System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39636, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39636 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39636 - **State**: PUBLISHED - **Published Date**: August 01, 2024 at 21:24 UTC - **Last Updated**: August 07, 2024 at 14:50 UTC - **Reserved Date**: June 26, 2024 at 21:18 UTC - **Assigned By**: Patchstack ### Vulnerability Description Deserialization of Untrusted Data vulnerability in CodeSolz Better Find and Replace.This issue affects Better Find and Replace: from n/a through 1.6.1. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **CodeSolz - Better Find and Replace** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/real-time-auto-find-and-replace/wordpress-better-find-and-replace-plugin-1-6-1-php-object-injection-vulnerability?_s_id=cve) ### Credits - Trình Vũ / Sonicrrrr_ from VNPT-VCI (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2521 - **State**: PUBLISHED - **Published Date**: September 09, 2015 at 00:00 UTC - **Last Updated**: August 06, 2024 at 05:17 UTC - **Reserved Date**: March 19, 2015 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Excel 2007 SP3, Excel 2010 SP2, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033488](http://www.securitytracker.com/id/1033488) 2. [MS15-099](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-099) 3. [38216](https://www.exploit-db.com/exploits/38216/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3563, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3563 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3563 - **State**: PUBLISHED - **Published Date**: July 08, 2023 at 16:31 UTC - **Last Updated**: November 21, 2024 at 15:59 UTC - **Reserved Date**: July 08, 2023 at 13:23 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in GZ Scripts GZ E Learning Platform 1.8 and classified as problematic. This issue affects some unknown processing of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-233357 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **GZ Scripts - GZ E Learning Platform** Affected versions: - 1.8 (Status: affected) ### References 1. [](https://vuldb.com/?id.233357) 2. [](https://vuldb.com/?ctiid.233357) ### Credits - skalvin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-20146, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-20146 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-20146 - **State**: PUBLISHED - **Published Date**: March 12, 2025 at 16:12 UTC - **Last Updated**: March 21, 2025 at 20:27 UTC - **Reserved Date**: October 10, 2024 at 19:15 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of malformed IPv4 multicast packets that are received on line cards where the interface has either an IPv4 access control list (ACL) or a QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 multicast packets through an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset. Traffic over that line card would be lost while the line card reloads. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Affected Products **Cisco - Cisco IOS XR Software** Affected versions: - 7.11.1 (Status: affected) - 7.9.21 (Status: affected) - 7.10.2 (Status: affected) - 24.1.1 (Status: affected) - 7.11.2 (Status: affected) - 24.2.1 (Status: affected) - 24.1.2 (Status: affected) - 24.3.1 (Status: affected) - 24.2.2 (Status: affected) - 7.11.21 (Status: affected) - 24.3.2 (Status: affected) ### References 1. [cisco-sa-multicast-ERMrSvq7](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multicast-ERMrSvq7) 2. [Crafting endless AS-PATHS in BGP](https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7441 - **State**: PUBLISHED - **Published Date**: October 19, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:47 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Pakan Ken Tube (aka com.PakanKen) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#529257](http://www.kb.cert.org/vuls/id/529257) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12149 - **State**: PUBLISHED - **Published Date**: October 04, 2017 at 20:00 UTC - **Last Updated**: February 07, 2025 at 13:29 UTC - **Reserved Date**: August 01, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Red Hat, Inc. - jbossas** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1486220) 2. [RHSA-2018:1608](https://access.redhat.com/errata/RHSA-2018:1608) 3. [](https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149) 4. [100591](http://www.securityfocus.com/bid/100591) 5. [RHSA-2018:1607](https://access.redhat.com/errata/RHSA-2018:1607)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4950, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4950 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4950 - **State**: PUBLISHED - **Published Date**: October 09, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: October 09, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Event (event) extension before 0.3.7 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-015/) 2. [](http://typo3.org/extensions/repository/view/event/0.3.7/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1830 - **State**: PUBLISHED - **Published Date**: April 22, 2019 at 15:35 UTC - **Last Updated**: September 17, 2024 at 00:35 UTC - **Reserved Date**: April 27, 2011 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so. ### Affected Products **Gnome - Ekiga** Affected versions: - unspecified (Status: affected) ### References 1. [](https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647) ### Credits - Robert Collins
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38924 - **State**: PUBLISHED - **Published Date**: December 06, 2024 at 00:00 UTC - **Last Updated**: December 11, 2024 at 17:17 UTC - **Reserved Date**: June 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter`/amcl laser_model_type` . ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ros-navigation/navigation2/issues/4379) 2. [](https://github.com/ros-navigation/navigation2/pull/4397) 3. [](https://github.com/GoesM/ROS-CVE-CNVDs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27628, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27628 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27628 - **State**: PUBLISHED - **Published Date**: June 28, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 00:34 UTC - **Reserved Date**: February 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.dcmtk.org/redmine/issues/1108) 2. [](https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0722 - **State**: PUBLISHED - **Published Date**: May 20, 2011 at 22:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 01, 2011 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description FFmpeg before 0.5.4, as used in MPlayer and other products, allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a malformed RealMedia file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-2306](http://www.debian.org/security/2011/dsa-2306) 2. [MDVSA-2011:061](http://www.mandriva.com/security/advisories?name=MDVSA-2011:061) 3. [MDVSA-2011:062](http://www.mandriva.com/security/advisories?name=MDVSA-2011:062) 4. [MDVSA-2011:114](http://www.mandriva.com/security/advisories?name=MDVSA-2011:114) 5. [USN-1104-1](http://www.ubuntu.com/usn/usn-1104-1/) 6. [MDVSA-2011:089](http://www.mandriva.com/security/advisories?name=MDVSA-2011:089) 7. [](http://ffmpeg.mplayerhq.hu/) 8. [ADV-2011-1241](http://www.vupen.com/english/advisories/2011/1241) 9. [47149](http://www.securityfocus.com/bid/47149)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40424, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40424 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40424 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 14:43 UTC - **Last Updated**: August 03, 2024 at 12:21 UTC - **Reserved Date**: September 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-networking package. The affected version of d8s-urls is 0.1.0 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pypi.org/project/democritus-networking/) 2. [](https://github.com/democritus-project/d8s-urls/issues/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2312, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2312 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2312 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:22 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in GNU make for IBM AIX 4.3.3, when installed setgid, allows local users to gain privileges via a long CC argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4391](http://www.osvdb.org/4391) 2. [aix-make-cc-bo(15554)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15554) 3. [11158](http://secunia.com/advisories/11158/) 4. [9903](http://www.securityfocus.com/bid/9903) 5. [20040322 AIX 4.3.3 has make sgid 0?](http://archives.neohapsis.com/archives/fulldisclosure/2004-03/0997.html) 6. [20040323 Re: AIX 4.3.3 has make sgid 0?](http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1124.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25615 - **State**: PUBLISHED - **Published Date**: March 05, 2024 at 20:19 UTC - **Last Updated**: March 27, 2025 at 20:13 UTC - **Reserved Date**: February 08, 2024 at 18:08 UTC - **Assigned By**: hpe ### Vulnerability Description An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Spectrum service accessed via the PAPI protocol in ArubaOS 8.x. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Hewlett Packard Enterprise (HPE) - ArubaOS Wi-Fi Controllers and Campus/Remote Access Points** Affected versions: - ArubaOS 10.5.x.x: 10.5.0.1 and below (Status: affected) - ArubaOS 10.4.x.x: 10.4.0.3 and below (Status: affected) - ArubaOS 8.11.x.x: 8.11.2.0 and below (Status: affected) - ArubaOS 8.10.x.x: 8.10.0.9 and below (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt) ### Credits - XiaoC from Moonlight Bug Hunter
