System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7792
- **State**: PUBLISHED
- **Published Date**: May 22, 2019 at 14:12 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html)
2. [108320](http://www.securityfocus.com/bid/108320) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23130
- **State**: PUBLISHED
- **Published Date**: March 04, 2021 at 17:37 UTC
- **Last Updated**: September 17, 2024 at 02:21 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: Joomla
### Vulnerability Description
An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of feed fields could lead to xss issues.
### Affected Products
**Joomla! Project - Joomla! CMS**
Affected versions:
- 2.5.0-3.9.24 (Status: affected)
### References
1. [](https://developer.joomla.org/security-centre/844-20210304-core-xss-within-the-feed-parser-library.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6034
- **State**: REJECTED
- **Published Date**: November 20, 2007 at 11:00 UTC
- **Last Updated**: November 28, 2007 at 10:00 UTC
- **Reserved Date**: November 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11483
- **State**: PUBLISHED
- **Published Date**: February 08, 2020 at 04:50 UTC
- **Last Updated**: September 16, 2024 at 18:17 UTC
- **Reserved Date**: April 23, 2019 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L`
### Affected Products
**Canonical - apport**
Affected versions:
- 2.14.1 (Status: affected)
- 2.20.1 (Status: affected)
- 2.20.9 (Status: affected)
- 2.20.11 (Status: affected)
### References
1. [](https://usn.ubuntu.com/usn/usn-4171-1)
2. [](https://usn.ubuntu.com/usn/usn-4171-2)
### Credits
- Sander Bos |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6439
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 03:14 UTC
- **Reserved Date**: December 26, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3154
- **State**: PUBLISHED
- **Published Date**: June 22, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.pl in Ultimate Estate 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ultimate-estate-index-sql-injection(27273)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27273)
2. [26740](http://www.osvdb.org/26740)
3. [ADV-2006-2475](http://www.vupen.com/english/advisories/2006/2475)
4. [1016353](http://securitytracker.com/id?1016353)
5. [](http://pridels0.blogspot.com/2006/06/ultimate-estate-vuln.html)
6. [18573](http://www.securityfocus.com/bid/18573)
7. [20761](http://secunia.com/advisories/20761) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3559
- **State**: PUBLISHED
- **Published Date**: May 25, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 20, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644)
2. [53425](http://secunia.com/advisories/53425)
3. [openSUSE-SU-2013:0911](http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html)
4. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540)
5. [oval:org.mitre.oval:def:16228](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228)
6. [RHSA-2014:0341](http://rhn.redhat.com/errata/RHSA-2014-0341.html)
7. [54425](http://secunia.com/advisories/54425)
8. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644)
9. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231)
10. [GLSA-201308-05](http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml)
11. [openSUSE-SU-2013:1086](http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html)
12. [](http://www.wireshark.org/security/wnpa-sec-2013-27.html)
13. [DSA-2700](http://www.debian.org/security/2013/dsa-2700)
14. [openSUSE-SU-2013:0947](http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html)
15. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541)
16. [openSUSE-SU-2013:1084](http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0848
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 23:06 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An information disclosure vulnerability in the Android media framework (libeffects). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64477217.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 5.0.2 (Status: affected)
- 5.1.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1976
- **State**: PUBLISHED
- **Published Date**: April 27, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 08:41 UTC
- **Reserved Date**: April 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Drupal modules (1) Internationalization (i18n) 5.x before 5.x-2.3 and 5.x-1.1 and 6.x before 6.x-1.0 beta 1; and (2) Localizer 5.x before 5.x-3.4, 5.x-2.1, and 5.x-1.11; allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-1352](http://www.vupen.com/english/advisories/2008/1352/references)
2. [internationalization-localizer-xss(41977)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41977)
3. [](http://drupal.org/node/250344)
4. [28916](http://www.securityfocus.com/bid/28916)
5. [29961](http://secunia.com/advisories/29961) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4816
- **State**: PUBLISHED
- **Published Date**: April 27, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 07:17 UTC
- **Reserved Date**: April 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in api/download_checker.php in MegaLab The Uploader 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [theuploader-filename-dir-traversal(54974)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54974)
2. [10599](http://www.exploit-db.com/exploits/10599)
3. [61270](http://osvdb.org/61270)
4. [37873](http://secunia.com/advisories/37873) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28127, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28127 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28127
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 21:07 UTC
- **Reserved Date**: March 10, 2023 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A path traversal vulnerability exists in Avalanche version 6.3.x and below that when exploited could result in possible information disclosure.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - Avalanche**
Affected versions:
- Avalanche version 6.3.x and below (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/ZDI-CAN-17769-Ivanti-Avalanche-getLogFile-Directory-Traversal-Information-Disclosure?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36139
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 00:00 UTC
- **Last Updated**: October 17, 2024 at 17:58 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In PHPJabbers Cleaning Business Software 1.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.phpjabbers.com/cleaning-business-software/)
2. [](https://medium.com/%40bcksec/multiple-vulnerabilities-in-php-jabbers-scripts-25af4afcadd4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13415
- **State**: PUBLISHED
- **Published Date**: August 13, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 09:00 UTC
- **Reserved Date**: July 06, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Plex Media Server 1.13.2.5154, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Remote, unauthenticated attackers can use this vulnerability to: (1) Access arbitrary files from the filesystem with the same permission as the user account running Plex, (2) Initiate SMB connections to capture a NetNTLM challenge/response and crack to cleartext password, or (3) Initiate SMB connections to relay a NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45146](https://www.exploit-db.com/exploits/45146/)
2. [20180802 (CVE-2018-13415) Out-of-Band XXE in Plex Media Server](http://seclists.org/fulldisclosure/2018/Aug/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0180
- **State**: PUBLISHED
- **Published Date**: June 11, 2020 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In GetOpusHeaderBuffers() of OpusHeader.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142861738
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30945
- **State**: PUBLISHED
- **Published Date**: May 17, 2022 at 14:05 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.
