CWE-523: Security Weakness
### Affected Products
**OpenText™ - Documentum™ Server**
Affected versions:
- 16.7 (Status: affected)
### References
1. [](https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0815868) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4261
- **State**: PUBLISHED
- **Published Date**: August 05, 2019 at 13:40 UTC
- **Last Updated**: September 17, 2024 at 03:43 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere MQ V7.1, 7.5, IBM MQ V8, IBM MQ V9.0LTS, IBM MQ V9.1 LTS, and IBM MQ V9.1 CD are vulnerable to a denial of service attack caused by specially crafted messages. IBM X-Force ID: 160013.
### Affected Products
**IBM - MQ**
Affected versions:
- 9.0.0.1 (Status: affected)
- 8.0.0.1 (Status: affected)
- 8.0.0.2 (Status: affected)
- 8.0.0.3 (Status: affected)
- 8.0.0.4 (Status: affected)
- 8.0.0.5 (Status: affected)
- 8.0.0.6 (Status: affected)
- 8.0.0.7 (Status: affected)
- 9.0.0.2 (Status: affected)
- 8.0.0.8 (Status: affected)
- 8.0.0.9 (Status: affected)
- 9.0.0.3 (Status: affected)
- 8.0.0.0 (Status: affected)
- 8.0.0.10 (Status: affected)
- 9.0.0.0 (Status: affected)
- 9.0.0.4 (Status: affected)
- 9.0.0.5 (Status: affected)
- 9.1.0.0 (Status: affected)
- 9.1.0.1 (Status: affected)
- 9.1.1 (Status: affected)
- 9.1.0.2 (Status: affected)
- 9.1.2 (Status: affected)
- 8.0.0.11 (Status: affected)
- 9.0.0.6 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10886887)
2. [ibm-mq-cve20194261-dos (160013)](https://exchange.xforce.ibmcloud.com/vulnerabilities/160013) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1670
- **State**: PUBLISHED
- **Published Date**: February 21, 2024 at 03:14 UTC
- **Last Updated**: February 13, 2025 at 17:32 UTC
- **Reserved Date**: February 20, 2024 at 16:17 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Mojo in Google Chrome prior to 122.0.6261.57 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 122.0.6261.57 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html)
2. [](https://issues.chromium.org/issues/41481374)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0632
- **State**: PUBLISHED
- **Published Date**: March 08, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 18:30 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [52365](http://www.securityfocus.com/bid/52365)
2. [oval:org.mitre.oval:def:16678](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16678)
3. [1026774](http://www.securitytracker.com/id?1026774)
4. [48377](http://secunia.com/advisories/48377)
5. [APPLE-SA-2012-03-12-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html)
6. [48274](http://secunia.com/advisories/48274)
7. [APPLE-SA-2012-03-07-1](http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html)
8. [48288](http://secunia.com/advisories/48288)
9. [APPLE-SA-2012-03-07-2](http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1301
- **State**: PUBLISHED
- **Published Date**: March 26, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 17:22 UTC
- **Reserved Date**: December 07, 2017 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
### Affected Products
**Apache Software Foundation - Apache HTTP Server**
Affected versions:
- 2.2.0 to 2.4.29 (Status: affected)
### References
1. [USN-3627-1](https://usn.ubuntu.com/3627-1/)
2. [103515](http://www.securityfocus.com/bid/103515)
3. [[oss-security] 20180323 CVE-2018-1301: Possible out of bound access after failure in reading the HTTP request](http://www.openwall.com/lists/oss-security/2018/03/24/2)
4. [DSA-4164](https://www.debian.org/security/2018/dsa-4164)
5. [](https://security.netapp.com/advisory/ntap-20180601-0004/)
6. [RHSA-2018:3558](https://access.redhat.com/errata/RHSA-2018:3558)
7. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us)
8. [RHSA-2019:0367](https://access.redhat.com/errata/RHSA-2019:0367)
9. [USN-3627-2](https://usn.ubuntu.com/3627-2/)
10. [](https://httpd.apache.org/security/vulnerabilities_24.html)
11. [[debian-lts-announce] 20180530 [SECURITY] [DLA 1389-1] apache2 security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html)
12. [RHSA-2019:0366](https://access.redhat.com/errata/RHSA-2019:0366)
13. [1040573](http://www.securitytracker.com/id/1040573)
14. [USN-3937-2](https://usn.ubuntu.com/3937-2/)
15. [[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E)
16. [[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E)
17. [](https://www.tenable.com/security/tns-2019-09)
18. [[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E)
19. [[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E)
20. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
21. [[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E)
22. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E)
23. [[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E)
24. [[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E)
25. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
26. [[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E)
27. [[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E)
28. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4710, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4710 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4710
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 17:31 UTC
- **Last Updated**: May 15, 2025 at 18:34 UTC