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42419, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42419 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42419 - **State**: PUBLISHED - **Published Date**: January 26, 2023 at 00:00 UTC - **Last Updated**: March 31, 2025 at 17:38 UTC - **Reserved Date**: October 03, 2022 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. Crafted data in a TIF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18700. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.4.363.0 (Status: affected) ### References 1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1389/) ### Credits - Rocco Calvi (@TecR0c) with TecSecurity
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39955 - **State**: PUBLISHED - **Published Date**: August 10, 2023 at 14:53 UTC - **Last Updated**: October 04, 2024 at 18:23 UTC - **Reserved Date**: August 07, 2023 at 16:27 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **nextcloud - security-advisories** Affected versions: - >= 4.4.0, < 4.8.0 (Status: affected) ### References 1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6) 2. [https://github.com/nextcloud/notes/pull/1031](https://github.com/nextcloud/notes/pull/1031) 3. [https://hackerone.com/reports/1924355](https://hackerone.com/reports/1924355)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9305 - **State**: PUBLISHED - **Published Date**: October 16, 2024 at 02:05 UTC - **Last Updated**: October 16, 2024 at 13:35 UTC - **Reserved Date**: September 27, 2024 at 17:38 UTC - **Assigned By**: Wordfence ### Vulnerability Description The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-640: Security Weakness ### Affected Products **scottopolis - AppPresser – Mobile App Framework** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/45647fa6-a98d-4eb4-a287-f523e434688b?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.4/inc/AppPresser_Ajax_Extras.php#L31) 3. [](https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.4/inc/AppPresser_WPAPI_Mods.php#L92) 4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3168744%40apppresser&new=3168744%40apppresser&sfp_email=&sfph_mail=) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26991 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 14:17 UTC - **Last Updated**: February 25, 2025 at 17:01 UTC - **Reserved Date**: February 17, 2025 at 11:51 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ollybach WPPizza allows Reflected XSS. This issue affects WPPizza: from n/a through 3.19.4. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ollybach - WPPizza** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wppizza/vulnerability/wordpress-wppizza-plugin-3-19-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32942 - **State**: PUBLISHED - **Published Date**: June 09, 2021 at 16:06 UTC - **Last Updated**: September 17, 2024 at 03:17 UTC - **Reserved Date**: May 13, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location. ### CVSS Metrics - **CVSS Base Score**: 6.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-316: Security Weakness ### Affected Products **AVEVA - InTouch** Affected versions: - unspecified (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-159-03) 2. [](https://www.aveva.com/en/support/cyber-security-updates/) ### Credits - Ilya Karpov, Evgeniy Druzhinin, and Konstantin Kondratev of Rostelecom-Solar reported this vulnerability to AVEVA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2187, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2187 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2187 - **State**: PUBLISHED - **Published Date**: June 15, 2010 at 17:48 UTC - **Last Updated**: August 07, 2024 at 02:25 UTC - **Reserved Date**: June 07, 2010 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2188. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2011-0192](http://www.vupen.com/english/advisories/2011/0192) 2. [ADV-2010-1421](http://www.vupen.com/english/advisories/2010/1421) 3. [](http://support.apple.com/kb/HT4435) 4. [40545](http://secunia.com/advisories/40545) 5. [oval:org.mitre.oval:def:16056](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16056) 6. [RHSA-2010:0464](http://www.redhat.com/support/errata/RHSA-2010-0464.html) 7. [ADV-2010-1793](http://www.vupen.com/english/advisories/2010/1793) 8. [40797](http://www.securityfocus.com/bid/40797) 9. [43026](http://secunia.com/advisories/43026) 10. [ADV-2010-1432](http://www.vupen.com/english/advisories/2010/1432) 11. [GLSA-201101-09](http://security.gentoo.org/glsa/glsa-201101-09.xml) 12. [TA10-162A](http://www.us-cert.gov/cas/techalerts/TA10-162A.html) 13. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html) 14. [40759](http://www.securityfocus.com/bid/40759) 15. [1024085](http://securitytracker.com/id?1024085) 16. [SUSE-SR:2010:013](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html) 17. [1024086](http://securitytracker.com/id?1024086) 18. [ADV-2010-1434](http://www.vupen.com/english/advisories/2010/1434) 19. [TLSA-2010-19](http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt) 20. [SSRT100179](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751) 21. [SUSE-SA:2010:024](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html) 22. [](http://www.adobe.com/support/security/bulletins/apsb10-14.html) 23. [40144](http://secunia.com/advisories/40144) 24. [RHSA-2010:0470](http://www.redhat.com/support/errata/RHSA-2010-0470.html) 25. [adobe-fpair-unspec-code-exec(59336)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59336) 26. [ADV-2010-1482](http://www.vupen.com/english/advisories/2010/1482) 27. [oval:org.mitre.oval:def:7266](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7266) 28. [HPSBMA02547](http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751) 29. [ADV-2010-1522](http://www.vupen.com/english/advisories/2010/1522) 30. [ADV-2010-1453](http://www.vupen.com/english/advisories/2010/1453)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6831, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6831 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6831 - **State**: PUBLISHED - **Published Date**: January 19, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:36 UTC - **Reserved Date**: September 08, 2015 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-3344](http://www.debian.org/security/2015/dsa-3344) 2. [76737](http://www.securityfocus.com/bid/76737) 3. [](https://bugs.php.net/bug.php?id=70169) 4. [](https://bugs.php.net/bug.php?id=70168) 5. [[oss-security] 20150819 CVE Request: more php unserializing issues](http://www.openwall.com/lists/oss-security/2015/08/19/3) 6. [](http://www.php.net/ChangeLog-5.php) 7. [](https://bugs.php.net/bug.php?id=70166) 8. [](https://bugs.php.net/bug.php?id=70155) 9. [GLSA-201606-10](https://security.gentoo.org/glsa/201606-10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2913, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2913 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2913 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 08:40 UTC - **Last Updated**: June 03, 2025 at 17:48 UTC - **Reserved Date**: August 19, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Login No Captcha reCAPTCHA WordPress plugin before 1.7 doesn't check the proper IP address allowing attackers to spoof IP addresses on the allow list and bypass the need for captcha on the login screen. ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Unknown - Login No Captcha reCAPTCHA** Affected versions: - 1.7 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1) ### Credits - Daniel Ruf
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3951, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3951 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3951 - **State**: PUBLISHED - **Published Date**: August 21, 2014 at 22:00 UTC - **Last Updated**: August 06, 2024 at 10:57 UTC - **Reserved Date**: June 03, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The HZ module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted argument to the iconv_open function. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2014-5384 is used for the NULL pointer dereference. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FreeBSD-SA-14:15](http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc) 2. [1030458](http://www.securitytracker.com/id/1030458) 3. [[source-changes] 20140624 CVS commit: src/lib/libc/citrus](http://mail-index.netbsd.org/source-changes/2014/06/24/msg055822.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0440 - **State**: PUBLISHED - **Published Date**: February 03, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 00:52 UTC - **Reserved Date**: January 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in +CSCOT+/translation in Cisco Secure Desktop 3.4.2048, and other versions before 3.5; as used in Cisco ASA appliance before 8.2(1), 8.1(2.7), and 8.0(5); allows remote attackers to inject arbitrary web script or HTML via a crafted POST parameter, which is not properly handled by an eval statement in binary/mainv.js that writes to start.html. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37960](http://www.securityfocus.com/bid/37960) 2. [38397](http://secunia.com/advisories/38397) 3. [](http://www.coresecurity.com/content/cisco-secure-desktop-xss) 4. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=19843) 5. [20100201 [CORE-2010-0106] Cisco Secure Desktop XSS/JavaScript Injection](http://www.securityfocus.com/archive/1/509290/100/0/threaded) 6. [ADV-2010-0273](http://www.vupen.com/english/advisories/2010/0273)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-10425, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-10425 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-10425 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 03:58 UTC - **Reserved Date**: August 16, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, and SD 835, if GPT listener response is passed a large buffer offset, a buffer overflow occurs. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2070 - **State**: PUBLISHED - **Published Date**: June 29, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:15 UTC - **Reserved Date**: June 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SA:2005:038](http://www.novell.com/linux/security/advisories/2005_38_clamav.html) 2. [20050623 long sendmail timeouts let attacker prevent milter quiesce](http://seclists.org/lists/bugtraq/2005/Jun/0197.html) 3. [DSA-737](http://www.debian.org/security/2005/dsa-737) 4. [14047](http://www.securityfocus.com/bid/14047)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-20417, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-20417 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-20417 - **State**: PUBLISHED - **Published Date**: August 21, 2024 at 19:16 UTC - **Last Updated**: August 27, 2024 at 13:43 UTC - **Reserved Date**: November 08, 2023 at 15:08 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the REST API of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct blind SQL injection attacks. These vulnerabilities are due to insufficient validation of user-supplied input in REST API calls. An attacker could exploit these vulnerabilities by sending crafted input to an affected device. A successful exploit could allow the attacker to view or modify data on the affected device. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Affected Products **Cisco - Cisco Identity Services Engine Software** Affected versions: - 2.7.0 (Status: affected) - 2.7.0 p1 (Status: affected) - 2.7.0 p2 (Status: affected) - 3.0.0 (Status: affected) - 3.0.0 p1 (Status: affected) - 2.7.0 p3 (Status: affected) - 3.0.0 p2 (Status: affected) - 2.7.0 p4 (Status: affected) - 3.0.0 p3 (Status: affected) - 3.1.0 (Status: affected) - 2.7.0 p5 (Status: affected) - 3.0.0 p4 (Status: affected) - 2.7.0 p6 (Status: affected) - 3.1.0 p1 (Status: affected) - 3.0.0 p5 (Status: affected) - 2.7.0 p7 (Status: affected) - 3.1.0 p3 (Status: affected) - 3.1.0 p2 (Status: affected) - 3.0.0 p6 (Status: affected) - 3.2.0 (Status: affected) - 3.1.0 p4 (Status: affected) - 2.7.0 p8 (Status: affected) - 3.1.0 p5 (Status: affected) - 3.2.0 p1 (Status: affected) - 2.7.0 p9 (Status: affected) - 3.0.0 p7 (Status: affected) - 3.1.0 p6 (Status: affected) - 3.2.0 p2 (Status: affected) - 3.1.0 p7 (Status: affected) - 3.3.0 (Status: affected) - 3.2.0 p3 (Status: affected) - 3.0.0 p8 (Status: affected) - 2.7.0 p10 (Status: affected) - 3.2.0 p4 (Status: affected) - 3.1.0 p8 (Status: affected) - 3.2.0 p5 (Status: affected) - 3.2.0 p6 (Status: affected) - 3.1.0 p9 (Status: affected) - 3.3 Patch 2 (Status: affected) - 3.3 Patch 1 (Status: affected) ### References 1. [cisco-sa-ise-rest-5bPKrNtZ](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39367, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39367 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39367 - **State**: PUBLISHED - **Published Date**: April 28, 2025 at 09:07 UTC - **Last Updated**: April 28, 2025 at 12:49 UTC - **Reserved Date**: April 16, 2025 at 06:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in SeventhQueen Kleo.This issue affects Kleo: from n/a before 5.4.4. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **SeventhQueen - Kleo** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/theme/kleo/vulnerability/wordpress-kleo-theme-5-4-4-broken-access-control-vulnerability?_s_id=cve) ### Credits - Ananda Dhakal (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9516, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9516 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9516 - **State**: PUBLISHED - **Published Date**: August 13, 2019 at 20:50 UTC - **Last Updated**: August 04, 2024 at 21:54 UTC - **Reserved Date**: March 01, 2019 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#605641](https://kb.cert.org/vuls/id/605641/) 2. [](https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md) 3. [20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0](https://seclists.org/bugtraq/2019/Aug/24) 4. [USN-4099-1](https://usn.ubuntu.com/4099-1/) 5. [20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0](http://seclists.org/fulldisclosure/2019/Aug/16) 6. [](https://www.synology.com/security/advisory/Synology_SA_19_33) 7. [](https://support.f5.com/csp/article/K02591030) 8. [FEDORA-2019-befd924cfe](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/) 9. [20190822 [SECURITY] [DSA 4505-1] nginx security update](https://seclists.org/bugtraq/2019/Aug/40) 10. [DSA-4505](https://www.debian.org/security/2019/dsa-4505) 11. [](https://security.netapp.com/advisory/ntap-20190823-0002/) 12. [](https://security.netapp.com/advisory/ntap-20190823-0005/) 13. [FEDORA-2019-5a6a7bc12c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/) 14. [FEDORA-2019-6a2980de56](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/) 15. [FEDORA-2019-4427fd65be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/) 16. [FEDORA-2019-63ba15cc83](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/) 17. [FEDORA-2019-7a0b45fdc4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/) 18. [openSUSE-SU-2019:2120](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html) 19. [openSUSE-SU-2019:2114](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html) 20. [openSUSE-SU-2019:2115](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html) 21. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10296) 22. [RHSA-2019:2745](https://access.redhat.com/errata/RHSA-2019:2745) 23. [RHSA-2019:2746](https://access.redhat.com/errata/RHSA-2019:2746) 24. [RHSA-2019:2775](https://access.redhat.com/errata/RHSA-2019:2775) 25. [RHSA-2019:2799](https://access.redhat.com/errata/RHSA-2019:2799) 26. [RHSA-2019:2925](https://access.redhat.com/errata/RHSA-2019:2925) 27. [RHSA-2019:2939](https://access.redhat.com/errata/RHSA-2019:2939) 28. [RHSA-2019:2946](https://access.redhat.com/errata/RHSA-2019:2946) 29. [RHSA-2019:2950](https://access.redhat.com/errata/RHSA-2019:2950) 30. [RHSA-2019:2955](https://access.redhat.com/errata/RHSA-2019:2955) 31. [RHSA-2019:2966](https://access.redhat.com/errata/RHSA-2019:2966) 32. [openSUSE-SU-2019:2264](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html) 33. [](https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS) 34. [RHSA-2019:3933](https://access.redhat.com/errata/RHSA-2019:3933) 35. [RHSA-2019:3935](https://access.redhat.com/errata/RHSA-2019:3935) 36. [RHSA-2019:3932](https://access.redhat.com/errata/RHSA-2019:3932) 37. [FEDORA-2021-d5b2c18fe6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/) ### Credits - Thanks to Jonathan Looney of Netflix for reporting this vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-20038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-20038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-20038 - **State**: PUBLISHED - **Published Date**: June 11, 2022 at 10:00 UTC - **Last Updated**: April 15, 2025 at 14:27 UTC - **Reserved Date**: June 05, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SICUNET Access Controller 0.32-05z and classified as critical. Affected by this issue is some unknown functionality of the file card_scan_decoder.php. The manipulation of the argument No/door leads to privilege escalation. The attack may be launched remotely. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **SICUNET - Access Controller** Affected versions: - 0.32-05z (Status: affected) ### References 1. [](http://seclists.org/fulldisclosure/2017/Mar/25) 2. [](https://vuldb.com/?id.98906) ### Credits - Andrew Griffiths
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18169, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18169 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18169 - **State**: REJECTED - **Last Updated**: February 27, 2023 at 00:00 UTC - **Reserved Date**: October 09, 2018 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40175, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40175 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40175 - **State**: PUBLISHED - **Published Date**: August 18, 2023 at 21:35 UTC - **Last Updated**: October 07, 2024 at 20:04 UTC - **Reserved Date**: August 09, 2023 at 15:26 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-444: Security Weakness ### Affected Products **puma - puma** Affected versions: - < 5.6.7 (Status: affected) - >= 6.0.0, < 6.3.1 (Status: affected) ### References 1. [https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8](https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8) 2. [https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a](https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1559 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:18 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [xylan-omniswitch-login(2064)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2064) 2. [19990331 Xylan OmniSwitch "features"](http://marc.info/?l=bugtraq&m=92299263017061&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0273 - **State**: PUBLISHED - **Published Date**: April 04, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: April 04, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description pgp4pine Pine/PGP interface version 1.75-6 does not properly check to see if a public key has expired when obtaining the keys via Gnu Privacy Guard (GnuPG), which causes the message to be sent in cleartext. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010220 [CryptNET Advisory] pgp4pine-1.75-6 - expired public keys](http://archives.neohapsis.com/archives/bugtraq/2001-02/0367.html) 2. [VU#566640](http://www.kb.cert.org/vuls/id/566640) 3. [2405](http://www.securityfocus.com/bid/2405) 4. [pgp4pine-expired-keys(6135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6135)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15376 - **State**: PUBLISHED - **Published Date**: October 16, 2017 at 04:00 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: October 15, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The TELNET service in Mobatek MobaXterm 10.4 does not require authentication, which allows remote attackers to execute arbitrary commands via TCP port 23. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.vulnerability-lab.com/get_content.php?id=2097)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22481 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 15:53 UTC - **Last Updated**: June 06, 2025 at 16:35 UTC - **Reserved Date**: January 07, 2025 at 06:55 UTC - **Assigned By**: qnap ### Vulnerability Description A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.4.3079 build 20250321 and later QuTS hero h5.2.4.3079 build 20250321 and later ### Weakness Classification (CWE) - CWE-77: Security Weakness - CWE-78: OS Command Injection ### Affected Products **QNAP Systems Inc. - QTS** Affected versions: - 5.2.x (Status: affected) **QNAP Systems Inc. - QuTS hero** Affected versions: - h5.2.x (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-25-12) ### Credits - Searat and izut