### Affected Products
**Jenkins project - Jenkins Pipeline: Groovy Plugin**
Affected versions:
- unspecified (Status: affected)
- 2683.2687.vb_0cc3f973f06 (Status: unaffected)
- 2.94.4 (Status: unaffected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-359)
2. [[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/05/17/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1357
- **State**: PUBLISHED
- **Published Date**: December 17, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: December 14, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SSH2 servers and clients do not properly handle packets or data elements with incorrect length specifiers, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code, as demonstrated by the SSHredder SSH protocol test suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1005812](http://securitytracker.com/id?1005812)
2. [CA-2002-36](http://www.cert.org/advisories/CA-2002-36.html)
3. [oval:org.mitre.oval:def:5849](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5849)
4. [VU#389665](http://www.kb.cert.org/vuls/id/389665)
5. [ssh-transport-length-bo(10868)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10868)
6. [20021216 R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html)
7. [6405](http://www.securityfocus.com/bid/6405)
8. [1005813](http://securitytracker.com/id?1005813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0664
- **State**: PUBLISHED
- **Published Date**: February 08, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019316](http://www.securitytracker.com/id?1019316)
2. [](http://wordpress.org/development/2008/02/wordpress-233/)
3. [28823](http://secunia.com/advisories/28823)
4. [28920](http://secunia.com/advisories/28920)
5. [ADV-2008-0448](http://www.vupen.com/english/advisories/2008/0448)
6. [FEDORA-2008-1559](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00416.html)
7. [FEDORA-2008-1512](https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00349.html)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=431547)
9. [30960](http://secunia.com/advisories/30960)
10. [DSA-1601](http://www.debian.org/security/2008/dsa-1601)
11. [](http://www.village-idiot.org/archives/2008/02/02/wordpress-232-exploit-confirmed/)
12. [27669](http://www.securityfocus.com/bid/27669) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5678
- **State**: PUBLISHED
- **Published Date**: December 03, 2020 at 11:15 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Stored cross-site scripting vulnerability in GROWI v3.8.1 and earlier allows remote attackers to inject arbitrary script via unspecified vectors.
### Affected Products
**WESEEK, Inc. - GROWI**
Affected versions:
- v3.8.1 and earlier (Status: affected)
### References
1. [](https://github.com/weseek/growi)
2. [](https://hub.docker.com/r/weseek/growi/)
3. [](https://jvn.jp/en/jp/JVN56450373/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48445
- **State**: PUBLISHED
- **Published Date**: February 04, 2025 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 14:49 UTC
- **Reserved Date**: October 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstorm.news/files/id/188996/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35175
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 22:05 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 10, 2024 at 14:24 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
sshpiper is a reverse proxy for sshd. Starting in version 1.0.50 and prior to version 1.3.0, the way the proxy protocol listener is implemented in sshpiper can allow an attacker to forge their connecting address. Commit 2ddd69876a1e1119059debc59fe869cb4e754430 added the proxy protocol listener as the only listener in sshpiper, with no option to toggle this functionality off. This means that any connection that sshpiper is directly (or in some cases indirectly) exposed to can use proxy protocol to forge its source address. Any users of sshpiper who need logs from it for whitelisting/rate limiting/security investigations could have them become much less useful if an attacker is sending a spoofed source address. Version 1.3.0 contains a patch for the issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**tg123 - sshpiper**
Affected versions:
- >= 1.0.50, < 1.3.0 (Status: affected)
### References
1. [https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52](https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52)
2. [https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430](https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430)
3. [https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53](https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6607
- **State**: PUBLISHED
- **Published Date**: December 11, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 01:36 UTC
- **Reserved Date**: August 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93257](http://www.securityfocus.com/bid/93257)
2. [](https://www.phpmyadmin.net/security/PMASA-2016-30)
3. [GLSA-201701-32](https://security.gentoo.org/glsa/201701-32)
4. [[debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7645
- **State**: PUBLISHED
- **Published Date**: May 02, 2020 at 15:25 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of chrome-launcher allow execution of arbitrary commands, by controlling the $HOME environment variable in Linux operating systems.
### Affected Products
**n/a - chrome-launcher**
Affected versions:
- All versions (Status: affected)
### References
1. [](http://snyk.io/vuln/SNYK-JS-CHROMELAUNCHER-537575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3767
- **State**: PUBLISHED
- **Published Date**: November 13, 2017 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 01:27 UTC
- **Reserved Date**: December 16, 2016 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A local privilege escalation vulnerability was identified in the Realtek audio driver versions prior to 6.0.1.8224 in some Lenovo ThinkPad products. An attacker with local privileges could execute code with administrative privileges.