- **Reserved Date**: May 15, 2025 at 06:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Campcodes Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file /pages/transaction.php. The manipulation of the argument cid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Campcodes - Sales and Inventory System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-309008 | Campcodes Sales and Inventory System transaction.php sql injection](https://vuldb.com/?id.309008)
2. [VDB-309008 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309008)
3. [Submit #568290 | campcodes Sales and Inventory System V1.0 SQL Injection](https://vuldb.com/?submit.568290)
4. [](https://github.com/lanxia0/CVE/issues/4)
5. [](https://www.campcodes.com/)
### Credits
- lanxia (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3397
- **State**: PUBLISHED
- **Published Date**: July 31, 2008 at 16:00 UTC
- **Last Updated**: April 03, 2025 at 13:42 UTC
- **Reserved Date**: July 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Runesoft Cerberus CMS before 3_1.4_0.9 allows remote attackers to inject arbitrary web script or HTML via a cerberus_user cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30416](http://www.securityfocus.com/bid/30416)
2. [31218](http://secunia.com/advisories/31218)
3. [](http://gl2logic.com/cerberus/cerberus.php?app=Old_News&SHOWID=7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18401
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 13:10 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 68.0.15 allows user accounts to be partially created with invalid username formats (SEC-334).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/68+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51942
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 19:37 UTC
- **Last Updated**: April 10, 2025 at 19:28 UTC
- **Reserved Date**: November 04, 2024 at 16:54 UTC
- **Assigned By**: Esri
### Vulnerability Description
There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 11.3 and below that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Esri - ArcGIS Server**
Affected versions:
- all (Status: affected)
### References
1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36486
- **State**: PUBLISHED
- **Published Date**: June 03, 2025 at 09:43 UTC
- **Last Updated**: June 03, 2025 at 13:22 UTC
- **Reserved Date**: December 09, 2024 at 19:55 UTC
- **Assigned By**: talos
### Vulnerability Description
A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-62: Security Weakness
### Affected Products
**Parallels - Parallels Desktop for Mac**
Affected versions:
- version 20.1.1 (55740) (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126)
### Credits
- Discovered by KPC of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8069
- **State**: PUBLISHED
- **Published Date**: December 10, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: November 02, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2239](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html)
2. [](https://helpx.adobe.com/security/products/flash-player/apsb15-32.html)
3. [78715](http://www.securityfocus.com/bid/78715)
4. [SUSE-SU-2015:2236](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html)
5. [SUSE-SU-2015:2247](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html)
6. [1034318](http://www.securitytracker.com/id/1034318)
7. [GLSA-201601-03](https://security.gentoo.org/glsa/201601-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46615, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46615 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46615
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 05:10 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15409.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Bentley - MicroStation CONNECT**
Affected versions:
- 10.16.0.80 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0002)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-202/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1920
- **State**: PUBLISHED
- **Published Date**: March 27, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 19:17 UTC
- **Reserved Date**: March 27, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
@Mail WebMail Client in AtMail Open-Source 1.04 and earlier allows remote attackers to obtain configuration information via a direct request to install/info.php, which calls the phpinfo function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://en.securitylab.ru/lab/PT-2011-48)
2. [atmail-info-info-disclosure(74282)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74282)
3. [VU#743555](http://www.kb.cert.org/vuls/id/743555)
4. [47012](http://secunia.com/advisories/47012) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0962
- **State**: PUBLISHED
- **Published Date**: January 27, 2024 at 12:31 UTC
- **Last Updated**: August 01, 2024 at 18:26 UTC
- **Reserved Date**: January 26, 2024 at 17:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-252206 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**obgm - libcoap**
Affected versions:
- 4.3.4 (Status: affected)
### References
1. [](https://vuldb.com/?id.252206)
2. [](https://vuldb.com/?ctiid.252206)
3. [](https://github.com/obgm/libcoap/issues/1310)
4. [](https://github.com/obgm/libcoap/issues/1310#issue-2099860835)
5. [](https://github.com/obgm/libcoap/pull/1311)
### Credits
- MSXF (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4840
