System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3330
- **State**: PUBLISHED
- **Published Date**: June 09, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 17, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1187](http://rhn.redhat.com/errata/RHSA-2015-1187.html)
2. [RHSA-2015:1186](http://rhn.redhat.com/errata/RHSA-2015-1186.html)
3. [74204](http://www.securityfocus.com/bid/74204)
4. [1033703](http://www.securitytracker.com/id/1033703)
5. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html)
6. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html)
7. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html)
8. [](http://php.net/ChangeLog-5.php)
9. [SUSE-SU-2015:0868](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html)
10. [](https://support.apple.com/HT205267)
11. [](https://bugs.php.net/bug.php?id=69218)
12. [](https://bugs.php.net/bug.php?id=68486)
13. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
14. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=809610f5ea38a83b284e1125d1fff129bdd615e7)
15. [USN-2572-1](http://www.ubuntu.com/usn/USN-2572-1)
16. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html)
17. [](https://support.apple.com/kb/HT205031)
18. [openSUSE-SU-2015:0855](http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00004.html)
19. [[oss-security] 20150417 Re: CVE Request: PHP potential remote code execution with apache 2.4 apache2handler](http://openwall.com/lists/oss-security/2015/04/17/7)
20. [GLSA-201606-10](https://security.gentoo.org/glsa/201606-10)
21. [RHSA-2015:1066](http://rhn.redhat.com/errata/RHSA-2015-1066.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11765
- **State**: PUBLISHED
- **Published Date**: October 13, 2017 at 13:00 UTC
- **Last Updated**: September 17, 2024 at 01:17 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11784, CVE-2017-11785, and CVE-2017-11814.
### Affected Products
**Microsoft Corporation - Windows Kernel**
Affected versions:
- Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 (Status: affected)
### References
1. [1039526](http://www.securitytracker.com/id/1039526)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11765)
3. [101111](http://www.securityfocus.com/bid/101111) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39056
- **State**: PUBLISHED
- **Published Date**: September 18, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 15:52 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An information leak in Coffee-jumbo v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://coffee-jumbo.com)
2. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39056.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1595
- **State**: PUBLISHED
- **Published Date**: December 11, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 16, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1092855)
2. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
3. [](http://www.mozilla.org/security/announce/2014/mfsa2014-90.html)
4. [](http://support.apple.com/HT204244)
5. [](http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/)
6. [APPLE-SA-2015-01-27-4](http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1198
- **State**: PUBLISHED
- **Published Date**: March 15, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: March 15, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RLPDaemon in HP-UX 10.20 and 11.0 allows local users to overwrite arbitrary files and gain privileges by specifying the target file in the -L option.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hp-rlpd-create-log(7729)](http://www.iss.net/security_center/static/7729.php)
2. [20011215 HP-UX setuid rlpdaemon induced to make illicit file writes](http://www.securityfocus.com/archive/1/245690)
3. [3701](http://www.securityfocus.com/bid/3701)
4. [oval:org.mitre.oval:def:5763](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5763) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20726
- **State**: PUBLISHED
- **Published Date**: April 15, 2022 at 14:20 UTC
- **Last Updated**: November 06, 2024 at 16:24 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Cisco - Cisco IOS**
Affected versions:
- n/a (Status: affected)
### References
1. [20220413 Cisco IOx Application Hosting Environment Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19282
- **State**: PUBLISHED
- **Published Date**: April 04, 2019 at 20:31 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 14, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a denial of service by crashing the Common Industrial Protocol (CIP) network stack. The vulnerability allows the attacker to crash the CIP in a way that it does not accept new connections, but keeps the current connections active, which can prevent legitimate users from recovering control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-087-01)
2. [](https://applied-risk.com/application/files/4215/5385/2294/Advisory_AR2019004_Rockwell_Powerflex_525_Denial_of_Service.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2884
- **State**: PUBLISHED
- **Published Date**: September 15, 2010 at 17:26 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 27, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA10-263A](http://www.us-cert.gov/cas/techalerts/TA10-263A.html)
2. [ADV-2011-0192](http://www.vupen.com/english/advisories/2011/0192)
3. [](http://support.apple.com/kb/HT4435)
4. [SUSE-SA:2010:048](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html)
5. [ADV-2011-0191](http://www.vupen.com/english/advisories/2011/0191)
6. [43025](http://secunia.com/advisories/43025)
7. [43026](http://secunia.com/advisories/43026)
8. [GLSA-201101-09](http://security.gentoo.org/glsa/glsa-201101-09.xml)
9. [oval:org.mitre.oval:def:6852](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6852)
10. [](http://www.adobe.com/support/security/advisories/apsa10-03.html)
11. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html)
12. [GLSA-201101-08](http://security.gentoo.org/glsa/glsa-201101-08.xml)
13. [41526](http://secunia.com/advisories/41526)
14. [](http://www.adobe.com/support/security/bulletins/apsb10-22.html)
15. [RHSA-2010:0743](http://www.redhat.com/support/errata/RHSA-2010-0743.html)
16. [](http://www.adobe.com/support/security/bulletins/apsb10-21.html)
17. [TA10-279A](http://www.us-cert.gov/cas/techalerts/TA10-279A.html)
18. [41443](http://secunia.com/advisories/41443)
19. [41434](http://secunia.com/advisories/41434)
20. [adobe-flash-content-code-execution(61771)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61771)
21. [VU#275289](http://www.kb.cert.org/vuls/id/275289)
22. [ADV-2010-2348](http://www.vupen.com/english/advisories/2010/2348)
23. [ADV-2010-2349](http://www.vupen.com/english/advisories/2010/2349)
24. [RHSA-2010:0706](http://www.redhat.com/support/errata/RHSA-2010-0706.html)
25. [SUSE-SR:2010:019](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html)
26. [41435](http://secunia.com/advisories/41435) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0812
- **State**: PUBLISHED
- **Published Date**: October 18, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:28 UTC
- **Reserved Date**: September 26, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The administration module in Sun Java web server allows remote attackers to execute arbitrary commands by uploading Java code to the module and invoke the com.sun.server.http.pagecompile.jsp92.JspServlet by requesting a URL that begins with a /servlet/ tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [00197](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/197&type=0&nav=sec.sba)
2. [sunjava-webadmin-bbs(5135)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5135)
3. [1600](http://www.securityfocus.com/bid/1600)
4. [](http://www.securityfocus.com/templates/advisory.html?id=2542) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24004
- **State**: PUBLISHED
- **Published Date**: February 06, 2024 at 00:00 UTC
- **Last Updated**: August 19, 2024 at 20:15 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jishenghua/jshERP/issues/99)
2. [](https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24004.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3796
- **State**: PUBLISHED
- **Published Date**: November 16, 2010 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: October 07, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Safari RSS in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 does not block Java applets in an RSS feed, which allows remote attackers to obtain sensitive information via a feed: URL containing an applet that performs DOM modifications.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4435)
2. [APPLE-SA-2010-11-10-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21834
- **State**: PUBLISHED
- **Published Date**: January 11, 2022 at 20:22 UTC
- **Last Updated**: January 02, 2025 at 18:22 UTC
- **Reserved Date**: December 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8514
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 03:27 UTC
- **Last Updated**: September 25, 2024 at 14:10 UTC
- **Reserved Date**: September 06, 2024 at 14:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Prisna GWT – Google Website Translator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.11 via deserialization of untrusted input from the 'prisna_import' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**prisna - Prisna GWT – Google Website Translator**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4183c3f7-7794-45f3-8fad-b87ffec3639c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/google-website-translator/tags/1.4.11/classes/admin.class.php#L267)