### Affected Products
**Lenovo Group Ltd. - Realtek Audio Driver**
Affected versions:
- Earlier than 6.0.1.8224 (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/LEN-15759) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37148
- **State**: PUBLISHED
- **Published Date**: July 10, 2024 at 19:18 UTC
- **Last Updated**: November 19, 2024 at 14:15 UTC
- **Reserved Date**: June 03, 2024 at 17:29 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in some AJAX scripts to alter another user account data and take control of it. Upgrade to 10.0.16.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 0.84, < 10.0.16 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj](https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34104
- **State**: PUBLISHED
- **Published Date**: June 06, 2023 at 17:35 UTC
- **Last Updated**: August 02, 2024 at 16:01 UTC
- **Reserved Date**: May 25, 2023 at 21:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
- CWE-1333: Security Weakness
### Affected Products
**NaturalIntelligence - fast-xml-parser**
Affected versions:
- >= 4.1.3, < 4.2.4 (Status: affected)
### References
1. [https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw](https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw)
2. [https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c](https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c)
3. [https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b](https://github.com/NaturalIntelligence/fast-xml-parser/commit/a4bdced80369892ee413bf08e28b78795a2b0d5b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5983
- **State**: PUBLISHED
- **Published Date**: November 20, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 20:12 UTC
- **Reserved Date**: November 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in JBMC Software DirectAdmin 1.28.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) user parameter to (a) CMD_SHOW_RESELLER or (b) CMD_SHOW_USER in the Admin level; the (2) TYPE parameter to (c) CMD_TICKET_CREATE or (d) CMD_TICKET, the (3) user parameter to (e) CMD_EMAIL_FORWARDER_MODIFY, (f) CMD_EMAIL_VACATION_MODIFY, or (g) CMD_FTP_SHOW, and the (4) name parameter to (h) CMD_EMAIL_LIST in the User level; or the (5) user parameter to (i) CMD_SHOW_USER in the Reseller level.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21049](http://www.securityfocus.com/bid/21049)
2. [directadmin-user-xss(30256)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30256)
3. [](http://aria-security.net/advisory/directadmin.txt)
4. [20061112 DirectAdmin Multiple Cross Site Scription](http://www.securityfocus.com/archive/1/451376/100/0/threaded)
5. [1885](http://securityreason.com/securityalert/1885) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32978
- **State**: PUBLISHED
- **Published Date**: June 10, 2022 at 14:49 UTC
- **Last Updated**: August 03, 2024 at 07:54 UTC
- **Reserved Date**: June 10, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/thorfdbg/libjpeg/issues/75)
2. [](https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49434
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:53 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'list' parameter at /goform/SetNetControlList.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1197
- **State**: PUBLISHED
- **Published Date**: February 19, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [71914](http://www.securityfocus.com/bid/71914)
2. [MDVSA-2015:066](http://www.mandriva.com/security/advisories?name=MDVSA-2015:066)
3. [[oss-security] 20150118 Re: CVE Request: cpio -- directory traversal](http://www.openwall.com/lists/oss-security/2015/01/18/7)
4. [USN-2906-1](http://www.ubuntu.com/usn/USN-2906-1)
5. [](http://advisories.mageia.org/MGASA-2015-0080.html)
6. [[oss-security] 20150108 Directory traversals in cpio and friends?](http://www.openwall.com/lists/oss-security/2015/01/07/5)
7. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669)
8. [[Bug-cpio] 20150108 cpio: directory traversal vulnerability via symlinks](https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html)
9. [](http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html)
10. [[oss-security] 20231221 Security vulnerability in Debian's cpio 2.13](http://www.openwall.com/lists/oss-security/2023/12/21/8)
11. [[oss-security] 20231227 xarchiver: Path traversal with crafted cpio archives](http://www.openwall.com/lists/oss-security/2023/12/27/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25244
- **State**: PUBLISHED
- **Published Date**: March 07, 2022 at 21:41 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, 1.8.9 and 1.7.10.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://discuss.hashicorp.com)
2. [](https://discuss.hashicorp.com/t/hcsec-2022-08-vault-enterprise-s-tokenization-transform-configuration-endpoint-may-expose-transform-key/36599) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1302
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The change password option in the Windows Security interface for Windows 2000 allows attackers to use the option to attempt to change passwords of other users on other systems or identify valid accounts by monitoring error messages, possibly due to a problem in the NetuserChangePassword function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010718 Changing NT/2000 accounts password from the command line](http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1911)
2. [3063](http://www.securityfocus.com/bid/3063)
3. [win2k-change-network-passwords(6876)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6876) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0428
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3936](http://www.osvdb.org/3936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14207
- **State**: REJECTED
- **Published Date**: March 06, 2020 at 23:50 UTC
- **Last Updated**: March 06, 2020 at 23:50 UTC
- **Reserved Date**: September 07, 2017 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47878
- **State**: PUBLISHED
- **Published Date**: May 02, 2023 at 00:00 UTC
- **Last Updated**: January 30, 2025 at 15:46 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf)
2. [](http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19018
- **State**: PUBLISHED
- **Published Date**: February 12, 2019 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:32 UTC
- **Reserved Date**: November 06, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**ICS-CERT - CX-Supervisor**
Affected versions:
- Versions 3.42 and prior (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24235
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:24 UTC
- **Last Updated**: April 01, 2025 at 13:19 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122373)
2. [](https://support.apple.com/en-us/122374)
3. [](https://support.apple.com/en-us/122375) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2770
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 11:50 UTC
- **Last Updated**: April 15, 2025 at 13:52 UTC
- **Reserved Date**: August 11, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Book Store System. Affected is an unknown function of the file /obs/book.php. The manipulation of the argument bookisbn leads to sql injection. It is possible to launch the attack remotely. VDB-206166 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Simple Online Book Store System**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.206166) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45845
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 14:42 UTC
- **Last Updated**: May 23, 2025 at 16:01 UTC