- **State**: PUBLISHED
- **Published Date**: July 28, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 12, 2013 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT101341](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467)
2. [HPSBGN02936](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03993467) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29442
- **State**: PUBLISHED
- **Published Date**: June 15, 2022 at 15:38 UTC
- **Last Updated**: February 20, 2025 at 20:18 UTC
- **Reserved Date**: April 18, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (subscriber or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Messages For WordPress <= 2.1.10 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Rilwis - Private Messages For WordPress (WordPress plugin)**
Affected versions:
- <= 2.1.10 (Status: affected)
### References
1. [](https://wordpress.org/plugins/private-messages-for-wordpress/)
2. [](https://patchstack.com/database/vulnerability/private-messages-for-wordpress/wordpress-private-messages-for-wordpress-plugin-2-1-10-authenticated-stored-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by Ngo Van Thien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7551, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7551
- **State**: PUBLISHED
- **Published Date**: August 16, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 16:04 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
389-ds-base version before 1.3.5.19 and 1.3.6.7 are vulnerable to password brute-force attacks during account lockout due to different return codes returned on password attempts.
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**389 Directory Server - 389-ds-base**
Affected versions:
- before 1.3.5.19 and 1.3.6.7 (Status: affected)
### References
1. [RHSA-2017:2569](https://access.redhat.com/errata/RHSA-2017:2569)
2. [](https://pagure.io/389-ds-base/issue/49336) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-125069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-125069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-125069
- **State**: PUBLISHED
- **Published Date**: January 08, 2023 at 10:29 UTC
- **Last Updated**: August 06, 2024 at 14:10 UTC
- **Reserved Date**: January 08, 2023 at 10:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in saxman maps-js-icoads. It has been classified as problematic. Affected is an unknown function. The manipulation leads to exposure of information through directory listing. It is possible to launch the attack remotely. The name of the patch is 34b8b0cce2807b119f4cffda2ac48fc8f427d69a. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217644.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-548: Security Weakness
### Affected Products
**saxman - maps-js-icoads**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.217644)
2. [](https://vuldb.com/?ctiid.217644)
3. [](https://github.com/saxman/maps-js-icoads/commit/34b8b0cce2807b119f4cffda2ac48fc8f427d69a)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3473
- **State**: PUBLISHED
- **Published Date**: September 04, 2020 at 02:26 UTC
- **Last Updated**: November 13, 2024 at 18:07 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local CLI shell user to elevate privileges and gain full administrative control of the device. The vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker could exploit this vulnerability by first authenticating to the local CLI shell on the device and using the CLI command to bypass the task group–based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on the device without authorization checks.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200902 Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-LJtNFjeN) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16809
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:51 UTC
- **Last Updated**: December 20, 2021 at 22:51 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2431
- **State**: PUBLISHED
- **Published Date**: May 09, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 5, Nexus 6, Nexus 7 (2013), and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-05-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31343
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 16:12 UTC
- **Last Updated**: August 02, 2024 at 01:52 UTC
- **Reserved Date**: April 01, 2024 at 06:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 4.10.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Sonaar Music - MP3 Audio Player for Music, Radio & Podcast by Sonaar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/mp3-music-player-by-sonaar/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-1-arbitrary-file-download-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44628
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 21:48 UTC
- **Last Updated**: August 04, 2024 at 04:25 UTC
- **Reserved Date**: December 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegister) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50933
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 00:05 UTC
- **Last Updated**: June 03, 2025 at 18:57 UTC
- **Reserved Date**: December 16, 2023 at 01:37 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 275113.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**IBM - PowerSC**
Affected versions:
- 1.3, 2.0, 2.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7113759)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/275113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39318
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 15:50 UTC
- **Last Updated**: February 13, 2025 at 20:47 UTC
- **Reserved Date**: August 20, 2021 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The H5P CSS Editor WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the h5p-css-file parameter found in the ~/h5p-css-editor.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**H5P CSS Editor - H5P CSS Editor**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39318)
2. [](https://plugins.trac.wordpress.org/browser/h5p-css-editor/tags/1.0/h5p-css-editor.php#L50)
### Credits
- p7e4 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14834
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:14 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Affected Products
**Oracle Corporation - Trade Management**
Affected versions:
- 12.1.1 - 12.1.3 (Status: affected)
- 12.2.3 - 12.2.10 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4452, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4452 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4452
- **State**: PUBLISHED
- **Published Date**: October 06, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 10:17 UTC
- **Reserved Date**: October 06, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Cambridge Computer Corporation vxFtpSrv 2.0.3 allows remote attackers to cause a denial of service (crash and hang) and possibly execute arbitrary code via a long CWD request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31532](http://www.securityfocus.com/bid/31532)
2. [vxftpsrv-cwd-bo(45620)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45620)
3. [6651](https://www.exploit-db.com/exploits/6651)
4. [4356](http://securityreason.com/securityalert/4356) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0001
- **State**: PUBLISHED
- **Published Date**: January 08, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: January 02, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20030117 Re: More information regarding Etherleak](http://www.securityfocus.com/archive/1/307564/30/26270/threaded)
2. [1031583](http://www.securitytracker.com/id/1031583)
3. [9962](http://www.osvdb.org/9962)
4. [RHSA-2003:088](http://www.redhat.com/support/errata/RHSA-2003-088.html)
5. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
6. [20030110 More information regarding Etherleak](http://marc.info/?l=bugtraq&m=104222046632243&w=2)
7. [VU#412115](http://www.kb.cert.org/vuls/id/412115)
8. [20030106 Etherleak: Ethernet frame padding information leakage (A010603-1)](http://www.securityfocus.com/archive/1/305335/30/26420/threaded)
9. [oval:org.mitre.oval:def:2665](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2665)
10. [20030110 More information regarding Etherleak](http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html)
11. [RHSA-2003:025](http://www.redhat.com/support/errata/RHSA-2003-025.html)
12. [7996](http://secunia.com/advisories/7996)
13. [A010603-1](http://www.atstake.com/research/advisories/2003/a010603-1.txt)
14. [1040185](http://www.securitytracker.com/id/1040185)
15. [](http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1532
- **State**: PUBLISHED
- **Published Date**: June 10, 2009 at 18:00 UTC
- **Last Updated**: January 21, 2025 at 15:27 UTC
- **Reserved Date**: May 05, 2009 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 for Windows XP SP2 and SP3; 8 for Server 2003 SP2; 8 for Vista Gold, SP1, and SP2; and 8 for Server 2008 SP2 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via "malformed row property references" that trigger an access of an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objects Memory Corruption Vulnerability" or "HTML Object Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54951](http://osvdb.org/54951)
2. [20090610 ZDI-09-041: Microsoft Internet Explorer 8 Rows Property Dangling Pointer Code Execution Vulnerability](http://www.securityfocus.com/archive/1/504208/100/0/threaded)
3. [ADV-2009-1538](http://www.vupen.com/english/advisories/2009/1538)
4. [MS09-019](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-019)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-09-041)
6. [oval:org.mitre.oval:def:6244](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6244)
7. [TA09-160A](http://www.us-cert.gov/cas/techalerts/TA09-160A.html)
8. [1022350](http://www.securitytracker.com/id?1022350) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20468, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20468 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20468
- **State**: PUBLISHED
- **Published Date**: June 21, 2021 at 04:00 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
White Shark System (WSS) 1.3.2 is vulnerable to CSRF. Attackers can use the user_edit_password.php file to modify the user password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/itodaro/WhiteSharkSystem_cve) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0294
- **State**: PUBLISHED
- **Published Date**: June 15, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute remote code when Windows fails to properly handle cabinet files, aka "Windows Remote Code Execution Vulnerability".