3. [](https://plugins.trac.wordpress.org/changeset/3155285/)
### Credits
- Lesor101 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8065
- **State**: PUBLISHED
- **Published Date**: March 12, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:46 UTC
- **Reserved Date**: March 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. There is a user mode write access violation on the syncbrs.exe memory region that can be triggered by rapidly sending a variety of HTTP requests with long HTTP header values or long URIs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rapid7/metasploit-framework/pull/9701)
2. [](https://github.com/EgeBalci/Sync_Breeze_Enterprise_10_6_24_-DOS)
3. [](http://packetstormsecurity.com/files/172676/Flexense-HTTP-Server-10.6.24-Buffer-Overflow-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25075
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 19:04 UTC
- **Last Updated**: August 02, 2024 at 11:11 UTC
- **Reserved Date**: February 24, 2023 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Unquoted search path in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**n/a - Intel Server Configuration Utility software**
Affected versions:
- before version 16.0.9 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9838
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5. A remote attacker may be able to cause arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19229
- **State**: PUBLISHED
- **Published Date**: December 04, 2019 at 18:50 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 22, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
admincgi-bin/service.fcgi on Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allows action=download&filename= Directory Traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://seclists.org/bugtraq/2019/Dec/5)
2. [](https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/)
3. [](http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41235
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 15:45 UTC
- **Last Updated**: May 28, 2025 at 15:01 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
### Affected Products
**Jenkins project - Jenkins WildFly Deployer Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.0.2 (Status: unknown)
### References
1. [](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47581
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 18:13 UTC
- **Last Updated**: May 19, 2025 at 18:50 UTC
- **Reserved Date**: May 07, 2025 at 09:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Elbisnero WordPress Events Calendar Registration & Tickets allows Object Injection.This issue affects WordPress Events Calendar Registration & Tickets: from n/a through 2.6.0.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Elbisnero - WordPress Events Calendar Registration & Tickets**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wpeventplus/vulnerability/wordpress-wordpress-events-calendar-registration-tickets-plugin-2-6-0-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4053
- **State**: PUBLISHED
- **Published Date**: October 22, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 22, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in an unspecified logging function in oninit.exe in IBM Informix Dynamic Server (IDS) 11.10 before 11.10.xC2W2 and 11.50 before 11.50.xC1 allows remote authenticated users to execute arbitrary code via a crafted EXPLAIN directive, aka idsdb00154125 and idsdb00154243.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-10-216/)
2. [ADV-2010-2734](http://www.vupen.com/english/advisories/2010/2734)
3. [68705](http://www.osvdb.org/68705)
4. [41913](http://secunia.com/advisories/41913)
5. [ibm-ids-oninit-bo(62619)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62619) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34896
- **State**: PUBLISHED
- **Published Date**: January 13, 2022 at 21:43 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14863.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Bentley - View**
Affected versions:
- 10.15.0.75 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0002)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1485/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1133
- **State**: PUBLISHED
- **Published Date**: November 05, 2019 at 20:03 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code via plugins/ExtendedFileManager/backend.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CVE-2011-1133](https://security-tracker.debian.org/tracker/CVE-2011-1133)
2. [](https://blog.s9y.org/archives/224-Important-Security-Update-Serendipity-1.5.5-released.html)
3. [](https://www.openwall.com/lists/oss-security/2011/03/02/5)
4. [611661](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611661) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26039
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:53 UTC
- **Last Updated**: October 07, 2024 at 13:51 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21206
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 19:52 UTC
- **Last Updated**: October 31, 2024 at 13:05 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Oracle Enterprise Command Center Framework**
Affected versions:
- ECC:11 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuoct2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3661
- **State**: PUBLISHED
- **Published Date**: December 08, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote attackers to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter set to adv_password.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [242](http://securityreason.com/securityalert/242)
2. [dell-trumobile-apply-bypass-authentication(23516)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23516)
3. [20051207 Dell TrueMobile 2300 Wireless Broadband Router Authentication Bypass Vulnerability](http://www.idefense.com/application/poi/display?id=348&type=vulnerabilities&flashstatus=true)
4. [1015325](http://securitytracker.com/id?1015325)
5. [17936](http://secunia.com/advisories/17936)
6. [ADV-2005-2802](http://www.vupen.com/english/advisories/2005/2802)
7. [15770](http://www.securityfocus.com/bid/15770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40876
- **State**: PUBLISHED
- **Published Date**: August 24, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 13:24 UTC
- **Reserved Date**: August 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_add.php via the title parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5885, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5885 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5885
- **State**: PUBLISHED
- **Published Date**: September 12, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 11:55 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Disaster Alert (aka disasterAlert.PDC) application 3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#741337](http://www.kb.cert.org/vuls/id/741337)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19640
- **State**: PUBLISHED
- **Published Date**: March 30, 2021 at 02:25 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. An unauthenticated attacker can reboot the device causing a Denial of Service, via a hidden reboot command to '/media/?action=cmd'.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://xn--sb-lka.org/cve/INSMA.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41807
- **State**: REJECTED
- **Last Updated**: July 26, 2024 at 15:30 UTC
- **Reserved Date**: July 22, 2024 at 13:57 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4331, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4331 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4331
- **State**: REJECTED
- **Published Date**: November 23, 2011 at 11:00 UTC
- **Last Updated**: December 13, 2011 at 10:00 UTC
- **Reserved Date**: November 04, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1251
- **State**: PUBLISHED
- **Published Date**: June 08, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: April 05, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel Record Stack Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40529](http://www.securityfocus.com/bid/40529)
2. [oval:org.mitre.oval:def:6761](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6761)
3. [MS10-038](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-038)
4. [TA10-159B](http://www.us-cert.gov/cas/techalerts/TA10-159B.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44037
- **State**: PUBLISHED
- **Published Date**: November 29, 2022 at 00:00 UTC
- **Last Updated**: April 25, 2025 at 15:36 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights without authenticating allows him to perform multiple attacks, such as attacking wireless network in the product's range.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40715
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 16:40 UTC
- **Last Updated**: March 25, 2025 at 16:53 UTC
- **Reserved Date**: July 09, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A vulnerability in Veeam Backup & Replication Enterprise Manager has been identified, which allows attackers to perform authentication bypass. Attackers must be able to perform Man-in-the-Middle (MITM) attack to exploit this vulnerability.