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24335, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24335 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24335 - **State**: PUBLISHED - **Published Date**: February 25, 2022 at 14:35 UTC - **Last Updated**: August 03, 2024 at 04:07 UTC - **Reserved Date**: February 02, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.jetbrains.com) 2. [](https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5186, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5186 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5186 - **State**: PUBLISHED - **Published Date**: August 06, 2014 at 19:00 UTC - **Last Updated**: September 16, 2024 at 17:32 UTC - **Reserved Date**: August 06, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the All Video Gallery (all-video-gallery) plugin 1.2 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in an edit action in the allvideogallery_videos page to wp-admin/admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://codevigilant.com/disclosure/wp-plugin-all-video-gallery-a1-injection)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43139, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43139 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43139 - **State**: PUBLISHED - **Published Date**: August 12, 2024 at 22:18 UTC - **Last Updated**: August 13, 2024 at 13:38 UTC - **Reserved Date**: August 07, 2024 at 09:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Antoine Hurkmans Football Pool allows Stored XSS.This issue affects Football Pool: from n/a through 2.11.9. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Antoine Hurkmans - Football Pool** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/football-pool/wordpress-football-pool-plugin-2-11-9-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Manab Jyoti Dowarah (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26308, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26308 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26308 - **State**: PUBLISHED - **Published Date**: August 01, 2022 at 12:44 UTC - **Last Updated**: September 17, 2024 at 02:31 UTC - **Reserved Date**: February 28, 2022 at 00:00 UTC - **Assigned By**: ARTICA ### Vulnerability Description Pandora FMS v7.0NG.760 and below allows an improper access control in Configuration (Credential store) where a user with the role of Operator (Write) could create, delete, view existing keys which are outside the intended role. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Artica PFMS - Pandora FMS** Affected versions: - v760 (Status: affected) ### References 1. [](https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/) 2. [](https://www.incibe.es/en/cve-assignment-publication/coordinated-cves)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3099, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3099 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3099 - **State**: PUBLISHED - **Published Date**: June 05, 2023 at 07:00 UTC - **Last Updated**: August 02, 2024 at 06:48 UTC - **Reserved Date**: June 05, 2023 at 05:07 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function delete_file in the library dbus.SystemBus of the component Arbitrary File Handler. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230689 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **KylinSoft - youker-assistant** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.230689) 2. [](https://vuldb.com/?ctiid.230689) 3. [](https://github.com/i900008/vulndb/blob/main/kylinos_vul4.md) ### Credits - Set3r.Pan (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8483 - **State**: PUBLISHED - **Published Date**: March 08, 2017 at 01:00 UTC - **Last Updated**: August 06, 2024 at 02:20 UTC - **Reserved Date**: October 05, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description An information disclosure vulnerability in the Qualcomm power driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-33745862. References: QC-CR#1035099. ### Affected Products **Google Inc. - Android** Affected versions: - Kernel-3.10 (Status: affected) ### References 1. [96805](http://www.securityfocus.com/bid/96805) 2. [](https://source.android.com/security/bulletin/2017-03-01) 3. [1037968](http://www.securitytracker.com/id/1037968) 4. [](https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=6997dcb7ade1315474855821e64782205cb0b53a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6761, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6761 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6761 - **State**: PUBLISHED - **Published Date**: December 13, 2023 at 16:00 UTC - **Last Updated**: August 02, 2024 at 08:42 UTC - **Reserved Date**: December 13, 2023 at 07:40 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Thecosy - IceCMS** Affected versions: - 2.0.0 (Status: affected) - 2.0.1 (Status: affected) ### References 1. [](https://vuldb.com/?id.247889) 2. [](https://vuldb.com/?ctiid.247889) 3. [](http://39.106.130.187/chui/1.html) ### Credits - zero121 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2643, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2643 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2643 - **State**: PUBLISHED - **Published Date**: October 05, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 10:21 UTC - **Reserved Date**: March 24, 2014 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.4 allows remote authenticated users to gain privileges via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT101715](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121) 2. [1030970](http://www.securitytracker.com/id/1030970) 3. [HPSBMU03118](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3601, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3601 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3601 - **State**: PUBLISHED - **Published Date**: November 28, 2022 at 13:47 UTC - **Last Updated**: April 28, 2025 at 18:10 UTC - **Reserved Date**: October 19, 2022 at 07:22 UTC - **Assigned By**: WPScan ### Vulnerability Description The Image Hover Effects Css3 WordPress plugin through 4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Image Hover Effects Css3** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18) ### Credits - Asif Nawaz Minhas
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7723 - **State**: PUBLISHED - **Published Date**: June 07, 2017 at 14:00 UTC - **Last Updated**: August 06, 2024 at 07:58 UTC - **Reserved Date**: October 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description AMD fglrx-driver before 15.7 allows local users to gain privileges via a symlink attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-7723/) 2. [](http://packetstormsecurity.com/files/134121/AMD-fglrx-driver-14.4.2-Privilege-Escalation.html) 3. [20151029 CVE-2015-7723 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver](http://seclists.org/fulldisclosure/2015/Oct/104) 4. [20151029 CVE-2015-7723 - Privilege Escalation Via Symlink Attacks On POSIX Shared Memory With Insecure Permissions In AMD fglrx-driver](http://www.securityfocus.com/archive/1/536783/100/0/threaded) 5. [77357](http://www.securityfocus.com/bid/77357)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-20144, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-20144 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-20144 - **State**: PUBLISHED - **Published Date**: January 13, 2020 at 20:01 UTC - **Last Updated**: August 05, 2024 at 02:39 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 10.8 through 12.6.1. It has Incorrect Access Control. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/blog/categories/releases/) 2. [](https://about.gitlab.com/releases/2020/01/02/security-release-gitlab-12-6-2-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34004, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34004 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34004 - **State**: PUBLISHED - **Published Date**: May 31, 2024 at 20:23 UTC - **Last Updated**: March 27, 2025 at 21:12 UTC - **Reserved Date**: April 29, 2024 at 13:02 UTC - **Assigned By**: fedora ### Vulnerability Description In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **Unknown - Unknown** Affected versions: - 4.0 (Status: affected) - 4.2 (Status: affected) - 4.1 (Status: affected) ### References 1. [](https://moodle.org/mod/forum/discuss.php?d=458393) ### Credits - Vincent Schneider