### Affected Products
**Microsoft Corporation - Microsoft Windows**
Affected versions:
- Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016. (Status: affected)
### References
1. [98837](http://www.securityfocus.com/bid/98837)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0294) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17623
- **State**: PUBLISHED
- **Published Date**: October 29, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Link objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6434.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.5096 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-1104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0699
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:56 UTC
- **Reserved Date**: July 12, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows 98 Second Edition, Windows Millennium, Windows NT 4.0, Windows 2000, and Windows XP allow remote attackers to delete digital certificates on a user's system via HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS02-048](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-048)
2. [oval:org.mitre.oval:def:190](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A190) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39773
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:21 UTC
- **Last Updated**: January 14, 2025 at 16:04 UTC
- **Reserved Date**: June 28, 2024 at 18:06 UTC
- **Assigned By**: talos
### Vulnerability Description
An information disclosure vulnerability exists in the testsave.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Wavlink - Wavlink AC3000**
Affected versions:
- M33A8.V5030.210505 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2035](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2035)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25833
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 18:40 UTC
- **Reserved Date**: February 15, 2023 at 00:00 UTC
- **Assigned By**: Esri
### Vulnerability Description
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**Esri - Portal for ArcGIS**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/)
2. [](https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095)
### Credits
- Andrew Salazar |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44243
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 22:57 UTC
- **Last Updated**: December 20, 2024 at 19:02 UTC
- **Reserved Date**: August 20, 2024 at 21:45 UTC
- **Assigned By**: apple
### Vulnerability Description
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.2. An app may be able to modify protected parts of the file system.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121839) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31728
- **State**: PUBLISHED
- **Published Date**: May 17, 2021 at 12:06 UTC
- **Last Updated**: August 03, 2024 at 23:03 UTC
- **Reserved Date**: April 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect access control in zam64.sys, zam32.sys in MalwareFox AntiMalware 2.74.0.150 allows a non-privileged process to open a handle to \.\ZemanaAntiMalware, register itself with the driver by sending IOCTL 0x80002010, allocate executable memory using a flaw in IOCTL 0x80002040, install a hook with IOCTL 0x80002044 and execute the executable memory using this hook with IOCTL 0x80002014 or 0x80002018, this exposes ring 0 code execution in the context of the driver allowing the non-privileged process to elevate privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/irql0/CVE-2021-31728/blob/master/CVE-2021-31728.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12423
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 09:25 UTC
- **Last Updated**: January 15, 2025 at 14:37 UTC
- **Reserved Date**: December 10, 2024 at 16:30 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post' parameter in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**scottpaterson - Contact Form 7 Redirect & Thank You Page**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/9d67965c-f8f3-4868-a261-81cfc80dbcb3?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/cf7-redirect-thank-you-page/tags/1.0.7/includes/admin/tabs_page.php#L87)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3220810%40cf7-redirect-thank-you-page&new=3220810%40cf7-redirect-thank-you-page&sfp_email=&sfph_mail=#file19)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4815, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4815
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 18:54 UTC
- **Last Updated**: August 07, 2024 at 04:02 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Coppermine gallery before 1.4.26 has an input validation vulnerability that allows for code execution.
### Affected Products
**coppermine gallery - coppermine gallery**
Affected versions:
- before 1.4.26 (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2011/08/19/7)
2. [](https://seclists.org/oss-sec/2010/q1/121)
3. [](https://forum.coppermine-gallery.net/index.php/topic%2C63510.0.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1975, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1975
- **State**: PUBLISHED
- **Published Date**: August 10, 2011 at 21:16 UTC
- **Last Updated**: August 06, 2024 at 22:46 UTC
- **Reserved Date**: May 09, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Untrusted search path vulnerability in the Data Access Tracing component in Windows Data Access Components (Windows DAC) 6.0 in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an Excel .xlsx file, aka "Data Access Components Insecure Library Loading Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS11-059](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-059)
2. [TA11-221A](http://www.us-cert.gov/cas/techalerts/TA11-221A.html)
3. [oval:org.mitre.oval:def:12936](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2464, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2464 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2464
- **State**: PUBLISHED
- **Published Date**: August 15, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2463.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-080](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-080)
2. [1033238](http://www.securitytracker.com/id/1033238)
3. [76240](http://www.securityfocus.com/bid/76240)
4. [37914](https://www.exploit-db.com/exploits/37914/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7504, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7504 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7504