- **Reserved Date**: November 23, 2022 at 07:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Nextend Smart Slider 3.This issue affects Smart Slider 3: from n/a through 3.5.1.9.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Nextend - Smart Slider 3**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/smart-slider-3/wordpress-smart-slider-3-plugin-3-5-1-9-auth-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6652
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: August 21, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40075
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 00:00 UTC
- **Last Updated**: December 02, 2024 at 17:59 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Laravel v11.x was discovered to contain an XML External Entity (XXE) vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29596
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 21:36 UTC
- **Last Updated**: August 04, 2024 at 16:55 UTC
- **Reserved Date**: December 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MiniWeb HTTP server 0.8.19 allows remote attackers to cause a denial of service (daemon crash) via a long name for the first parameter in a POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/projects/miniweb/files/miniweb/0.8/)
2. [](https://packetstormsecurity.com/files/160470/MiniWeb-HTTP-Server-0.8.19-Buffer-Overflow.html)
3. [](https://www.exploit-db.com/exploits/49247)
4. [](https://securityforeveryone.com/blog/miniweb-http-server-vulnerability-0-day-cve-2020-29596) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27279
- **State**: PUBLISHED
- **Published Date**: April 10, 2022 at 20:23 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file read via the function sub_177E0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wu610777031/IoT_Hunter/blob/main/Inhand%20InRouter%20900%20Industrial%204G%20Router%20%20Vulnerabilities%28Arbitrary%20File%20Deletion%20and%20Read%29.pdf)
2. [](https://drive.google.com/drive/folders/1MPtl6pGa7GMIT1-jg69YUGSQdVTfbnay?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39267
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:45 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Bifrost is a heterogeneous middleware that synchronizes MySQL, MariaDB to Redis, MongoDB, ClickHouse, MySQL and other services for production environments. Versions prior to 1.8.8-release are subject to authentication bypass in the admin and monitor user groups by deleting the X-Requested-With: XMLHttpRequest field in the request header. This issue has been patched in 1.8.8-release. There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**brokercap - Bifrost**
Affected versions:
- < 1.8.8-release (Status: affected)
### References
1. [](https://github.com/brokercap/Bifrost/security/advisories/GHSA-mxrx-fg8p-5p5j)
2. [](https://github.com/brockercap/Bifrost/pull/201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1531
- **State**: PUBLISHED
- **Published Date**: April 26, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [63535](http://www.osvdb.org/63535)
2. [39206](http://www.securityfocus.com/bid/39206)
3. [](http://redcomponent.com/redshop/redshop-changelog)
4. [12054](http://www.exploit-db.com/exploits/12054)
5. [39343](http://secunia.com/advisories/39343)
6. [redshop-view-file-include(57512)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57512)
7. [](http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4451
- **State**: PUBLISHED
- **Published Date**: September 05, 2012 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: November 15, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wush.net/trac/wikka/ticket/1098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7940
- **State**: PUBLISHED
- **Published Date**: November 09, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 08:06 UTC
- **Reserved Date**: October 22, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:2035](http://rhn.redhat.com/errata/RHSA-2016-2035.html)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
4. [](https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
5. [79091](http://www.securityfocus.com/bid/79091)
6. [openSUSE-SU-2015:1911](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html)
7. [FEDORA-2015-7d95466eda](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html)
8. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html)
9. [RHSA-2016:2036](http://rhn.redhat.com/errata/RHSA-2016-2036.html)
10. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
11. [USN-3727-1](https://usn.ubuntu.com/3727-1/)
12. [[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle](http://www.openwall.com/lists/oss-security/2015/10/22/9)
13. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
14. [1037036](http://www.securitytracker.com/id/1037036)
15. [[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle](http://www.openwall.com/lists/oss-security/2015/10/22/7)
16. [DSA-3417](http://www.debian.org/security/2015/dsa-3417)
17. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
18. [](http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html)
19. [1037046](http://www.securitytracker.com/id/1037046)
20. [1037053](http://www.securitytracker.com/id/1037053)
21. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44757
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 06:13 UTC
- **Last Updated**: September 18, 2024 at 18:09 UTC
- **Reserved Date**: November 04, 2022 at 21:08 UTC
- **Assigned By**: HCL
### Vulnerability Description
BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data in unexpected ways, etc.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**HCL Software - BigFix Insights for Vulnerability Remediation**
Affected versions:
- <=2.0.2 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3862
- **State**: PUBLISHED
- **Published Date**: December 12, 2022 at 17:54 UTC
- **Last Updated**: April 22, 2025 at 14:46 UTC
- **Reserved Date**: November 04, 2022 at 13:56 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Livemesh Addons for Elementor WordPress plugin before 7.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Livemesh Addons for Elementor**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc)
### Credits
- zhangyunpei |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2820
- **State**: PUBLISHED
- **Published Date**: August 12, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 10, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2774, CVE-2014-2826, CVE-2014-2827, and CVE-2014-4063.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1030715](http://www.securitytracker.com/id/1030715)
2. [MS14-051](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051)
3. [ms-ie-cve20142820-code-exec(94977)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94977)
4. [69116](http://www.securityfocus.com/bid/69116)
5. [60670](http://secunia.com/advisories/60670) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6902
- **State**: PUBLISHED
- **Published Date**: December 17, 2023 at 15:31 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 16, 2023 at 19:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in codelyfe Stupid Simple CMS up to 1.2.4 and classified as critical. This vulnerability affects unknown code of the file /file-manager/upload.php. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248260.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**codelyfe - Stupid Simple CMS**
Affected versions:
- 1.2.0 (Status: affected)
- 1.2.1 (Status: affected)
- 1.2.2 (Status: affected)
- 1.2.3 (Status: affected)
- 1.2.4 (Status: affected)
### References
1. [](https://vuldb.com/?id.248260)
2. [](https://vuldb.com/?ctiid.248260)
3. [](https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md)
### Credits
- ggbot (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3394
- **State**: PUBLISHED
- **Published Date**: September 15, 2011 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 23:29 UTC