### Affected Products
**Veeam - Enterprise Manager**
Affected versions:
- 12.2 (Status: affected)
### References
1. [](https://www.veeam.com/kb4682) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2688
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 20, 2024 at 23:38 UTC
- **Reserved Date**: May 12, 2023 at 20:07 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**nickboss - WordPress File Upload**
Affected versions:
- * (Status: affected)
**Unknown - WordPress File Upload Pro**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2915978%40wp-file-upload%2Ftrunk&old=2909107%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=#file2)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6132
- **State**: PUBLISHED
- **Published Date**: December 09, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38968](https://www.exploit-db.com/exploits/38968/)
2. [1034338](http://www.securitytracker.com/id/1034338)
3. [MS15-132](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-132) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2010
- **State**: PUBLISHED
- **Published Date**: July 28, 2022 at 00:10 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: June 06, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds read in compositing in Google Chrome prior to 102.0.5005.115 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1325298)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25)
4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3052
- **State**: PUBLISHED
- **Published Date**: June 21, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 29, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The reverse-proxy feature in IBM Security Access Manager (ISAM) for Web 8.0 with firmware 8.0.0.2 and 8.0.0.3 interprets the jct-nist-compliance parameter in the opposite of the intended manner, which makes it easier for remote attackers to obtain sensitive information by leveraging weak SSL encryption settings that lack NIST SP 800-131A compliance.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676705)
2. [IV61553](http://www-01.ibm.com/support/docview.wss?uid=swg1IV61553)
3. [ibm-isam-cve20143052-encryption(93454)](https://exchange.xforce.ibmcloud.com/vulnerabilities/93454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-7170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-7170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-7170
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 19:14 UTC
- **Last Updated**: May 30, 2025 at 14:22 UTC
- **Reserved Date**: December 29, 2023 at 11:13 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The EventON-RSVP WordPress plugin before 2.9.5 does not sanitise and escape some parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - EventON-RSVP**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/218fb3af-3a40-486f-8ea9-80211a986fb3/)
### Credits
- kauenavarro
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24555
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:24 UTC
- **Last Updated**: January 24, 2025 at 19:03 UTC
- **Reserved Date**: January 23, 2025 at 14:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in SubscriptionDNA.com Subscription DNA allows Stored XSS. This issue affects Subscription DNA: from n/a through 2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**SubscriptionDNA.com - Subscription DNA**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/subscriptiondna/vulnerability/wordpress-subscription-dna-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30586
- **State**: PUBLISHED
- **Published Date**: August 03, 2021 at 19:41 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in dialog box handling in Windows in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html)
2. [](https://crbug.com/1201032)
3. [FEDORA-2021-78b9d84299](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/)
4. [FEDORA-2021-6225d60814](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/)
5. [FEDORA-2021-02b301441f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14567
- **State**: PUBLISHED
- **Published Date**: September 18, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 19:34 UTC
- **Reserved Date**: September 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to an "Illegal Instruction Violation starting at Unknown Symbol @ 0x00000000028c024d called from STDUXPSFile!DllUnregisterServer+0x000000000002e77b."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14567) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1462
- **State**: PUBLISHED
- **Published Date**: April 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:58 UTC
- **Reserved Date**: April 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebID in RSA Security SecurID 5.0 as used by ACE/Agent for Windows, Windows NT and Windows 2000 allows attackers to cause the WebID agent to enter debug mode via a URL containing null characters, which may allow attackers to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#609840](http://www.kb.cert.org/vuls/id/609840)
2. [securid-webid-debug-mode(7399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7399)
3. [3462](http://www.securityfocus.com/bid/3462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26568
- **State**: PUBLISHED
- **Published Date**: February 13, 2025 at 13:53 UTC
- **Last Updated**: February 13, 2025 at 14:06 UTC
- **Reserved Date**: February 12, 2025 at 13:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**jensmueller - Easy Amazon Product Information**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/easy-amazon-product-information/vulnerability/wordpress-easy-amazon-product-information-plugin-4-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0348
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IIS ASP caching problem releases sensitive information when two virtual servers share the same physical directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [Q197003](http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ197003)
2. [930](http://www.osvdb.org/930) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41764
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 16:58 UTC
- **Last Updated**: February 27, 2025 at 20:54 UTC
- **Reserved Date**: August 31, 2023 at 23:13 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [Microsoft Office Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41764) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2973
- **State**: PUBLISHED
- **Published Date**: October 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 19, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2006:0140](http://www.redhat.com/support/errata/RHSA-2006-0140.html)
2. [](http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm)
3. [RHSA-2006:0493](http://www.redhat.com/support/errata/RHSA-2006-0493.html)
4. [17917](http://secunia.com/advisories/17917)
5. [18684](http://secunia.com/advisories/18684)
6. [17261](http://secunia.com/advisories/17261)
7. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170772)