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3426
- **State**: PUBLISHED
- **Published Date**: August 02, 2023 at 09:40 UTC
- **Last Updated**: October 11, 2024 at 14:09 UTC
- **Reserved Date**: June 27, 2023 at 05:43 UTC
- **Assigned By**: Liferay
### Vulnerability Description
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-425: Security Weakness
### Affected Products
**Liferay - DXP**
Affected versions:
- 7.4.13.u81 (Status: affected)
**Liferay - Portal**
Affected versions:
- 7.4.3.81 (Status: affected)
### References
1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426)
### Credits
- 4rth4s |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20003
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 21:01 UTC
- **Last Updated**: May 15, 2025 at 04:02 UTC
- **Reserved Date**: October 13, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**n/a - Intel(R) Graphics Driver software installers**
Affected versions:
- See references (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45232
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 16:12 UTC
- **Last Updated**: June 02, 2025 at 15:08 UTC
- **Reserved Date**: October 05, 2023 at 20:48 UTC
- **Assigned By**: TianoCore
### Vulnerability Description
EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Availability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-835: Security Weakness
### Affected Products
**TianoCore - edk2**
Affected versions:
- edk2-stable202308 (Status: affected)
### References
1. [](https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h)
2. [](http://www.openwall.com/lists/oss-security/2024/01/16/2)
3. [](http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html)
4. [](https://security.netapp.com/advisory/ntap-20240307-0011/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/)
### Credits
- Quarkslab Vulnerability Reports Team
- Doug Flick |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24842
- **State**: PUBLISHED
- **Published Date**: March 27, 2024 at 05:36 UTC
- **Last Updated**: August 06, 2024 at 15:57 UTC
- **Reserved Date**: January 31, 2024 at 18:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Echo Plugins Knowledge Base for Documentation, FAQs with AI Assistance.This issue affects Knowledge Base for Documentation, FAQs with AI Assistance: from n/a through 11.30.2.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Echo Plugins - Knowledge Base for Documentation, FAQs with AI Assistance**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/echo-knowledge-base/wordpress-knowledge-base-for-documentation-faqs-with-ai-assistance-plugin-11-30-2-php-object-injection-vulnerability?_s_id=cve)
### Credits
- NGÔ THIÊN AN / ancorn_ from VNPT-VCI (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38702
- **State**: PUBLISHED
- **Published Date**: August 04, 2023 at 18:10 UTC
- **Last Updated**: October 08, 2024 at 17:39 UTC
- **Reserved Date**: July 24, 2023 at 16:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**KnowageLabs - Knowage-Server**
Affected versions:
- >= 6.0.0, < 8.1.8 (Status: affected)
### References
1. [https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc](https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0459
- **State**: PUBLISHED
- **Published Date**: April 16, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:0857](http://rhn.redhat.com/errata/RHSA-2015-0857.html)
2. [RHSA-2015:1007](http://rhn.redhat.com/errata/RHSA-2015-1007.html)
3. [SUSE-SU-2015:2182](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html)
4. [RHSA-2015:1006](http://rhn.redhat.com/errata/RHSA-2015-1006.html)
5. [SUSE-SU-2015:2192](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html)
6. [SUSE-SU-2015:0833](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html)
7. [RHSA-2015:1091](http://rhn.redhat.com/errata/RHSA-2015-1091.html)
8. [](http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)
9. [SUSE-SU-2015:2166](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html)
10. [1032120](http://www.securitytracker.com/id/1032120)
11. [GLSA-201603-11](https://security.gentoo.org/glsa/201603-11)
12. [](http://www-01.ibm.com/support/docview.wss?uid=swg21883640)
13. [openSUSE-SU-2015:0773](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html)
14. [SUSE-SU-2015:1138](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html)
15. [SUSE-SU-2015:2216](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html)
16. [RHSA-2015:1020](http://rhn.redhat.com/errata/RHSA-2015-1020.html)
17. [SUSE-SU-2015:1086](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html)
18. [SUSE-SU-2015:2168](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html)
19. [SUSE-SU-2015:1085](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html)
20. [RHSA-2015:0858](http://rhn.redhat.com/errata/RHSA-2015-0858.html)
21. [RHSA-2015:1021](http://rhn.redhat.com/errata/RHSA-2015-1021.html)
22. [74083](http://www.securityfocus.com/bid/74083)
23. [openSUSE-SU-2015:0774](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html)
24. [SUSE-SU-2015:1161](http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html)
25. [RHSA-2015:0854](http://rhn.redhat.com/errata/RHSA-2015-0854.html)
26. [SUSE-SU-2016:0113](http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0054
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: January 22, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [921](http://www.securityfocus.com/bid/921) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5539
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Michael Baker FCU (aka air.com.creditunionhomebanking.mb155) application 1.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#947785](http://www.kb.cert.org/vuls/id/947785)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10031
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 19:11 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Communications Convergence component of Oracle Communications Applications (subcomponent: Mail Proxy (dojo)). Supported versions that are affected are 3.0 and 3.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Convergence. While the vulnerability is in Oracle Communications Convergence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Convergence accessible data as well as unauthorized read access to a subset of Oracle Communications Convergence accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Communications Convergence**