- **Reserved Date**: September 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in findagent.php in MYRE Real Estate Software allows remote attackers to execute arbitrary SQL commands via the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secpod.org/advisories/SECPOD_MRS_SQL_XSS_Vuln.txt)
2. [8376](http://securityreason.com/securityalert/8376) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3101
- **State**: PUBLISHED
- **Published Date**: September 28, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: September 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The password reset feature in Movable Type before 3.2 generates different error messages depending on whether a user exists or not, which allows remote attackers to determine valid usernames.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14911](http://www.securityfocus.com/bid/14911)
2. [20051103 Buggy blogging](http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html)
3. [16899](http://secunia.com/advisories/16899) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3653
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 14:42 UTC
- **Last Updated**: October 08, 2024 at 15:07 UTC
- **Reserved Date**: July 13, 2023 at 06:19 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Stored XSS.This issue affects E-Commerce Software: before 11.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Digital Ant - E-Commerce Software**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://https://www.usom.gov.tr/bildirim/tr-23-0443)
### Credits
- Resul Melih MACIT |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20276
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 16:18 UTC
- **Last Updated**: June 05, 2025 at 03:55 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by sending a crafted Java object to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Unified Contact Center Express**
Affected versions:
- 10.6(1) (Status: affected)
- 10.5(1)SU1 (Status: affected)
- 10.6(1)SU3 (Status: affected)
- 12.0(1) (Status: affected)
- 10.0(1)SU1 (Status: affected)
- 10.6(1)SU1 (Status: affected)
- 11.0(1)SU1 (Status: affected)
- 11.5(1)SU1 (Status: affected)
- 10.5(1) (Status: affected)
- 11.6(1) (Status: affected)
- 11.6(2) (Status: affected)
- 12.5(1) (Status: affected)
- 12.5(1)SU1 (Status: affected)
- 12.5(1)SU2 (Status: affected)
- 12.5(1)SU3 (Status: affected)
- 12.5(1)_SU03_ES01 (Status: affected)
- 12.5(1)_SU03_ES02 (Status: affected)
- 12.5(1)_SU02_ES03 (Status: affected)
- 12.5(1)_SU02_ES04 (Status: affected)
- 12.5(1)_SU02_ES02 (Status: affected)
- 12.5(1)_SU01_ES02 (Status: affected)
- 12.5(1)_SU01_ES03 (Status: affected)
- 12.5(1)_SU02_ES01 (Status: affected)
- 11.6(2)ES07 (Status: affected)
- 11.6(2)ES08 (Status: affected)
- 12.5(1)_SU01_ES01 (Status: affected)
- 12.0(1)ES04 (Status: affected)
- 12.5(1)ES02 (Status: affected)
- 12.5(1)ES03 (Status: affected)
- 11.6(2)ES06 (Status: affected)
- 12.5(1)ES01 (Status: affected)
- 12.0(1)ES03 (Status: affected)
- 12.0(1)ES01 (Status: affected)
- 11.6(2)ES05 (Status: affected)
- 12.0(1)ES02 (Status: affected)
- 11.6(2)ES04 (Status: affected)
- 11.6(2)ES03 (Status: affected)
- 11.6(2)ES02 (Status: affected)
- 11.6(2)ES01 (Status: affected)
- 10.6(1)SU3ES03 (Status: affected)
- 11.0(1)SU1ES03 (Status: affected)
- 10.6(1)SU3ES01 (Status: affected)
- 10.5(1)SU1ES10 (Status: affected)
- 10.0(1)SU1ES04 (Status: affected)
- 11.5(1)SU1ES03 (Status: affected)
- 11.6(1)ES02 (Status: affected)
- 11.5(1)ES01 (Status: affected)
- 9.0(2)SU3ES04 (Status: affected)
- 10.6(1)SU2 (Status: affected)
- 10.6(1)SU2ES04 (Status: affected)
- 11.6(1)ES01 (Status: affected)
- 10.6(1)SU3ES02 (Status: affected)
- 11.5(1)SU1ES02 (Status: affected)
- 11.5(1)SU1ES01 (Status: affected)
- 8.5(1) (Status: affected)
- 11.0(1)SU1ES02 (Status: affected)
- 12.5(1)_SU03_ES03 (Status: affected)
- 12.5(1)_SU03_ES04 (Status: affected)
- 12.5(1)_SU03_ES05 (Status: affected)
- 12.5(1)_SU03_ES06 (Status: affected)
### References
1. [cisco-sa-uccx-multi-UhOTvPGL](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7771
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The World Tamil Bayan (aka com.wWorldTamilBayan) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#984569](http://www.kb.cert.org/vuls/id/984569)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12279
- **State**: PUBLISHED
- **Published Date**: November 02, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the packet processing code of Cisco IOS Software for Cisco Aironet Access Points could allow an unauthenticated, adjacent attacker to retrieve content from memory on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks that are performed by the affected device when the device adds padding to egress packets. An attacker could exploit this vulnerability by sending a crafted IP packet to an affected device. A successful exploit could allow the attacker to retrieve content from memory on the affected device, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvc21581.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco IOS Software for Cisco Aironet Access Points**
Affected versions:
- Cisco IOS Software for Cisco Aironet Access Points (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-iosap)
2. [1039720](http://www.securitytracker.com/id/1039720)
3. [101643](http://www.securityfocus.com/bid/101643) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41806
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 21:22 UTC
- **Last Updated**: May 08, 2025 at 18:58 UTC
- **Reserved Date**: September 30, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In versions 16.1.x before 16.1.3.2 and 15.1.x before 15.1.5.1, when BIG-IP AFM Network Address Translation policy with IPv6/IPv4 translation rules is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**F5 - BIG-IP AFM**
Affected versions:
- 17.0.0 (Status: unaffected)
- 16.1.x (Status: affected)
- 15.1.x (Status: affected)
- 14.1.0 (Status: unaffected)
- 13.1.0 (Status: unaffected)
### References
1. [](https://support.f5.com/csp/article/K00721320)
### Credits
- This issue was discovered internally by F5. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2611
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 20, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
2. [1032911](http://www.securitytracker.com/id/1032911)
3. [RHSA-2015:1646](http://rhn.redhat.com/errata/RHSA-2015-1646.html)
4. [openSUSE-SU-2015:1629](http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html)
5. [USN-2674-1](http://www.ubuntu.com/usn/USN-2674-1)
6. [GLSA-201610-06](https://security.gentoo.org/glsa/201610-06)
7. [75762](http://www.securityfocus.com/bid/75762)
8. [RHSA-2015:1630](http://rhn.redhat.com/errata/RHSA-2015-1630.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39506
- **State**: PUBLISHED
- **Published Date**: July 12, 2024 at 12:20 UTC
- **Last Updated**: May 04, 2025 at 09:17 UTC
- **Reserved Date**: June 25, 2024 at 14:23 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
In lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value,
but then it is unconditionally passed to skb_add_rx_frag() which looks
strange and could lead to null pointer dereference.
lio_vf_rep_copy_packet() call trace looks like:
octeon_droq_process_packets
octeon_droq_fast_process_packets
octeon_droq_dispatch_pkt
octeon_create_recv_info
...search in the dispatch_list...
->disp_fn(rdisp->rinfo, ...)
lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)
In this path there is no code which sets pg_info->page to NULL.
So this check looks unneeded and doesn't solve potential problem.
But I guess the author had reason to add a check and I have no such card
and can't do real test.
In addition, the code in the function liquidio_push_packet() in
liquidio/lio_core.c does exactly the same.