8. [oval:org.mitre.oval:def:10041](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10041)
9. [SUSE-SA:2005:067](http://www.securityfocus.com/advisories/9806)
10. [MDKSA-2006:040](http://www.mandriva.com/security/advisories?name=MDKSA-2006:040)
11. [19369](http://secunia.com/advisories/19369)
12. [21745](http://secunia.com/advisories/21745)
13. [DSA-1018](http://www.debian.org/security/2006/dsa-1018)
14. [19185](http://secunia.com/advisories/19185)
15. [SUSE-SA:2005:068](http://www.securityfocus.com/archive/1/419522/100/0/threaded)
16. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded)
17. [ADV-2005-2173](http://www.vupen.com/english/advisories/2005/2173)
18. [FEDORA-2005-1013](http://www.securityfocus.com/advisories/9555)
19. [USN-219-1](https://usn.ubuntu.com/219-1/)
20. [RHSA-2006:0190](http://www.redhat.com/support/errata/RHSA-2006-0190.html)
21. [15156](http://www.securityfocus.com/bid/15156)
22. [20163](http://www.osvdb.org/20163)
23. [FLSA:157459-1](http://www.securityfocus.com/archive/1/428028/100/0/threaded)
24. [17280](http://secunia.com/advisories/17280)
25. [FEDORA-2005-1007](http://www.securityfocus.com/advisories/9549)
26. [MDKSA-2006:072](http://www.mandriva.com/security/advisories?name=MDKSA-2006:072)
27. [17918](http://secunia.com/advisories/17918)
28. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded)
29. [DSA-1017](http://www.debian.org/security/2006/dsa-1017)
30. [20237](http://secunia.com/advisories/20237)
31. [](http://linux.bkbits.net:8080/linux-2.6/cset%404342df67SNhRx_3FGhUrrU-FXLlQIA)
32. [19374](http://secunia.com/advisories/19374)
33. [RHSA-2006:0191](http://www.redhat.com/support/errata/RHSA-2006-0191.html)
34. [18562](http://secunia.com/advisories/18562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26103
- **State**: PUBLISHED
- **Published Date**: September 25, 2020 at 05:42 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In cPanel before 88.0.3, an insecure site password is used for Mailman on a templated VM (SEC-551).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.cpanel.net/changelogs/88-change-log/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28924
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 17:01 UTC
- **Last Updated**: May 03, 2025 at 00:40 UTC
- **Reserved Date**: March 13, 2024 at 01:26 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Secure Boot Security Feature Bypass Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Secure Boot Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11348
- **State**: PUBLISHED
- **Published Date**: December 04, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Two XSS vulnerabilities are located in the profile edition page of the user panel of the YunoHost 2.7.2 through 2.7.14 web application. By injecting a JavaScript payload, these flaws could be used to manipulate a user's session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.bishopfox.com/news/2018/10/yunohost-2-7-2-to-2-7-14-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3007
- **State**: PUBLISHED
- **Published Date**: April 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:09 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Thor versions 3.9.5.353 and earlier have a vulnerability in the directory search path used to find resources, related to Creative Cloud desktop applications.
### Affected Products
**n/a - Adobe Thor 3.9.5.353 and earlier.**
Affected versions:
- Adobe Thor 3.9.5.353 and earlier. (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/creative-cloud/apsb17-13.html)
2. [97558](http://www.securityfocus.com/bid/97558) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7125
- **State**: PUBLISHED
- **Published Date**: October 26, 2020 at 15:23 UTC
- **Last Updated**: August 04, 2024 at 09:18 UTC
- **Reserved Date**: January 16, 2020 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote escalation of privilege vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
### Affected Products
**n/a - Aruba Airwave Software**
Affected versions:
- Prior to 1.3.2 (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04051en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2139
- **State**: PUBLISHED
- **Published Date**: May 12, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:49 UTC
- **Reserved Date**: May 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The rootpw plugin in rPath Appliance Platform Agent 2 and 3 does not re-validate requests from a browser with a valid administrator session, including requests to change the password, which makes it easier for physically proximate attackers to gain privileges and maintain control over the administrator account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [rootpw-rpath-appliance-privilege-escalation(42394)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42394)
2. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0148)
3. [rootpw-rpath-appliance-csrf(42393)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42393) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6167
- **State**: PUBLISHED
- **Published Date**: January 30, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 05, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple untrusted search path vulnerabilities in Putty beta 0.67 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) UxTheme.dll or (2) ntmarta.dll file in the current working directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/137742/Putty-Beta-0.67-DLL-Hijacking.html)
2. [1036236](http://www.securitytracker.com/id/1036236)
3. [20160706 Re: Putty (beta 0.67) DLL Hijacking Vulnerability](http://www.securityfocus.com/archive/1/538848/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2045
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:36 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Text. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Text. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Oracle Corporation - Text**
Affected versions:
- 12.1.0.2 (Status: affected)
- 12.2.0.1 (Status: affected)
- 18c (Status: affected)
- 19c (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42343
- **State**: PUBLISHED
- **Published Date**: October 26, 2021 at 10:23 UTC
- **Last Updated**: August 04, 2024 at 03:30 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.dask.org/en/latest/changelog.html)
2. [](https://github.com/dask/dask/tags)
3. [](https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4945
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
### Affected Products
**n/a - Adobe Flash Player 29.0.0.171 and earlier versions**
Affected versions:
- Adobe Flash Player 29.0.0.171 and earlier versions (Status: affected)
### References
1. [RHSA-2018:1827](https://access.redhat.com/errata/RHSA-2018:1827)
2. [1041058](http://www.securitytracker.com/id/1041058)
3. [](https://helpx.adobe.com/security/products/flash-player/apsb18-19.html)
4. [GLSA-201806-02](https://security.gentoo.org/glsa/201806-02)
5. [104413](http://www.securityfocus.com/bid/104413) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1825
- **State**: PUBLISHED