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1669, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1669 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1669 - **State**: PUBLISHED - **Published Date**: January 12, 2021 at 19:42 UTC - **Last Updated**: November 19, 2024 at 15:12 UTC - **Reserved Date**: December 02, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Remote Desktop Security Feature Bypass Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1803** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server, version 1909 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 2004** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Microsoft Remote Desktop for Mac** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Microsoft Remote Desktop for IoS** Affected versions: - 1.0.0 (Status: affected) **Microsoft - Remote Desktop client for Windows Desktop** Affected versions: - 1.2.0.0 (Status: affected) ### References 1. [Windows Remote Desktop Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1669)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4675, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4675 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4675 - **State**: PUBLISHED - **Published Date**: March 05, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 07:08 UTC - **Reserved Date**: March 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description admin/admin_info/index.php in the Mole Group Gastro Portal (Restaurant Directory) Script does not require administrative authentication, which allows remote attackers to change the admin password via an unspecified form submission. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8775](http://www.exploit-db.com/exploits/8775) 2. [restaurant-index-security-bypass(50723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50723) 3. [35079](http://www.securityfocus.com/bid/35079)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0226, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0226 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0226 - **State**: PUBLISHED - **Published Date**: June 25, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:42 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description retrieve_password.pl in DCForum 6.x and 2000 generates predictable new passwords based on a sessionID, which allows remote attackers to request a new password on behalf of another user and use the sessionID to calculate the new password for that user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [3866](http://www.osvdb.org/3866) 2. [20020201 Vulnerability in all versions of DCForum from dcscripts.com](http://marc.info/?l=bugtraq&m=101258311519504&w=2) 3. [dcforum-cgi-recover-passwords(8044)](http://www.iss.net/security_center/static/8044.php) 4. [](http://www.dcscripts.com/bugtrac/DCForumID7/3.html) 5. [2038](http://www.osvdb.org/2038) 6. [4014](http://www.securityfocus.com/bid/4014)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1715, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1715 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1715 - **State**: PUBLISHED - **Published Date**: April 09, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 08:32 UTC - **Reserved Date**: April 09, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in content/user.php in AuraCMS 2.2.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the country parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5319](https://www.exploit-db.com/exploits/5319) 2. [28499](http://www.securityfocus.com/bid/28499) 3. [29593](http://secunia.com/advisories/29593) 4. [auracms-user-security-bypass(41529)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41529)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-49534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-49534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-49534 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 19:54 UTC - **Last Updated**: December 11, 2024 at 12:04 UTC - **Reserved Date**: October 15, 2024 at 15:35 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Adobe - Acrobat Reader** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb24-92.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12564, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12564 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12564 - **State**: PUBLISHED - **Published Date**: June 19, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 08:38 UTC - **Reserved Date**: June 19, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for URLs in the submit page, a user can forge an HTTP request that will force lava-server-gunicorn to return any file on the server that is readable by lavaserver and valid yaml. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20180628 [SECURITY] [DLA 1404-1] lava-server security update](https://lists.debian.org/debian-lts-announce/2018/06/msg00011.html) 2. [DSA-4234](https://www.debian.org/security/2018/dsa-4234) 3. [](https://git.linaro.org/lava/lava.git/commit/?id=95a9a77b144ced24d7425d6544ab03ca7f6c75d3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4191 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 18:53 UTC - **Last Updated**: August 03, 2024 at 17:16 UTC - **Reserved Date**: December 30, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=14.8, <14.8.2 (Status: affected) - >=14.7, <14.7.4 (Status: affected) - >=13.0, <14.6.5 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/343898) 2. [](https://hackerone.com/reports/1089609) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4191.json) ### Credits - Thanks @mungsul and @todb-r7 for reporting this vulnerability through our HackerOne bug bounty program.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2891, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2891 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2891 - **State**: PUBLISHED - **Published Date**: July 18, 2018 at 13:00 UTC - **Last Updated**: October 02, 2024 at 20:21 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Retail Bulk Data Integration component of Oracle Retail Applications (subcomponent: BDI Job Scheduler). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Bulk Data Integration. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Bulk Data Integration, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Bulk Data Integration accessible data as well as unauthorized read access to a subset of Oracle Retail Bulk Data Integration accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Retail Bulk Data Integration** Affected versions: - 16.0 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 2. [104829](http://www.securityfocus.com/bid/104829)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48545 - **State**: PUBLISHED - **Published Date**: December 15, 2023 at 10:15 UTC - **Last Updated**: October 07, 2024 at 13:49 UTC - **Reserved Date**: November 16, 2023 at 23:29 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35075 - **State**: PUBLISHED - **Published Date**: November 27, 2023 at 09:09 UTC - **Last Updated**: June 03, 2025 at 14:01 UTC - **Reserved Date**: November 20, 2023 at 12:06 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost fails to use  innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.  ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 7.8.13 (Status: unaffected) - 8.1.4 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates) ### Credits - Harrison Healey
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1992, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1992 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1992 - **State**: PUBLISHED - **Published Date**: April 12, 2007 at 10:00 UTC - **Last Updated**: August 07, 2024 at 13:13 UTC - **Reserved Date**: April 11, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple PHP remote file inclusion vulnerabilities in the com_zoom 2.5 beta 2 and earlier module for Mambo allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) EXIF_Makernote.php or (2) EXIF.php in classes/iptc/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [zmg-exif-file-include(33580)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33580) 2. [ADV-2007-1353](http://www.vupen.com/english/advisories/2007/1353) 3. [23415](http://www.securityfocus.com/bid/23415) 4. [3706](https://www.exploit-db.com/exploits/3706)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24896, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24896 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24896 - **State**: PUBLISHED - **Published Date**: December 13, 2021 at 10:41 UTC - **Last Updated**: August 03, 2024 at 19:49 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Caldera Forms WordPress plugin before 1.9.5 does not sanitise and escape the Form Name before outputting it in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Caldera Forms – More Than Contact Forms** Affected versions: - 1.9.5 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/2c469e8b-c761-460b-b31d-9219a43006ff) ### Credits - Dhananjay Garg
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-36039, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-36039 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-36039 - **State**: PUBLISHED - **Published Date**: May 21, 2024 at 00:00 UTC - **Last Updated**: November 21, 2024 at 15:27 UTC - **Reserved Date**: May 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON input because keys are not escaped by escape_dict. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/PyMySQL/PyMySQL/releases/tag/v1.1.1) 2. [[debian-lts-announce] 20240527 [SECURITY] [DLA 3822-1] python-pymysql security update](https://lists.debian.org/debian-lts-announce/2024/05/msg00017.html) 3. [FEDORA-2024-e7141ab284](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35VOJS3SRJNLQIO7YTZFNM6RWHIHWTMK/) 4. [FEDORA-2024-b26f07d27b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/23VXBV34GFRICCVYZ6KFMSSWY5UEXCF5/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43552, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43552 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43552 - **State**: PUBLISHED - **Published Date**: December 27, 2021 at 18:48 UTC - **Last Updated**: September 17, 2024 at 00:16 UTC - **Reserved Date**: November 08, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **Philips - Patient Information Center iX (PIC iX)** Affected versions: - C.02 (Status: affected) - C.03 (Status: affected) - B.02 (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-21-322-02) ### Credits - Younes Dragoni, Andrea Palanca and Ivan Speziale of Nozomi Networks
