System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2560
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 16:36 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: SWSE Server). Supported versions that are affected are 19.10 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Siebel UI Framework**
Affected versions:
- 19.10 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3522, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3522 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3522
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:50 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Web Applications Desktop Integrator component in Oracle E-Business Suite 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to Application Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
2. [91861](http://www.securityfocus.com/bid/91861)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [1036403](http://www.securitytracker.com/id/1036403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4911
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 04:31 UTC
- **Last Updated**: May 19, 2025 at 14:08 UTC
- **Reserved Date**: May 17, 2025 at 14:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/view-foreigner-ticket.php. The manipulation of the argument viewid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Zoo Management System**
Affected versions:
- 2.1 (Status: affected)
### References
1. [VDB-309468 | PHPGurukul Zoo Management System view-foreigner-ticket.php sql injection](https://vuldb.com/?id.309468)
2. [VDB-309468 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309468)
3. [Submit #578751 | PHPGurukul Zoo Management System V2.1 SQL Injection](https://vuldb.com/?submit.578751)
4. [](https://github.com/xiguala123/myCVE/issues/6)
5. [](https://phpgurukul.com/)
### Credits
- xiguala123 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0833
- **State**: PUBLISHED
- **Published Date**: July 03, 2012 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 18:38 UTC
- **Reserved Date**: January 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:0813](http://rhn.redhat.com/errata/RHSA-2012-0813.html)
2. [](https://fedorahosted.org/389/ticket/162)
3. [49562](http://secunia.com/advisories/49562)
4. [48035](http://secunia.com/advisories/48035)
5. [](https://fedorahosted.org/389/changeset/1bbbb3e5049c1aa0650546efab87ed2f1ea59637/389-ds-base) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1871
- **State**: PUBLISHED
- **Published Date**: February 24, 2024 at 21:31 UTC
- **Last Updated**: August 01, 2024 at 18:56 UTC
- **Reserved Date**: February 24, 2024 at 07:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in SourceCodester Employee Management System 1.0. Affected is an unknown function of the file /process/assignp.php of the component Project Assignment Report. The manipulation of the argument pname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-254694 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Employee Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-254694 | SourceCodester Employee Management System Project Assignment Report assignp.php cross site scripting](https://vuldb.com/?id.254694)
2. [VDB-254694 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254694)
3. [](https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md)
### Credits
- Joshua Lictan
- nochizplz (VulDB User)
- nochizplz (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5953
- **State**: PUBLISHED
- **Published Date**: March 19, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: September 27, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in tmpl/layout_editevent.php in the Multi Calendar (com_multicalendar) component 4.0.2, and possibly 4.8.5 and earlier, for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) calid or (2) paletteDefault parameter in an editevent action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/125738)
2. [57360](http://secunia.com/advisories/57360)
3. [20140315 [CVE-2013-5953]](http://archives.neohapsis.com/archives/fulldisclosure/2014-03/0276.html)
4. [multi-calendar-index-xss(91820)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91820) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15927
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 18:56 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the SAP module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com)
2. [](https://www.manageengine.com/products/applications_manager/issues.html#v14750)
3. [](https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2020-15927.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5541
- **State**: PUBLISHED
- **Published Date**: December 12, 2008 at 18:13 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [multiple-antivirus-mzheader-code-execution(47435)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47435)
2. [4723](http://securityreason.com/securityalert/4723)
3. [20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-](http://www.securityfocus.com/archive/1/499043/100/0/threaded)
4. [20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass](http://www.securityfocus.com/archive/1/498995/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1112
- **State**: PUBLISHED
- **Published Date**: March 11, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: March 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Session Initiation Protocol (SIP) implementation in Ingate Firewall and Ingate SIParator before 3.1.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/)
2. [VU#528719](http://www.kb.cert.org/vuls/id/528719)
3. [CA-2003-06](http://www.cert.org/advisories/CA-2003-06.html)
4. [6904](http://www.securityfocus.com/bid/6904)
5. [sip-invite(11379)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11379) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0421
- **State**: PUBLISHED
- **Published Date**: February 05, 2009 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 04, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Eventing (com_eventing) 1.6.x component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33296](http://www.securityfocus.com/bid/33296)
2. [7793](https://www.exploit-db.com/exploits/7793)
3. [33563](http://secunia.com/advisories/33563)
4. [eventing-index-sql-injection(48016)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30250
- **State**: PUBLISHED