- **Published Date**: May 16, 2019 at 01:10 UTC
- **Last Updated**: November 20, 2024 at 17:18 UTC
- **Reserved Date**: December 06, 2018 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries. This vulnerability exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Cisco - Cisco Prime Infrastructure**
Affected versions:
- 3.4 (Status: affected)
### References
1. [20190515 Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject)
2. [108337](http://www.securityfocus.com/bid/108337) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48325
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 00:00 UTC
- **Last Updated**: November 07, 2024 at 15:10 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Portabilis i-Educar 2.8.0 is vulnerable to SQL Injection in the "getDocuments" function of the "InstituicaoDocumentacaoController" class. The "instituicao_id" parameter in "/module/Api/InstituicaoDocumentacao?oper=get&resource=getDocuments&instituicao_id" is not properly sanitized, allowing an unauthenticated remote attacker to inject malicious SQL commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/osvaldotenorio/cve-2024-48325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1437
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:26 UTC
- **Reserved Date**: February 05, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.novell.com/servlet/tidfinder/2963307)
2. [20020820 NOVL-2002-2963307 - PERL Handler Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html)
3. [5522](http://www.securityfocus.com/bid/5522)
4. [netware-perl-directory-traversal(9915)](http://www.iss.net/security_center/static/9915.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0104
- **State**: PUBLISHED
- **Published Date**: February 12, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 07:32 UTC
- **Reserved Date**: January 07, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, aka "Publisher Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBST02314](http://marc.info/?l=bugtraq&m=120361015026386&w=2)
2. [ADV-2008-0514](http://www.vupen.com/english/advisories/2008/0514/references)
3. [SSRT080016](http://marc.info/?l=bugtraq&m=120361015026386&w=2)
4. [MS08-012](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-012)
5. [28906](http://secunia.com/advisories/28906)
6. [1019377](http://www.securitytracker.com/id?1019377)
7. [TA08-043C](http://www.us-cert.gov/cas/techalerts/TA08-043C.html)
8. [oval:org.mitre.oval:def:4547](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4547)
9. [27740](http://www.securityfocus.com/bid/27740) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5118
- **State**: REJECTED
- **Published Date**: January 06, 2021 at 19:31 UTC
- **Last Updated**: January 06, 2021 at 19:31 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-5064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-5064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-5064
- **State**: PUBLISHED
- **Published Date**: March 30, 2011 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 07:24 UTC
- **Reserved Date**: March 30, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues](http://openwall.com/lists/oss-security/2011/03/07/7)
2. [[oss-security] 20110308 Re: ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/08/10)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=682998)
4. [[oss-security] 20110308 Re: ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/08/7)
5. [[oss-security] 20110308 Re: ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/08/3)
6. [](http://reverse.lostrealm.com/protect/ldd.html)
7. [[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues](http://openwall.com/lists/oss-security/2011/03/07/10)
8. [](http://www.catonmat.net/blog/ldd-arbitrary-code-execution/)
9. [[oss-security] 20110307 Re: ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/08/2)
10. [[oss-security] 20110307 ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/07/13)
11. [[oss-security] 20110308 Re: ldd can execute an app unexpectedly](http://openwall.com/lists/oss-security/2011/03/08/1)
12. [RHSA-2011:1526](http://www.redhat.com/support/errata/RHSA-2011-1526.html)
13. [](https://bugzilla.redhat.com/show_bug.cgi?id=531160) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0078
- **State**: PUBLISHED
- **Published Date**: November 17, 2021 at 19:28 UTC
- **Last Updated**: August 03, 2024 at 15:25 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000557
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: April 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OCS Inventory OCS Inventory NG version ocsreports 2.4 contains a Cross Site Scripting (XSS) vulnerability in login form and search functionality that can result in An attacker is able to execute arbitrary (javascript) code within a victims' browser. This attack appear to be exploitable via Victim must open a crafted link to the application. This vulnerability appears to have been fixed in ocsreports 2.4.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.secuvera.de/advisories/secuvera-SA-2017-03.txt)
2. [](https://www.ocsinventory-ng.org/en/ocs-inventory-server-2-4-1-has-been-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6978
- **State**: PUBLISHED
- **Published Date**: December 18, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:17 UTC
- **Reserved Date**: February 14, 2018 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the privileges to root on a vROps machine. Note: the admin user (non-sudoer) should not be confused with root of the vROps machine.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2018-0031.html)
2. [106242](http://www.securityfocus.com/bid/106242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2926
- **State**: PUBLISHED
- **Published Date**: June 09, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:06 UTC
- **Reserved Date**: June 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18312](http://www.securityfocus.com/bid/18312)
2. [wingate-http-proxy-bo(26970)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26970)
3. [1016239](http://securitytracker.com/id?1016239)
4. [20060607 MDaemon NOT vulnerable .. sorry for the advisory.. QBik Wingate is vulnerable](http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046646.html)
5. [20483](http://secunia.com/advisories/20483)
6. [20060607 MDaemon NOT vulnerable .. sorry for the advisory.. QBik Wingate is vulnerable](http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046649.html)
7. [ADV-2006-2182](http://www.vupen.com/english/advisories/2006/2182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3818
- **State**: PUBLISHED
- **Published Date**: February 05, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 19:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The kube-rbac-proxy container before version 0.4.1 as used in Red Hat OpenShift Container Platform does not honor TLS configurations, allowing for use of insecure ciphers and TLS 1.0. An attacker could target traffic sent over a TLS connection with a weak configuration and potentially break the encryption.