Based on this, I consider the most acceptable compromise solution to
adjust this issue by moving skb_add_rx_frag() into conditional scope.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
- 1f233f327913f3dee0602cba9c64df1903772b55 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.15 (Status: affected)
- 0 (Status: unaffected)
- 4.19.317 (Status: unaffected)
- 5.4.279 (Status: unaffected)
- 5.10.221 (Status: unaffected)
- 5.15.162 (Status: unaffected)
- 6.1.95 (Status: unaffected)
- 6.6.35 (Status: unaffected)
- 6.9.6 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2)
2. [](https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79)
3. [](https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347)
4. [](https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c)
5. [](https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee)
6. [](https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea)
7. [](https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa)
8. [](https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2089
- **State**: PUBLISHED
- **Published Date**: March 02, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 24, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ILIAS 4.4.1 allows remote attackers to execute arbitrary PHP code via an e-mail attachment that leads to creation of a .php file with a certain client_id pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/125350/ILIAS-4.4.1-Cross-Site-Scripting-Shell-Upload.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17581
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FS Quibids Clone 1.0 has SQL Injection via the itechd.php productid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43243](https://www.exploit-db.com/exploits/43243/)
2. [](https://packetstormsecurity.com/files/145253/FS-Quibids-Clone-1.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12656
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 17:00 UTC
- **Last Updated**: December 16, 2024 at 17:24 UTC
- **Reserved Date**: December 16, 2024 at 08:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in FabulaTech USB over Network 6.0.6.1. This affects the function 0x220448 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
- CWE-404: Security Weakness
### Affected Products
**FabulaTech - USB over Network**
Affected versions:
- 6.0.6.1 (Status: affected)
### References
1. [VDB-288525 | FabulaTech USB over Network IOCT ftusbbus2.sys 0x220448 null pointer dereference](https://vuldb.com/?id.288525)
2. [VDB-288525 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.288525)
3. [Submit #456030 | FabulaTech USB over Network Client 6.0.6.1 NULL Pointer Dereference](https://vuldb.com/?submit.456030)
4. [](https://shareforall.notion.site/FabulaTech-USB-over-Network-Client-ftusbbus2-0x220448-NPD-DOS-15160437bb1e80cb837cd715680be6ea)
### Credits
- TopGun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1995
- **State**: PUBLISHED
- **Published Date**: June 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:06 UTC
- **Reserved Date**: June 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bitrix Site Manager 4.0.x allows remote attackers to obtain sensitive information via direct request to (1) subscr_form.php or (2) dbquery_error.php, which reveals the path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050615 Vulnerability: Bitrix Web Server Paths](http://marc.info/?l=bugtraq&m=111885652331100&w=2)
2. [17348](http://www.osvdb.org/17348)
3. [17376](http://www.osvdb.org/17376)
4. [bitrix-site-path-disclosure(21019)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44036
- **State**: PUBLISHED
- **Published Date**: October 06, 2024 at 12:14 UTC
- **Last Updated**: October 07, 2024 at 12:28 UTC
- **Reserved Date**: August 18, 2024 at 21:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Pierre Lebedel - Kodex Posts likes**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/kodex-posts-likes/wordpress-kodex-posts-likes-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42782
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 16:50 UTC
- **Last Updated**: September 18, 2024 at 20:50 UTC
- **Reserved Date**: September 14, 2023 at 08:37 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**Fortinet - FortiAnalyzer**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-221](https://fortiguard.com/psirt/FG-IR-23-221) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8249
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 16, 2016 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21207
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 18:19 UTC
- **Reserved Date**: November 12, 2021 at 02:34 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1393
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:11 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Control Panel "Password Security" option for Apple Powerbooks allows attackers with physical access to the machine to bypass the security by booting it with an emergency startup disk and using a disk editor to modify the on/off toggle or password in the aaaaaaaAPWD file, which is normally inaccessible.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html)
2. [532](http://www.securityfocus.com/bid/532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4196
- **State**: PUBLISHED
- **Published Date**: August 06, 2023 at 17:32 UTC
- **Last Updated**: October 09, 2024 at 18:16 UTC
- **Reserved Date**: August 06, 2023 at 17:31 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**cockpit-hq - cockpit-hq/cockpit**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0)
2. [](https://github.com/cockpit-hq/cockpit/commit/039a00cc310bff128ca6e6c1c46c6fbad0385c2c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33560
- **State**: PUBLISHED
- **Published Date**: June 08, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 24, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://dev.gnupg.org/T5328)
2. [[debian-lts-announce] 20210624 [SECURITY] [DLA 2691-1] libgcrypt20 security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html)
3. [FEDORA-2021-24d4e06195](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/)
4. [FEDORA-2021-31fdc84207](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/)
5. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
6. [](https://dev.gnupg.org/T5466)
7. [](https://dev.gnupg.org/T5305)
8. [](https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61)
9. [](https://www.oracle.com/security-alerts/cpujan2022.html)
10. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
11. [](https://www.oracle.com/security-alerts/cpujul2022.html)
12. [GLSA-202210-13](https://security.gentoo.org/glsa/202210-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45047, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45047
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 08:27 UTC
- **Last Updated**: September 17, 2024 at 17:48 UTC
- **Reserved Date**: October 03, 2023 at 13:30 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in LeadSquared, Inc LeadSquared Suite plugin <= 0.7.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**LeadSquared, Inc - LeadSquared Suite**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-request-forgery-csrf-leading-to-form-deactivation-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36298
- **State**: PUBLISHED
- **Published Date**: October 01, 2021 at 20:20 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: July 08, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**Dell - Isilon InsightIQ**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000191604) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10244
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 17:05 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Attachments). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Application Object Library**
Affected versions:
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [99702](http://www.securityfocus.com/bid/99702)
2. [1038926](http://www.securitytracker.com/id/1038926)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0221
- **State**: PUBLISHED
- **Published Date**: April 10, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: March 22, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Nautica Marlin bridge allows remote attackers to cause a denial of service via a zero length UDP packet to the SNMP port.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1009](http://www.securityfocus.com/bid/1009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26569
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 08:35 UTC
- **Last Updated**: September 10, 2024 at 20:53 UTC
- **Reserved Date**: February 26, 2023 at 06:25 UTC
- **Assigned By**: TML
### Vulnerability Description
Unauthenticated SQL injection in the StudentPopupDetails_Timetable method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**IDAttend Pty Ltd - IDWeb**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.themissinglink.com.au/security-advisories/cve-2023-26569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11979
- **State**: PUBLISHED
- **Published Date**: November 29, 2024 at 02:12 UTC
- **Last Updated**: December 03, 2024 at 06:05 UTC
- **Reserved Date**: November 29, 2024 at 01:52 UTC
- **Assigned By**: twcert
### Vulnerability Description
DreamMaker from Interinfo has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Interinfo - DreamMaker**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8271-29871-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8272-13a13-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9035, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9035 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9035
- **State**: PUBLISHED
- **Published Date**: September 20, 2024 at 15:00 UTC
- **Last Updated**: September 20, 2024 at 15:30 UTC
- **Reserved Date**: September 20, 2024 at 08:04 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Admin Login. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Blood Bank Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-278205 | code-projects Blood Bank Management System Admin Login login.php sql injection](https://vuldb.com/?id.278205)
2. [VDB-278205 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.278205)
3. [Submit #411216 | code-projects blood-bank-management-system-in-php-with-source-code V1.0 SQL Injection](https://vuldb.com/?submit.411216)
4. [](https://github.com/Kinsomnia/cve/blob/main/sql/sql.md)
5. [](https://code-projects.org/)
### Credits
- kinsomnia (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9544
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113037220
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-9 (Status: affected)
### References
1. [105849](http://www.securityfocus.com/bid/105849)
2. [](https://source.android.com/security/bulletin/2018-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58015
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:12 UTC
- **Last Updated**: May 04, 2025 at 10:08 UTC
- **Reserved Date**: February 27, 2025 at 02:10 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Fix for out-of bound access error
Selfgen stats are placed in a buffer using print_array_to_buf_index() function.