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3654 - **State**: PUBLISHED - **Published Date**: March 02, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 17:01 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **n/a - openstack-nova** Affected versions: - Affects - Nova: <21.2.3, >=22.0.0 <22.2.3, >=23.0.0 <23.0.3 | Fixed-In 21.2.3, 22.3.0, and 23.1.0 (Status: affected) ### References 1. [](https://security.openstack.org/ossa/OSSA-2021-002.html) 2. [](https://bugs.launchpad.net/nova/+bug/1927677) 3. [](https://www.openwall.com/lists/oss-security/2021/07/29/2) 4. [](https://bugs.python.org/issue32084) 5. [](https://opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66) 6. [](https://opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251eb) 7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1961439) 8. [GLSA-202305-02](https://security.gentoo.org/glsa/202305-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3728, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3728 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3728 - **State**: PUBLISHED - **Published Date**: August 20, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 09:53 UTC - **Reserved Date**: August 20, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to determine the installation path, IP addresses, and error messages via direct requests to files under LOG/. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4172](http://securityreason.com/securityalert/4172) 2. [30700](http://www.securityfocus.com/bid/30700) 3. [31534](http://secunia.com/advisories/31534) 4. [20080815 Re: MicroWorld MailScan - Multiple Vulnerabilities within Admin-Webinterface](http://marc.info/?l=bugtraq&m=121881329424635&w=2) 5. [mailscan-admininterface-security-bypass(44518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44518) 6. [](http://www.oliverkarow.de/research/mailscan.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6734 - **State**: REJECTED - **Published Date**: January 12, 2021 at 20:02 UTC - **Last Updated**: January 12, 2021 at 20:02 UTC - **Reserved Date**: January 09, 2020 at 00:00 UTC - **Assigned By**: Eaton ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2616 - **State**: PUBLISHED - **Published Date**: July 27, 2018 at 19:00 UTC - **Last Updated**: June 09, 2025 at 15:37 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. ### Weakness Classification (CWE) - CWE-267: Security Weakness ### Affected Products **Linux - util-linux** Affected versions: - 2.32.1 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616) 2. [96404](http://www.securityfocus.com/bid/96404) 3. [RHSA-2017:0907](https://access.redhat.com/errata/RHSA-2017:0907) 4. [RHSA-2017:0654](http://rhn.redhat.com/errata/RHSA-2017-0654.html) 5. [GLSA-201706-02](https://security.gentoo.org/glsa/201706-02) 6. [DSA-3793](https://www.debian.org/security/2017/dsa-3793) 7. [](https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891) 8. [1038271](http://www.securitytracker.com/id/1038271)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30845, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30845 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30845 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 10:55 UTC - **Last Updated**: March 27, 2025 at 18:57 UTC - **Reserved Date**: March 26, 2025 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in webangon The Pack Elementor addons allows PHP Local File Inclusion. This issue affects The Pack Elementor addons: from n/a through 2.1.1. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **webangon - The Pack Elementor addons** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/the-pack-addon/vulnerability/wordpress-the-pack-elementor-addons-plugin-2-1-1-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-55517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-55517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-55517 - **State**: PUBLISHED - **Published Date**: January 08, 2025 at 00:00 UTC - **Last Updated**: January 08, 2025 at 19:44 UTC - **Reserved Date**: December 06, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Interllect Core Search in Polaris FT Intellect Core Banking 9.5. Input passed through the groupType parameter in /SCGController is mishandled before being used in SQL queries, allowing SQL injection in an authenticated session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackmd.io/@AowPhwc/SyvEiDsIye)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0680, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0680 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0680 - **State**: PUBLISHED - **Published Date**: February 03, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 12:26 UTC - **Reserved Date**: February 02, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/functions.php in Phpbb Tweaked 3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22344](http://www.securityfocus.com/bid/22344) 2. [24001](http://secunia.com/advisories/24001) 3. [3235](https://www.exploit-db.com/exploits/3235) 4. [ADV-2007-0451](http://www.vupen.com/english/advisories/2007/0451) 5. [](http://www.xoron.info/bugs/phpbbtweaked.txt) 6. [33079](http://osvdb.org/33079) 7. [phpbbtweaked-functions-file-include(32024)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32024)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17237, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17237 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17237 - **State**: PUBLISHED - **Published Date**: November 12, 2019 at 16:53 UTC - **Last Updated**: August 05, 2024 at 01:33 UTC - **Reserved Date**: October 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows CSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wordpress.org/plugins/igniteup/#developers) 2. [](https://blog.nintechnet.com/multiple-vulnerabilities-in-wordpress-igniteup-coming-soon-and-maintenance-mode-plugin/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26800, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26800 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26800 - **State**: PUBLISHED - **Published Date**: January 11, 2021 at 12:50 UTC - **Last Updated**: August 04, 2024 at 16:03 UTC - **Reserved Date**: October 07, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stack overflow vulnerability in Aleth Ethereum C++ client version <= 1.8.0 using a specially crafted a config.json file may result in a denial of service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ethereum/aleth) 2. [](https://ethereum.org/en/about/) 3. [](https://github.com/ethereum/aleth/issues/5917)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28027 - **State**: PUBLISHED - **Published Date**: November 21, 2024 at 14:41 UTC - **Last Updated**: November 22, 2024 at 14:18 UTC - **Reserved Date**: February 29, 2024 at 21:52 UTC - **Assigned By**: talos ### Vulnerability Description Three OS command injection vulnerabilities exist in the web interface I/O configuration functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability refers to the authetnicated OS Command injection that occurs through the attacker-controlled `timer1` parameter, at offset `0x8e80`. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **MC Technologies - MC LR Router** Affected versions: - 2.10.5 (QEMU) (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953) ### Credits - Discovered by Matt Wiseman of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31757, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31757 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31757 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 14:51 UTC - **Last Updated**: April 01, 2025 at 20:35 UTC - **Reserved Date**: April 01, 2025 at 13:19 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in BinaryCarpenter Free Woocommerce Product Table View allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Free Woocommerce Product Table View: from n/a through 1.78. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **BinaryCarpenter - Free Woocommerce Product Table View** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/free-product-table-for-woocommerce/vulnerability/wordpress-free-woocommerce-product-table-view-plugin-1-78-broken-access-control-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3904 - **State**: REJECTED - **Published Date**: June 11, 2021 at 21:03 UTC - **Last Updated**: June 11, 2021 at 21:03 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7826 - **State**: PUBLISHED - **Published Date**: July 17, 2020 at 15:01 UTC - **Last Updated**: September 17, 2024 at 04:04 UTC - **Reserved Date**: January 22, 2020 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description EyeSurfer BflyInstallerX.ocx v1.0.0.16 and earlier versions contain a vulnerability that could allow remote files to be download by setting the arguments to the vulnerable method. This can be leveraged for code execution. When the vulnerable method is called, they fail to properly check the parameters that are passed to it. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-494: Security Weakness ### Affected Products **Bflysoft - EyeSurfer BflyInstallerX.ocx** Affected versions: - 1.0.0.16 and earlier versions (Status: affected) ### References 1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35512)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5178, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5178 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5178 - **State**: PUBLISHED - **Published Date**: October 03, 2007 at 14:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 03, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description contrib/mx_glance_sdesc.php in the mx_glance 2.3.3 module for mxBB places a critical security check within a comment because of a missing comment delimiter, which allows remote attackers to conduct remote file inclusion attacks and execute arbitrary PHP code via a URL in the mx_root_path parameter. NOTE: some sources incorrectly state that phpbb_root_path is the affected parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-3326](http://www.vupen.com/english/advisories/2007/3326) 2. [mxbb-mxglancesdesc-file-include(36867)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36867) 3. [4470](https://www.exploit-db.com/exploits/4470) 4. [25866](http://www.securityfocus.com/bid/25866) 5. [20071001 Bogus: mxBB Module mx_glance 2.3.3 Remote File Include Vulnerability](http://www.attrition.org/pipermail/vim/2007-October/001808.html) 6. [27011](http://secunia.com/advisories/27011) 7. [37400](http://osvdb.org/37400) 8. [20071001 Bogus: mxBB Module mx_glance 2.3.3 Remote File Include Vulnerability](http://www.attrition.org/pipermail/vim/2007-October/001807.