Affected versions:
- 3.0 (Status: affected)
- 3.0.1 (Status: affected)
### References
1. [99720](http://www.securityfocus.com/bid/99720)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
3. [1038945](http://www.securitytracker.com/id/1038945) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1283
- **State**: PUBLISHED
- **Published Date**: April 08, 2022 at 17:55 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 08, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**radareorg - radareorg/radare2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013)
2. [](https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8823
- **State**: PUBLISHED
- **Published Date**: March 28, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
modules/bamegamenu/ajax_phpcode.php in the Responsive Mega Menu (Horizontal+Vertical+Dropdown) Pro module 1.0.32 for PrestaShop 1.5.5.0 through 1.7.2.5 allows remote attackers to execute arbitrary PHP code via the code parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ia-informatica.com/it/CVE-2018-8823) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33715
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 11:03 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT Utilities (All versions < V13.0.2.0). When parsing specially crafted JT files, a race condition could cause an object to be released before being operated on, leading to NULL pointer deference condition and causing the application to crash. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Siemens - JT Utilities**
Affected versions:
- All versions < V13.0.2.0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-209268.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25898
- **State**: PUBLISHED
- **Published Date**: July 01, 2022 at 20:02 UTC
- **Last Updated**: September 16, 2024 at 18:48 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H/E:P`
### Affected Products
**n/a - jsrsasign**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896)
3. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897)
4. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898)
5. [](https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41)
6. [](https://github.com/kjur/jsrsasign/releases/tag/10.5.25)
### Credits
- Adi Malyanker
- Or David |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39810
- **State**: PUBLISHED
- **Published Date**: August 28, 2023 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 20:03 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the CPIO command of Busybox v1.33.2 allows attackers to execute a directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://busybox.com)
2. [](https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2257
- **State**: PUBLISHED
- **Published Date**: July 17, 2005 at 04:00 UTC
- **Last Updated**: January 16, 2025 at 19:34 UTC
- **Reserved Date**: July 17, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
phpMyFAQ 1.4.0 allows remote attackers to access the Image Manager to upload or delete images without authorization via a direct request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8240](http://www.osvdb.org/8240)
2. [1010795](http://securitytracker.com/id?1010795)
3. [12085](http://secunia.com/advisories/12085)
4. [phpmyfaq-authentication-bypass(16814)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16814)
5. [](http://www.phpmyfaq.de/advisory_2004-07-27.php)
6. [10813](http://www.securityfocus.com/bid/10813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32807
- **State**: PUBLISHED
- **Published Date**: July 30, 2021 at 21:20 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessControl 4.3 and 5.2. Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. As a workaround, a site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-915: Security Weakness
### Affected Products
**zopefoundation - AccessControl**
Affected versions:
- >= 4.0, < 4.3 (Status: affected)
- >= 5.0, < 5.2 (Status: affected)
### References
1. [](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf)
2. [](https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c)
3. [](https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9240
- **State**: PUBLISHED
- **Published Date**: October 17, 2024 at 02:06 UTC
- **Last Updated**: October 17, 2024 at 16:15 UTC
- **Reserved Date**: September 26, 2024 at 19:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ReDi Restaurant Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 24.0902. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**thecatkin - ReDi Restaurant Reservation**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bb9fc87e-b376-49ce-ba69-5acef9deda4d?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/redi-restaurant-reservation/trunk/templates/admin_welcome_no_page.php?rev=2988247#L41)
3. [](https://plugins.trac.wordpress.org/changeset/3167881/redi-restaurant-reservation/trunk/templates/admin_welcome_no_page.php)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24721
- **State**: PUBLISHED
- **Published Date**: April 10, 2023 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 15:56 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in LiveAction LiveSP v21.1.2 allows attackers to execute arbitrary web scripts or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://liveaction.com)
2. [](https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22095
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 20, 2024 at 15:01 UTC
- **Reserved Date**: January 24, 2024 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in PlatformVariableInitDxe driver in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - UEFI firmware for some Intel(R) Server D50DNP Family products**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45299
- **State**: PUBLISHED
- **Published Date**: January 13, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 19:11 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/offalltn/CVE-2022-45299) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38861
- **State**: PUBLISHED
- **Published Date**: September 27, 2024 at 08:11 UTC
- **Last Updated**: September 27, 2024 at 15:21 UTC
- **Reserved Date**: June 20, 2024 at 10:03 UTC
- **Assigned By**: Checkmk
### Vulnerability Description
Improper Certificate Validation in Checkmk Exchange plugin MikroTik allows attackers in MitM position to intercept traffic. This issue affects MikroTik: from 2.0.0 through 2.5.5, from 0.4a_mk through 2.0a.