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**[UNKNOWN] - kube-rbac-proxy**
Affected versions:
- 0.4.1 (Status: affected)
### References
1. [](https://access.redhat.com/security/cve/CVE-2019-3818)
2. [106744](http://www.securityfocus.com/bid/106744)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3818)
4. [RHBA-2019:0327](https://access.redhat.com/errata/RHBA-2019:0327) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22942
- **State**: PUBLISHED
- **Published Date**: October 18, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**n/a - https://github.com/rails/rails**
Affected versions:
- 6.1.4.1, 6.0.4.1 (Status: affected)
### References
1. [](https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released/)
2. [[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware](http://www.openwall.com/lists/oss-security/2021/12/14/5)
3. [DSA-5372](https://www.debian.org/security/2023/dsa-5372)
4. [](https://security.netapp.com/advisory/ntap-20240202-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36659
- **State**: PUBLISHED
- **Published Date**: September 15, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 18:11 UTC
- **Reserved Date**: June 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OPSWAT MetaDefender KIOSK 4.6.1.9996. Long inputs were not properly processed, which allows remote attackers to cause a denial of service (loss of communication).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.opswat.com/mdkiosk)
2. [](https://docs.opswat.com/mdkiosk/release-notes/cve-2023-36659) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45486
- **State**: PUBLISHED
- **Published Date**: December 25, 2021 at 01:04 UTC
- **Last Updated**: August 04, 2024 at 04:39 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4)
2. [](https://arxiv.org/pdf/2112.09604.pdf)
3. [](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba)
4. [](https://www.oracle.com/security-alerts/cpujul2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13375
- **State**: PUBLISHED
- **Published Date**: May 28, 2019 at 18:33 UTC
- **Last Updated**: October 25, 2024 at 14:07 UTC
- **Reserved Date**: July 06, 2018 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An Improper Neutralization of Script-Related HTML Tags in Fortinet FortiAnalyzer 5.6.0 and below and FortiManager 5.6.0 and below allows an attacker to send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer and FortiManager (with FortiAnalyzer feature enabled).
### Affected Products
**Fortinet - FortiAnalyzer**
Affected versions:
- FortiAnalyzer 5.6.0 and below (Status: affected)
**Fortinet - FortiManager**
Affected versions:
- FortiManager 5.6.0 and below (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-18-121) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3239
- **State**: PUBLISHED
- **Published Date**: April 26, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 22, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2013:160](http://www.mandriva.com/security/advisories?name=MDVSA-2013:160)
2. [20130424 [waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin](http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html)
3. [FEDORA-2013-6928](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html)
4. [openSUSE-SU-2013:1065](http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html)
5. [](https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48)
6. [FEDORA-2013-6977](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html)
7. [](http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php)
8. [FEDORA-2013-7000](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html)
9. [](https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a)
10. [](https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20847
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 13:31 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mattermost Server before 5.18.0. An attacker can send a user_typing WebSocket event to any channel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mattermost.com/security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3634
- **State**: PUBLISHED
- **Published Date**: August 04, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:39 UTC
- **Reserved Date**: July 17, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) __futex_atomic_op and (2) futex_atomic_cmpxchg_inatomic functions in Linux kernel 2.6.17-rc4 to 2.6.18-rc2 perform the atomic futex operation in the kernel address space instead of the user address space, which allows local users to cause a denial of service (crash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bafe00cc9297ca77b66e5c83e5e65e17c0c997c8)
2. [](http://security-tracker.debian.org/tracker/CVE-2006-3634) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6359
- **State**: PUBLISHED
- **Published Date**: January 18, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 21:28 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.11, 6.2.1 before 6.2.1.3, and 6.2.2 before 6.2.2.2 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.2.0 before 6.2.0.11, 6.2.1 before 6.2.1.3, and 6.2.2 before 6.2.2.2 do not check whether an OpenID attribute is signed in the (1) SREG (aka simple registration extension) and (2) AX (aka attribute exchange extension) cases, which allows man-in-the-middle attackers to spoof OpenID provider data by inserting unsigned attributes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [tfim-openid-weak-security(77790)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77790)
2. [51212](http://secunia.com/advisories/51212)
3. [IV23452](http://www-01.ibm.com/support/docview.wss?uid=swg1IV23452)
4. [IV23453](http://www-01.ibm.com/support/docview.wss?uid=swg1IV23453)
5. [56390](http://www.securityfocus.com/bid/56390)
6. [](http://www-01.ibm.com/support/docview.wss?uid=swg21615748)
7. [IV23451](http://www-01.ibm.com/support/docview.wss?uid=swg1IV23451)
8. [](http://www-01.ibm.com/support/docview.wss?uid=swg21615744) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6754
- **State**: PUBLISHED
- **Published Date**: July 25, 2012 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: July 25, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ipalloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD does not properly allocate memory, which makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, related to "integer rounding and overflow" errors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://svnweb.freebsd.org/base?view=revision&revision=167872)
2. [](http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28647
- **State**: PUBLISHED
- **Published Date**: March 30, 2023 at 18:12 UTC
- **Last Updated**: February 11, 2025 at 18:57 UTC
- **Reserved Date**: March 20, 2023 at 12:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-281: Security Weakness
- CWE-287: Improper Authentication
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 4.7.0 (Status: affected)
### References
1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6)
2. [https://github.com/nextcloud/ios/pull/2344](https://github.com/nextcloud/ios/pull/2344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11270
- **State**: PUBLISHED
- **Published Date**: February 22, 2021 at 06:25 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible denial of service due to RTT responder consistently rejects all FTMR by transmitting FTM1 with failure status in the FTM parameter IE in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- AQT1000, AR7420, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5018, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, PM3003A, PM4125, PM4250, PM456, PM6125, PM6150, PM6150A, PM6150L, PM6250, PM6350, PM640A, PM640L, PM640P, PM660, PM660A, PM660L, PM670, PM670A, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8005, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350C, PM855, PM855A, PM855B, PM855L, PM855P, PM8998, PMC1000H, PMD9655, PME605, PMI632, PMI8998, PMK8002, PMK8003, PMK8350, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMP8074, PMR525, PMR735A, PMR735B, PMX24, PMX50, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA1062, Q ...[truncated*] (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14588