Array length parameter passed to the function is too big, resulting in possible
out-of bound memory error.
Decreasing buffer size by one fixes faulty upper bound of passed array.
Discovered in coverity scan, CID 1600742 and CID 1600758
### Affected Products
**Linux - Linux**
Affected versions:
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.13.3 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8700c4bf8b7ed98037d2acf1eaf770ad6dd431d4)
2. [](https://git.kernel.org/stable/c/eb8c0534713865d190856f10bfc97cf0b88475b1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2022
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [perl-system-bo(16169)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16169)
2. [](http://www.perlmonks.org/index.pl?node_id=354145)
3. [20040518 Re: Buffer Overflow in ActivePerl ?](http://marc.info/?l=full-disclosure&m=108489112131099&w=2)
4. [20040518 RE: [Full-Disclosure] Re: Buffer Overflow in ActivePerl ?](http://marc.info/?l=bugtraq&m=108489894009025&w=2)
5. [](http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt)
6. [20040517 RE: Buffer Overflow in ActivePerl ?](http://marc.info/?l=full-disclosure&m=108483058514596&w=2)
7. [20040517 Buffer Overflow in ActivePerl ?](http://marc.info/?l=full-disclosure&m=108482796105922&w=2)
8. [10375](http://www.securityfocus.com/bid/10375)
9. [20040518 Re[2]: [Full-Disclosure] Buffer Overflow in ActivePerl ?](http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25525
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 23:44 UTC
- **Reserved Date**: February 07, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the filename parameter at /WorkFlow/OfficeFileDownload.aspx.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3903
- **State**: PUBLISHED
- **Published Date**: May 26, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 12, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:1191](http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html)
2. [DSA-3382](http://www.debian.org/security/2015/dsa-3382)
3. [](https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4)
4. [74660](http://www.securityfocus.com/bid/74660)
5. [20150514 phpMyAdmin 4.4.6 Man-In-the-Middle API Github](http://www.securityfocus.com/archive/1/535547/100/0/threaded)
6. [](http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html)
7. [](http://cxsecurity.com/issue/WLB-2015050095)
8. [1032403](http://www.securitytracker.com/id/1032403)
9. [](http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40714
- **State**: PUBLISHED
- **Published Date**: September 19, 2022 at 15:52 UTC
- **Last Updated**: August 03, 2024 at 12:21 UTC
- **Reserved Date**: September 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /oms1350/* endpoints.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/it/footer/red-team.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1000017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1000017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1000017
- **State**: PUBLISHED
- **Published Date**: February 04, 2019 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 03:00 UTC
- **Reserved Date**: January 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Chamilo Chamilo-lms version 1.11.8 and earlier contains an Incorrect Access Control vulnerability in Tickets component that can result in an authenticated user can read all tickets available on the platform, due to lack of access controls. This attack appears to be exploitable via ticket_id=[ticket number]. This vulnerability appears to have been fixed in 1.11.x after commit 33e2692a37b5b6340cf5bec1a84e541460983c03.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chamilo/chamilo-lms/commit/33e2692a37b5b6340cf5bec1a84e541460983c03)
2. [](https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-34-2019-01-14-Moderate-risk-moderate-impact-XSS-and-unauthorized-access) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18708, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18708
- **State**: REJECTED
- **Published Date**: November 04, 2019 at 20:17 UTC
- **Last Updated**: November 04, 2019 at 20:17 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6863
- **State**: PUBLISHED
- **Published Date**: October 02, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Mootorratturid & biker.ee (aka ee.digitalfruit.mootorratturid) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#413625](http://www.kb.cert.org/vuls/id/413625)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2941
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 21:31 UTC
- **Last Updated**: March 11, 2025 at 16:21 UTC
- **Reserved Date**: May 27, 2023 at 19:39 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)
### Affected Products
**Google - Chrome**
Affected versions:
- 114.0.5735.90 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html)
2. [](https://crbug.com/1430269)
3. [](https://www.debian.org/security/2023/dsa-5418)
4. [](https://security.gentoo.org/glsa/202311-11)
5. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27518
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 00:00 UTC
- **Last Updated**: August 22, 2024 at 19:05 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in SUPERAntiSyware Professional X 10.0.1262 and 10.0.1264 allows unprivileged attackers to escalate privileges via a restore of a crafted DLL file into the C:\Program Files\SUPERAntiSpyware folder.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=FM5XlZPdvdo)
2. [](https://www.superantispyware.com/)
3. [](https://github.com/secunnix/CVE-2024-27518) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0412
- **State**: PUBLISHED
- **Published Date**: April 19, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 11, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Oracle Solaris 8, 9, and 10 stores back-out patch files (undo.Z) unencrypted with world-readable permissions under /var/sadm/pkg/, which allows local users to obtain password hashes and conduct brute force password guessing attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
2. [44047](http://secunia.com/advisories/44047)
3. [VU#648244](http://www.kb.cert.org/vuls/id/648244)
4. [solaris-password-info-disclosure(66579)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66579)
5. [47171](http://www.securityfocus.com/bid/47171)
6. [71646](http://osvdb.org/71646)
7. [ADV-2011-0882](http://www.vupen.com/english/advisories/2011/0882) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24554
- **State**: PUBLISHED
- **Published Date**: February 14, 2023 at 10:36 UTC
- **Last Updated**: March 20, 2025 at 15:59 UTC
- **Reserved Date**: January 26, 2023 at 14:06 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Solid Edge SE2022**
Affected versions:
- All versions < V222.0MP12 (Status: affected)
**Siemens - Solid Edge SE2023**
Affected versions:
- All versions < V223.0Update2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43890