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 2.0.0 (Status: affected)
- 0.4a_mk (Status: affected)
### References
1. [](https://exchange.checkmk.com/p/mikrotik)
### Credits
- Jakob Hartmann of Limes Security
- Peter Panholzer of Limes Security |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40561
- **State**: REJECTED
- **Last Updated**: March 27, 2023 at 00:00 UTC
- **Reserved Date**: September 12, 2022 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0667, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0667
- **State**: PUBLISHED
- **Published Date**: April 13, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 28, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [71743](http://osvdb.org/71743)
2. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html)
3. [MS11-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034)
4. [mswin-win32k-var4-priv-escalation(66398)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66398)
5. [ADV-2011-0952](http://www.vupen.com/english/advisories/2011/0952)
6. [](http://support.avaya.com/css/P8/documents/100133352)
7. [oval:org.mitre.oval:def:12340](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12340)
8. [47204](http://www.securityfocus.com/bid/47204)
9. [44156](http://secunia.com/advisories/44156)
10. [](http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx)
11. [1025345](http://www.securitytracker.com/id?1025345) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3805
- **State**: PUBLISHED
- **Published Date**: July 16, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The IKE implementation in Clavister CorePlus before 8.80.03, and 8.80.00, does not properly validate certificates during IKE negotiation, which allows remote attackers to cause a denial of service (gateway stop) via certain certificates.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf)
2. [clavister-ike-dos(35370)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35370)
3. [](http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf)
4. [37972](http://osvdb.org/37972)
5. [25957](http://secunia.com/advisories/25957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6965
- **State**: PUBLISHED
- **Published Date**: January 29, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 20:50 UTC
- **Reserved Date**: January 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki 2006-03-09e, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the media parameter. NOTE: this issue can be leveraged for XSS attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31620](http://osvdb.org/31620)
2. [](http://sla.ckers.org/forum/read.php?3%2C880%2C1361#msg-1361)
3. [24853](http://secunia.com/advisories/24853)
4. [23926](http://secunia.com/advisories/23926)
5. [22236](http://www.securityfocus.com/bid/22236)
6. [dokuwiki-fetch-response-splitting(31930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31930)
7. [ADV-2007-0357](http://www.vupen.com/english/advisories/2007/0357)
8. [GLSA-200704-08](http://security.gentoo.org/glsa/glsa-200704-08.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5079
- **State**: PUBLISHED
- **Published Date**: October 27, 2017 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 14:47 UTC
- **Reserved Date**: January 02, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.
### Affected Products
**n/a - Google Chrome prior to 59.0.3071.86 for Mac, Windows and Linux, and 59.0.3071.92 for Android**
Affected versions:
- Google Chrome prior to 59.0.3071.86 for Mac, Windows and Linux, and 59.0.3071.92 for Android (Status: affected)
### References
1. [98861](http://www.securityfocus.com/bid/98861)
2. [RHSA-2017:1399](https://access.redhat.com/errata/RHSA-2017:1399)
3. [1038622](http://www.securitytracker.com/id/1038622)
4. [GLSA-201706-20](https://security.gentoo.org/glsa/201706-20)
5. [](https://crbug.com/713686)
6. [](https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.