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:36 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 10.3.6.0.0 (Status: affected)
- 12.1.3.0.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31137
- **State**: PUBLISHED
- **Published Date**: July 08, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 17:51 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**hap-wi - roxy-wi**
Affected versions:
- < 6.1.1.0 (Status: affected)
### References
1. [](https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-53r2-mq99-f532)
2. [](https://github.com/hap-wi/roxy-wi/commit/82666df1e60c45dd6aa533b01a392f015d32f755)
3. [](http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html)
4. [](http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html)
5. [](http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html)
6. [](http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2192
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35976
- **State**: PUBLISHED
- **Published Date**: July 05, 2023 at 14:47 UTC
- **Last Updated**: December 04, 2024 at 15:39 UTC
- **Reserved Date**: June 20, 2023 at 18:41 UTC
- **Assigned By**: hpe
### Vulnerability Description
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central**
Affected versions:
- - ArubaOS 10.4.x.x: 10.4.0.1 and below (Status: affected)
- - ArubaOS 8.11.x.x: 8.11.1.0 and below (Status: affected)
- - ArubaOS 8.10.x.x: 8.10.0.6 and below (Status: affected)
- - ArubaOS 8.6.x.x: 8.6.0.20 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt)
### Credits
- Erik de Jong (bugcrowd.com/erikdejong) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1091
- **State**: PUBLISHED
- **Published Date**: February 26, 2007 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 7 allows remote attackers to prevent users from leaving a site, spoof the address bar, and conduct phishing and other attacks via onUnload Javascript handlers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://lcamtuf.coredump.cx/ietrap)
2. [22680](http://www.securityfocus.com/bid/22680)
3. [ADV-2007-0713](http://www.vupen.com/english/advisories/2007/0713)
4. [20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)](http://www.securityfocus.com/archive/1/461023/100/0/threaded)
5. [ie-mozilla-onunload-dos(32647)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32647)
6. [HPSBST02280](http://www.securityfocus.com/archive/1/482366/100/0/threaded)
7. [23014](http://secunia.com/advisories/23014)
8. [SSRT071480](http://www.securityfocus.com/archive/1/482366/100/0/threaded)
9. [ie-mozilla-onunload-url-spoofing(32649)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32649)
10. [oval:org.mitre.oval:def:2162](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2162)
11. [20070223 Secunia Research: Internet Explorer 7 "onunload" Event SpoofingVulnerability](http://www.securityfocus.com/archive/1/461027/100/0/threaded)
12. [1018788](http://securitytracker.com/id?1018788)
13. [2291](http://securityreason.com/securityalert/2291)
14. [20070223 MSIE7 browser entrapment vulnerability (probably Firefox, too)](http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052630.html)
15. [MS07-057](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057)
16. [TA07-282A](http://www.us-cert.gov/cas/techalerts/TA07-282A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54306
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:25 UTC
- **Last Updated**: December 13, 2024 at 17:39 UTC
- **Reserved Date**: December 02, 2024 at 12:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in KCT AIKCT Engine Chatbot, ChatGPT, Gemini, GPT-4o Best AI Chatbot allows Cross Site Request Forgery.This issue affects AIKCT Engine Chatbot, ChatGPT, Gemini, GPT-4o Best AI Chatbot: from n/a through 1.6.2.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**KCT - AIKCT Engine Chatbot, ChatGPT, Gemini, GPT-4o Best AI Chatbot**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ai-seo-translator/vulnerability/wordpress-aikct-engine-chatbot-chatgpt-gemini-gpt-4o-best-ai-chatbot-plugin-1-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24195
- **State**: PUBLISHED
- **Published Date**: May 14, 2021 at 11:38 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Login as User or Customer (User Switching) WordPress plugin before 1.8, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**wp-buy - Login as User or Customer (User Switching)**
Affected versions:
- 1.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c)
### Credits
- Bugbang |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1204
- **State**: PUBLISHED
- **Published Date**: May 23, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 02:02 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Memory leak in the SNMP process in Cisco IOS XR allows remote attackers to cause a denial of service (memory consumption or process reload) by sending many port-162 UDP packets, aka Bug ID CSCug80345.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130522 Cisco IOS XR Software SNMP Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0737
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5326, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5326
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 10:59 UTC
- **Last Updated**: August 01, 2024 at 21:11 UTC
- **Reserved Date**: May 24, 2024 at 16:37 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**wpxpo - Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/07a3db33-3787-4b63-835d-8e3026206842?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L160)
3. [](https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L177)
4. [](https://plugins.trac.wordpress.org/changeset/3093815/)
### Credits
- 1337_Wannabe |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1609
- **State**: PUBLISHED
- **Published Date**: April 04, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 04, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Hitachi XFIT/S, XFIT/S/JCA, XFIT/S/ZGN, and XFIT/S ZENGIN TCP/IP Procedure allows remote attackers to cause a denial of service (server process and transfer control process stop) when the products "receive data unexpectedly".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17329](http://www.securityfocus.com/bid/17329)
2. [19472](http://secunia.com/advisories/19472)
3. [xfits-data-dos(25567)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25567)
4. [](http://www.hitachi-support.com/security_e/vuls_e/HS06-004_e/index-e.html)
5. [24309](http://www.osvdb.org/24309) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5657
- **State**: PUBLISHED
- **Published Date**: January 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 05:40 UTC
- **Reserved Date**: January 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title_icon parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9010)
2. [](https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0246
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 16:07 UTC
- **Last Updated**: January 08, 2025 at 15:54 UTC
- **Reserved Date**: January 06, 2025 at 14:49 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When using an invalid protocol scheme, an attacker could spoof the address bar.