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1457 - **State**: PUBLISHED - **Published Date**: April 19, 2025 at 03:21 UTC - **Last Updated**: April 21, 2025 at 02:41 UTC - **Reserved Date**: February 18, 2025 at 20:04 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Wrapper Link, Countdown and Gallery widgets in all versions up to, and including, 5.10.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **bdthemes - Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ac5484-3caa-4821-990b-cd49c2c4873d?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-wrapper-link.min.js) 3. [](https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-countdown.min.js) 4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1097) 5. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1095) ### Credits - Craig Smith
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5575, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5575 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5575 - **State**: PUBLISHED - **Published Date**: August 19, 2013 at 23:00 UTC - **Last Updated**: August 06, 2024 at 21:14 UTC - **Reserved Date**: October 24, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2013:0943](http://rhn.redhat.com/errata/RHSA-2013-0943.html) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=880443) 3. [RHSA-2013:0839](http://rhn.redhat.com/errata/RHSA-2013-0839.html) 4. [RHSA-2013:0875](http://rhn.redhat.com/errata/RHSA-2013-0875.html) 5. [60043](http://www.securityfocus.com/bid/60043) 6. [](http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/) 7. [RHSA-2013:0833](http://rhn.redhat.com/errata/RHSA-2013-0833.html) 8. [RHSA-2013:1437](http://rhn.redhat.com/errata/RHSA-2013-1437.html) 9. [](http://cxf.apache.org/cve-2012-5575.html) 10. [RHSA-2013:1143](http://rhn.redhat.com/errata/RHSA-2013-1143.html) 11. [RHSA-2013:0876](http://rhn.redhat.com/errata/RHSA-2013-0876.html) 12. [RHSA-2013:1028](http://rhn.redhat.com/errata/RHSA-2013-1028.html) 13. [RHSA-2013:0834](http://rhn.redhat.com/errata/RHSA-2013-0834.html) 14. [RHSA-2013:0873](http://rhn.redhat.com/errata/RHSA-2013-0873.html) 15. [RHSA-2013:0874](http://rhn.redhat.com/errata/RHSA-2013-0874.html) 16. [[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E) 17. [[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E) 18. [[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E) 19. [[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E) 20. [[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E) 21. [[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4046, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4046 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4046 - **State**: PUBLISHED - **Published Date**: January 10, 2019 at 15:00 UTC - **Last Updated**: August 05, 2024 at 05:04 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable denial-of-service vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. A user with local access can use this vulnerability to terminate a privileged helper application. An attacker would need local access to the machine for a successful exploit. ### Affected Products **n/a - Clean My Mac** Affected versions: - Clean My Mac X 4.04 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0720)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0018, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0018 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0018 - **State**: REJECTED - **Published Date**: November 29, 2005 at 21:00 UTC - **Last Updated**: September 16, 2024 at 20:53 UTC - **Reserved Date**: November 29, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4537, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4537 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4537 - **State**: PUBLISHED - **Published Date**: May 07, 2024 at 11:35 UTC - **Last Updated**: August 01, 2024 at 20:40 UTC - **Reserved Date**: May 06, 2024 at 09:57 UTC - **Assigned By**: INCIBE ### Vulnerability Description IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain the download URL of another user to obtain the purchased ticket. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Impronta - Janto Ticketing Software** Affected versions: - 4.3r10.cks (Status: affected) ### References 1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto-ticketing-software) ### Credits - Alejandro Amorín Niño
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0415 - **State**: PUBLISHED - **Published Date**: January 17, 2013 at 01:30 UTC - **Last Updated**: August 06, 2024 at 14:25 UTC - **Reserved Date**: December 07, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the Bind/Postinstall script for Bind package. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html) 2. [oval:org.mitre.oval:def:19370](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19370) 3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) 4. [](http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1126, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1126 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1126 - **State**: PUBLISHED - **Published Date**: July 29, 2019 at 14:12 UTC - **Last Updated**: August 04, 2024 at 18:06 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A security feature bypass vulnerability exists in Active Directory Federation Services (ADFS) which could allow an attacker to bypass the extranet lockout policy.To exploit this vulnerability, an attacker could run a specially crafted application, which would allow an attacker to launch a password brute-force attack or cause account lockouts in Active Directory.This security update corrects how ADFS handles external authentication requests., aka 'ADFS Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0975. ### Affected Products **Microsoft - Windows Server** Affected versions: - 2012 R2 (Status: affected) - 2012 R2 (Core installation) (Status: affected) - 2016 (Status: affected) - 2016 (Core installation) (Status: affected) - version 1803 (Core Installation) (Status: affected) - 2019 (Status: affected) - 2019 (Core installation) (Status: affected) **Microsoft - Windows Server, version 1903 (Server Core installation)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1126)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25784 - **State**: PUBLISHED - **Published Date**: December 02, 2021 at 22:21 UTC - **Last Updated**: August 03, 2024 at 20:11 UTC - **Reserved Date**: January 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Edit Article. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/taogogo/taocms/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1939 - **State**: REJECTED - **Published Date**: January 05, 2018 at 14:00 UTC - **Last Updated**: January 05, 2018 at 13:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0807 - **State**: PUBLISHED - **Published Date**: February 19, 2008 at 00:00 UTC - **Last Updated**: August 07, 2024 at 08:01 UTC - **Reserved Date**: February 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [29186](http://secunia.com/advisories/29186) 2. [[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)](http://lists.horde.org/archives/announce/2008/000381.html) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=432027) 4. [FEDORA-2008-2087](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html) 5. [27844](http://www.securityfocus.com/bid/27844) 6. [DSA-1507](http://www.debian.org/security/2008/dsa-1507) 7. [28982](http://secunia.com/advisories/28982) 8. [29071](http://secunia.com/advisories/29071) 9. [[announce] 20080215 Turba H3 (2.1.7) (final)](http://lists.horde.org/archives/announce/2008/000378.html) 10. [ADV-2008-0593](http://www.vupen.com/english/advisories/2008/0593/references) 11. [[announce] 20080215 Turba H3 (2.2-RC3)](http://lists.horde.org/archives/announce/2008/000379.html) 12. [29185](http://secunia.com/advisories/29185) 13. [[announce] 20080215 Horde Groupware 1.0.4 (final)](http://lists.horde.org/archives/announce/2008/000380.html) 14. [1019433](http://www.securitytracker.com/id?1019433) 15. [29184](http://secunia.com/advisories/29184) 16. [FEDORA-2008-2040](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html) 17. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10461, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10461 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10461 - **State**: PUBLISHED - **Published Date**: March 12, 2020 at 13:05 UTC - **Last Updated**: August 04, 2024 at 10:58 UTC - **Reserved Date**: March 12, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The way comments in article.php (vulnerable function in include/functions-article.php) are handled in Chadha PHPKB Standard Multi-Language 9 allows attackers to execute Stored (Blind) XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php, via the GET parameter cmt. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://antoniocannito.it/?p=137#bxss2) 2. [](https://antoniocannito.it/phpkb1#blind-cross-site-scripting-2-cve-2020-10461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4859 - **State**: PUBLISHED - **Published Date**: May 12, 2017 at 18:00 UTC - **Last Updated**: August 06, 2024 at 00:46 UTC - **Reserved Date**: May 17, 2016 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Open redirect vulnerability in Splunk Enterprise 6.4.x prior to 6.4.3, Splunk Enterprise 6.3.x prior to 6.3.6, Splunk Enterprise 6.2.x prior to 6.2.10, Splunk Enterprise 6.1.x prior to 6.1.11, Splunk Enterprise 6.0.x prior to 6.0.12, Splunk Enterprise 5.0.x prior to 5.0.16 and Splunk Light prior to 6.4.3 allows to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. ### Affected Products **Splunk Inc. - Splunk Enterprise** Affected versions: - 6.4.x prior to 6.4.3 (Status: affected) - 6.3.x prior to 6.3.6 (Status: affected) - 6.2.x prior to 6.2.10 (Status: affected) - 6.1.x prior to 6.1.11 (Status: affected) - 6.0.x prior to 6.0.12 (Status: affected) - 5.0.x prior to 5.0.16 (Status: affected) **Splunk Inc. - Splunk Light** Affected versions: - prior to 6.4.3 (Status: affected) ### References 1. [JVN#64800312](https://jvn.jp/en/jp/JVN64800312/index.html) 2. [](https://www.splunk.com/view/SP-CAAAPQ6) 3. [92603](http://www.securityfocus.com/bid/92603)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29056 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 21:07 UTC - **Last Updated**: January 30, 2025 at 18:26 UTC - **Reserved Date**: March 30, 2023 at 12:46 UTC - **Assigned By**: lenovo ### Vulnerability Description A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **Lenovo - XClarity Controller** Affected versions: - Refer to Mitigation strategy section in LEN-118321 (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-118321)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2025 - **State**: PUBLISHED - **Published Date**: April 25, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 25, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the TIFFFetchData function in tif_dirread.c for libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted TIFF image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-1563](http://www.vupen.com/english/advisories/2006/1563) 2. [20210](http://secunia.com/advisories/20210) 3. [19949](http://secunia.com/advisories/19949) 4. [libtiff-tifffetchdata-overflow(26134)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26134) 5. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189933) 6. [103099](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103099-1) 7. [USN-277-1](https://usn.ubuntu.com/277-1/) 8. [GLSA-200605-17](http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml) 9. [20667](http://secunia.com/advisories/20667) 10. [](http://bugzilla.remotesensing.org/show_bug.cgi?id=1102) 11. [19936](http://secunia.com/advisories/19936) 12. [19964](http://secunia.com/advisories/19964) 13. [201332](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201332-1) 14. [2006-0024](http://www.trustix.org/errata/2006/0024) 15. [20345](http://secunia.com/advisories/20345) 16. [DSA-1054](http://www.debian.org/security/2006/dsa-1054) 17. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc) 18. [17732](http://www.securityfocus.com/bid/17732) 19. [](http://support.avaya.com/elmodocs2/security/ASA-2006-119.htm) 20. [RHSA-2006:0425](http://www.redhat.com/support/errata/RHSA-2006-0425.html) 21. [19838](http://secunia.com/advisories/19838) 22. [oval:org.mitre.oval:def:10593](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10593) 23. [20021](http://secunia.com/advisories/20021) 24. [MDKSA-2006:082](http://www.mandriva.com/security/advisories?name=MDKSA-2006:082) 25. [19897](http://secunia.com/advisories/19897) 26. [20023](http://secunia.com/advisories/20023) 27. [SUSE-SR:2006:009](http://www.novell.com/linux/security/advisories/2006_04_28.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2428, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2428 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2428 - **State**: PUBLISHED - **Published Date**: April 17, 2013 at 15:00 UTC - **Last Updated**: August 06, 2024 at 15:36 UTC - **Reserved Date**: March 05, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX, a different vulnerability than CVE-2013-0402, CVE-2013-2414, and CVE-2013-2427. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16416](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16416) 2. [TA13-107A](http://www.us-cert.gov/ncas/alerts/TA13-107A) 3. [RHSA-2013:0757](http://rhn.redhat.com/errata/RHSA-2013-0757.html) 4. [](http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22041, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22041 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22041 - **State**: PUBLISHED - **Published Date**: February 16, 2022 at 16:37 UTC - **Last Updated**: August 03, 2024 at 18:30 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. ### Affected Products **n/a - VMware ESXi , Workstation, Fusion and VMware Cloud Foundation** Affected versions: - VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11) (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3783 - **State**: PUBLISHED - **Published Date**: August 17, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 04:50 UTC - **Reserved Date**: December 28, 2017 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description A privilege escalation detected in flintcms versions <= 1.1.9 allows account takeover due to blind MongoDB injection in password reset. ### Affected Products **https://github.com/JasonEtco - flintcms** Affected versions: - 1.1.10 (Status: affected) ### References 1. [](https://hackerone.com/reports/386807)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30726, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30726 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30726 - **State**: PUBLISHED - **Published Date**: June 07, 2022 at 18:03 UTC - **Last Updated**: August 03, 2024 at 06:56 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: Samsung Mobile ### Vulnerability Description Unprotected component vulnerability in DeviceSearchTrampoline in SecSettingsIntelligence prior to SMR Jun-2022 Release 1 allows local attackers to launch activities of SecSettingsIntelligence. ### CVSS Metrics - **CVSS Base Score**: 6.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Samsung Mobile - Samsung Mobile Devices** Affected versions: - S(12) (Status: affected) ### References 1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31036 - **State**: PUBLISHED - **Published Date**: January 12, 2024 at 17:11 UTC - **Last Updated**: August 02, 2024 at 14:45 UTC - **Reserved Date**: April 22, 2023 at 02:38 UTC - **Assigned By**: nvidia ### Vulnerability Description NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **nvidia - Triton Inference Server** Affected versions: - All versions prior to 2.40 (Status: affected) ### References 1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5509)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37782 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 00:00 UTC - **Last Updated**: November 27, 2024 at 16:51 UTC - **Reserved Date**: June 10, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An LDAP injection vulnerability in the login page of Gladinet CentreStack v13.12.9934.54690 allows attackers to access sensitive data or execute arbitrary commands via a crafted payload injected into the username field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.centrestack.com/p/gce_latest_release.html) 2. [](https://medium.com/%40jkoreamo/centrestack-vulnerability-disclosure-d28dc8f21a56) 3. [](https://gist.githubusercontent.com/Draoken/ab5465fc339df7a1e42281540b61f887/raw/fb28d4148e311e8cde9778dee4f8b2e64e27ea92/CVE-2024-37782.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2093 - **State**: PUBLISHED - **Published Date**: May 06, 2008 at 16:00 UTC - **Last Updated**: August 07, 2024 at 08:49 UTC - **Reserved Date**: May 06, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in the Profiler (com_comprofiler) component in Community Builder for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the user parameter in a userProfile action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [communitybuilder-user-sql-injection(42008)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42008) 2. [5491](https://www.exploit-db.com/exploits/5491) 3. [28911](http://www.securityfocus.com/bid/28911)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20946 - **State**: PUBLISHED - **Published Date**: August 01, 2019 at 16:14 UTC - **Last Updated**: August 05, 2024 at 12:19 UTC - **Reserved Date**: July 31, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description cPanel before 68.0.27 allows attackers to read zone information because a world-readable archive is created by the archive_sync_zones script (SEC-355). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://documentation.cpanel.net/display/CL/68+Change+Log)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3735, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3735 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3735 - **State**: PUBLISHED - **Published Date**: January 28, 2022 at 00:00 UTC - **Last Updated**: August 06, 2024 at 00:03 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset. ### Weakness Classification (CWE) - CWE-335: Security Weakness ### Affected Products **n/a - Piwigo** Affected versions: - piwigo < 2.8.1 (Status: affected) ### References 1. [](http://piwigo.org/release-2.8.1%2C) 2. [](https://github.com/Piwigo/Piwigo/issues/470%2C) 3. [](https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2777, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2777 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2777 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 30, 2024 at 15:38 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Hyperion Financial Management product of Oracle Hyperion (component: Security). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Financial Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Financial Management accessible data. CVSS 3.0 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N). ### Affected Products **Oracle Corporation - Hyperion Financial Management** Affected versions: - 11.1.2.4 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)