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 19:59 UTC
- **Reserved Date**: September 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability in the diagnostic tools page. This vulnerability is exploited via a crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0687
- **State**: PUBLISHED
- **Published Date**: March 08, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:21 UTC
- **Reserved Date**: March 09, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in Hashcash 1.16 allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via format string specifiers in a reply address, which is not properly handled when printing the header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14487](http://secunia.com/advisories/14487)
2. [GLSA-200503-12](http://www.gentoo.org/security/en/glsa/glsa-200503-12.xml)
3. [](http://bugs.gentoo.org/show_bug.cgi?id=83541) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13944
- **State**: PUBLISHED
- **Published Date**: May 09, 2025 at 15:18 UTC
- **Last Updated**: May 09, 2025 at 19:09 UTC
- **Reserved Date**: May 06, 2025 at 10:24 UTC
- **Assigned By**: NLOK
### Vulnerability Description
Link Following Local Privilege Escalation Vulnerability in NortonUtilitiesSvc in Norton Utilities Ultimate Version 24.2.16862.6344 on Windows 10 Pro x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via the creation of a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Norton - Norton Utilities Ultimate**
Affected versions:
- 0 (Status: affected)
**Avast - CleanUp**
Affected versions:
- 0 (Status: affected)
**AVG - TuneUp**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.gendigital.com/us/en/contact-us/security-advisories/)
### Credits
- Vladislav Berghici of Trend Micro Research
- Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36233
- **State**: PUBLISHED
- **Published Date**: February 18, 2021 at 15:16 UTC
- **Last Updated**: September 16, 2024 at 19:30 UTC
- **Reserved Date**: January 27, 2021 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
### Affected Products
**Atlassian - Bitbucket Server**
Affected versions:
- unspecified (Status: affected)
- 7.0.0 (Status: affected)
- unspecified (Status: affected)
- 7.7.0 (Status: affected)
- unspecified (Status: affected)
**Atlassian - Bitbucket Data Center**
Affected versions:
- unspecified (Status: affected)
- 7.0.0 (Status: affected)
- unspecified (Status: affected)
- 7.7.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/BSERV-12753)
2. [VU#240785](https://www.kb.cert.org/vuls/id/240785) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27173
- **State**: PUBLISHED
- **Published Date**: February 10, 2021 at 18:35 UTC
- **Last Updated**: August 03, 2024 at 20:40 UTC
- **Reserved Date**: February 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#httpd-infoleak) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29954
- **State**: PUBLISHED
- **Published Date**: May 13, 2025 at 16:59 UTC
- **Last Updated**: May 29, 2025 at 22:21 UTC
- **Reserved Date**: March 12, 2025 at 17:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19044.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52418
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 21:24 UTC
- **Last Updated**: November 19, 2024 at 14:01 UTC
- **Reserved Date**: November 11, 2024 at 06:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CactusThemes Gameplan allows Reflected XSS.This issue affects Gameplan: from n/a through 1.5.10.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CactusThemes - Gameplan**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/gameplan/wordpress-gameplan-theme-1-5-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- justakazh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48324
- **State**: PUBLISHED
- **Published Date**: February 16, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 14:36 UTC
- **Reserved Date**: February 16, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple Cross Site Scripting (XSS) vulnerabilities in Mapos 4.39.0 allow attackers to execute arbitrary code. Affects the following parameters: (1) pesquisa, (2) data, (3) data2, (4) nome, (5) descricao, (6) idDocumentos, (7) id in file application/controllers/Arquivos.php; (8) senha, (9) nomeCliente, (10) contato, (11) documento, (12) telefone, (13) celular, (14) email, (15) rua, (16) numero, (17) complemento, (18) bairro, (19) cidade, (20) estado, (21) cep, (22) idClientes, (23) id in file application/controllers/Clientes.php; (24) id, (25) tipo, (26) forma_pagamento, (27) gateway_de_pagamento, (28) excluir_id, (29) confirma_id, (30) cancela_id in file application/controllers/Cobrancas.php; (31) vencimento_de, (32) vencimento_ate, (33) cliente, (34) tipo, (35) status, (36) valor_desconto, (37) desconto, (38) periodo, (39) per_page, (40) urlAtual, (41) vencimento, (42) recebimento, (43) valor, (44) recebido, (45) formaPgto, (46) desconto_parc, (47) entrada, (48) qtdparcelas_parc, (49) valor_parc, (50) dia_pgto, (51) dia_base_pgto, (52) comissao, (53) descricao_parc, (54) cliente_parc, (55) observacoes_parc, (56) formaPgto_parc, (57) tipo_parc, (58) pagamento, (59) pago, (60) valor_desconto_editar, (61) descricao, (62) fornecedor, (63) observacoes, (64) id in file application/controllers/Financeiro.php; (65) refGarantia, (66) textoGarantia, (67) idGarantias in file application/controllers/Garantias.php; (68) email, (69) senha in file application/controllers/Login.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8)
2. [](https://github.com/RamonSilva20/mapos/issues/2010)
3. [](https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10338
- **State**: PUBLISHED
- **Published Date**: June 11, 2019 at 13:15 UTC
- **Last Updated**: August 04, 2024 at 22:17 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery vulnerability in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed attackers to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials.
### Affected Products
**Jenkins project - Jenkins JX Resources Plugin**
Affected versions:
- 1.0.36 and earlier (Status: affected)
### References
1. [[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/06/11/1)
2. [108747](http://www.securityfocus.com/bid/108747)
3. [](https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0929
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:12 UTC
- **Last Updated**: August 04, 2024 at 06:18 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0920, CVE-2020-0931, CVE-2020-0932, CVE-2020-0971, CVE-2020-0974.
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server**
Affected versions:
- 2016 (Status: affected)
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2019 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation**
Affected versions:
- 2010 Service Pack 2 (Status: affected)
- 2013 Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0929) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.