*Note: This issue only affected Android operating systems. Other operating systems are unaffected.*
*Note: This issue is a different issue from CVE-2025-0244. This vulnerability affects Firefox < 134.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1912709)
2. [](https://www.mozilla.org/security/advisories/mfsa2025-01/)
### Credits
- James Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4769
- **State**: PUBLISHED
- **Published Date**: January 09, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2008:004](http://www.mandriva.com/security/advisories?name=MDVSA-2008:004)
2. [DSA-1460](http://www.debian.org/security/2008/dsa-1460)
3. [27163](http://www.securityfocus.com/bid/27163)
4. [](https://issues.rpath.com/browse/RPL-1768)
5. [RHSA-2008:0038](http://www.redhat.com/support/errata/RHSA-2008-0038.html)
6. [28454](http://secunia.com/advisories/28454)
7. [20080107 PostgreSQL 2007-01-07 Cumulative Security Release](http://www.securityfocus.com/archive/1/485864/100/0/threaded)
8. [28359](http://secunia.com/advisories/28359)
9. [](http://www.postgresql.org/about/news.905)
10. [SUSE-SA:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html)
11. [ADV-2008-0061](http://www.vupen.com/english/advisories/2008/0061)
12. [28679](http://secunia.com/advisories/28679)
13. [ADV-2008-0109](http://www.vupen.com/english/advisories/2008/0109)
14. [28376](http://secunia.com/advisories/28376)
15. [](http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894)
16. [103197](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1)
17. [28437](http://secunia.com/advisories/28437)
18. [28455](http://secunia.com/advisories/28455)
19. [28477](http://secunia.com/advisories/28477)
20. [29638](http://secunia.com/advisories/29638)
21. [28479](http://secunia.com/advisories/28479)
22. [](http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894)
23. [DSA-1463](http://www.debian.org/security/2008/dsa-1463)
24. [RHSA-2008:0040](http://www.redhat.com/support/errata/RHSA-2008-0040.html)
25. [20080115 rPSA-2008-0016-1 postgresql postgresql-server](http://www.securityfocus.com/archive/1/486407/100/0/threaded)
26. [28464](http://secunia.com/advisories/28464)
27. [28698](http://secunia.com/advisories/28698)
28. [SSRT080006](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154)
29. [200559](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1)
30. [USN-568-1](https://usn.ubuntu.com/568-1/)
31. [FEDORA-2008-0552](https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html)
32. [28438](http://secunia.com/advisories/28438)
33. [postgresql-backref-dos(39499)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39499)
34. [1019157](http://securitytracker.com/id?1019157)
35. [FEDORA-2008-0478](https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html)
36. [HPSBTU02325](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154)
37. [GLSA-200801-15](http://security.gentoo.org/glsa/glsa-200801-15.xml)
38. [ADV-2008-1071](http://www.vupen.com/english/advisories/2008/1071/references)
39. [oval:org.mitre.oval:def:9804](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3476
- **State**: PUBLISHED
- **Published Date**: November 03, 2005 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in HP OpenVMS Integrity 8.2-1 and 8.2, and OpenVMS Alpha 7.3-2 and 8.2, allows local users to cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2275](http://www.vupen.com/english/advisories/2005/2275)
2. [HPSBOV01239](http://www.securityfocus.com/archive/1/415464)
3. [1015128](http://securitytracker.com/id?1015128)
4. [15261](http://www.securityfocus.com/bid/15261)
5. [SSRT051029](http://www.securityfocus.com/archive/1/415464)
6. [17402](http://secunia.com/advisories/17402)
7. [20487](http://www.osvdb.org/20487)
8. [openvms-unknown-dos(22939)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22939) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21011
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: February 13, 2025 at 17:32 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u401 (Status: affected)
- Oracle Java SE:8u401-perf (Status: affected)
- Oracle Java SE:11.0.22 (Status: affected)
- Oracle Java SE:17.0.10 (Status: affected)
- Oracle Java SE:21.0.2 (Status: affected)
- Oracle Java SE:22 (Status: affected)
- Oracle GraalVM for JDK:17.0.10 (Status: affected)
- Oracle GraalVM for JDK:21.0.2 (Status: affected)
- Oracle GraalVM for JDK:22 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.13 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.9 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html)
2. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html)
3. [](https://security.netapp.com/advisory/ntap-20240426-0004/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8788
- **State**: PUBLISHED
- **Published Date**: November 29, 2018 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:28 UTC
- **Reserved Date**: March 19, 2018 at 00:00 UTC
- **Assigned By**: checkpoint
### Vulnerability Description
FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Check Point Software Technologies Ltd. - FreeRDP**
Affected versions:
- All versions prior to 2.0.0-rc4 (Status: affected)
### References
1. [106938](http://www.securityfocus.com/bid/106938)
2. [[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update](https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html)
3. [USN-3845-1](https://usn.ubuntu.com/3845-1/)
4. [](https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/)
5. [](https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659)
6. [RHSA-2019:0697](https://access.redhat.com/errata/RHSA-2019:0697)
7. [USN-3845-2](https://usn.ubuntu.com/3845-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15862
- **State**: PUBLISHED
- **Published Date**: February 23, 2018 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 01:06 UTC
- **Reserved Date**: October 24, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Qualcomm products with Android releases from CAF using the Linux kernel, in wma_unified_link_radio_stats_event_handler(), the number of radio channels coming from firmware is not properly validated, potentially leading to an integer overflow vulnerability followed by a buffer overflow.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-02-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0967
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3204](http://www.securityfocus.com/bid/3204)
2. [20010817 Arkeia Possible remote root & information leakage](http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8110
- **State**: PUBLISHED
- **Published Date**: November 05, 2019 at 22:17 UTC
- **Last Updated**: August 04, 2024 at 21:10 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can leverage email templates hierarchy to manipulate the interceptor class in a way that allows an attacker to execute arbitrary code.
### Affected Products
**Adobe Systems Incorporated - Magento 2**
Affected versions:
- Magento 2.2 prior to 2.2.10 (Status: affected)
- Magento 2.3 prior to 2.3.3 or 2.3.2-p1 (Status: affected)
### References
1. [](https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24821
- **State**: PUBLISHED
- **Published Date**: April 08, 2022 at 18:55 UTC
- **Last Updated**: April 22, 2025 at 18:17 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those. This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6. There's no easy workaround for this issue, administrators should upgrade their wiki.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-648: Security Weakness
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- > 3.1M1 (Status: affected)
### References
1. [](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h)
2. [](https://jira.xwiki.org/browse/XWIKI-19155) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20060
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 15:20 UTC
- **Last Updated**: November 15, 2024 at 15:38 UTC
- **Reserved Date**: October 27, 2022 at 18:47 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Prime Collaboration Deployment could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Cisco plans to release software updates that address this vulnerability. There are no workarounds that address this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Prime Collaboration Deployment**
Affected versions:
- 11.5(1) (Status: affected)
- 11.0(1a) (Status: affected)
- 11.5(1)SU1 (Status: affected)
- 10.5(3) (Status: affected)
- 12.6(1) (Status: affected)
- 11.0(1) (Status: affected)
- 11.6(2) (Status: affected)
- 12.1(1) (Status: affected)
- 12.0(1a) (Status: affected)
- 11.5(3) (Status: affected)
- 10.5(1) (Status: affected)
- 12.5(1) (Status: affected)
- 11.5(2) (Status: affected)
- 11.6(1) (Status: affected)
- 10.5(2) (Status: affected)
- 10.5(3)SU1 (Status: affected)
- 14 (Status: affected)
- 14SU1 (Status: affected)
- 14SU2 (Status: affected)
### References
1. [cisco-sa-pcd-xss-jDXpjm7](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pcd-xss-jDXpjm7) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.