- **Published Date**: April 04, 2024 at 14:57 UTC
- **Last Updated**: August 02, 2024 at 01:32 UTC
- **Reserved Date**: March 26, 2024 at 12:52 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Astro-Shield is an integration to enhance website security with SubResource Integrity hashes, Content-Security-Policy headers, and other techniques. Versions from 1.2.0 to 1.3.1 of Astro-Shield allow bypass to the allow-lists for cross-origin resources by introducing valid `integrity` attributes to the injected code. This implies that the injected SRI hash would be added to the generated CSP header, which would lead the browser to believe that the injected resource is legit. This vulnerability is patched in version 1.3.2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-345: Security Weakness
### Affected Products
**kindspells - astro-shield**
Affected versions:
- >= 1.2.0, < 1.3.2 (Status: affected)
### References
1. [https://github.com/kindspells/astro-shield/security/advisories/GHSA-c4gr-q97g-ppwc](https://github.com/kindspells/astro-shield/security/advisories/GHSA-c4gr-q97g-ppwc)
2. [https://github.com/kindspells/astro-shield/commit/1221019306f501bf5fa9bcfb5a23a2321d34ba0a](https://github.com/kindspells/astro-shield/commit/1221019306f501bf5fa9bcfb5a23a2321d34ba0a)
3. [https://github.com/kindspells/astro-shield/commit/5ae8b8ef4f681d3a81431ee7e79d5dec545c6e1f](https://github.com/kindspells/astro-shield/commit/5ae8b8ef4f681d3a81431ee7e79d5dec545c6e1f)
4. [https://github.com/kindspells/astro-shield/releases/tag/1.3.2](https://github.com/kindspells/astro-shield/releases/tag/1.3.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51820
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Blurams Lumi Security Camera (A31C) v.2.3.38.12558 allows a physically proximate attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/)
2. [](https://github.com/roman-mueller/PoC/tree/master/CVE-2023-51820) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16730
- **State**: PUBLISHED
- **Published Date**: September 08, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
\upload\plugins\sys\Install.php in CScms 4.1 has XSS via the site name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.patec.cn/newsshow.php?cid=24&id=123)
2. [](https://github.com/AvaterXXX/CScms/blob/master/CScms_xss.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56086
- **State**: PUBLISHED
- **Published Date**: December 16, 2024 at 00:00 UTC
- **Last Updated**: December 16, 2024 at 15:57 UTC
- **Reserved Date**: December 16, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Logpoint before 7.5.0. Authenticated users can inject payloads in Report Templates. These are executed when the backup process is initiated, leading to Remote Code Execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://servicedesk.logpoint.com/hc/en-us/articles/22136886421277-Remote-Code-Execution-while-creating-Report-Templates) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50732
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 19:42 UTC
- **Last Updated**: August 02, 2024 at 22:16 UTC
- **Reserved Date**: December 11, 2023 at 17:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute a Velocity script without script right through the document tree. This has been patched in XWiki 14.10.7 and 15.2RC1.
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 8.3-rc-1, < 14.10.7 (Status: affected)
- >= 15.0-rc-1, < 15.2-rc-1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5f8-qf24-24cj](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5f8-qf24-24cj)
2. [https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3](https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3)
3. [https://jira.xwiki.org/browse/XWIKI-20625](https://jira.xwiki.org/browse/XWIKI-20625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6271
- **State**: PUBLISHED
- **Published Date**: December 04, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: December 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in PHPOLL 0.96 allow remote attackers to inject arbitrary web script or HTML via the language parameter to (1) index.php, (2) info.php; and (3) index.php, (4) votanti.php, (5) risultati_config.php, (6) modifica_band.php, (7) band_editor.php, and (8) config_editor.php in admin/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1960](http://securityreason.com/securityalert/1960)
2. [phpoll-language-xss(30426)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30426)
3. [20061119 PHPOLL => 0.96 Cross Site Scripting](http://www.securityfocus.com/archive/1/452093/100/200/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3311
- **State**: PUBLISHED
- **Published Date**: June 21, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in print.php in the Articles 1.02 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3588](https://www.exploit-db.com/exploits/3588)
2. [20070327 Xoops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit And PoC](http://www.securityfocus.com/archive/1/463916/100/0/threaded)
3. [2817](http://securityreason.com/securityalert/2817) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44829
- **State**: PUBLISHED
- **Published Date**: January 20, 2022 at 16:24 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability exists in index.html in AFI WebACMS through 2.1.0 via the the ID parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.afi-solutions.com/)
2. [](https://www.to.com)
3. [](https://blog.to.com/advisory-webacms-2-1-0-cross-site-scripting/)
4. [20220124 [TO-2021-001] WebACMS 2.1.0 - Cross-Site Scripting](http://seclists.org/fulldisclosure/2022/Jan/41)
5. [](http://packetstormsecurity.com/files/165684/WebACMS-2.1.0-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14635
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:29 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Logging). Supported versions that are affected are 12.2.5-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Application Object Library**
Affected versions:
- 12.2.5-12.2.9 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0898
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opera 6.0.1 and 6.0.2 allows a remote web site to upload arbitrary files from the client system, without prompting the client, via an input type=file tag whose value contains a newline.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020527 Reading ANY local file in Opera (GM#001-OP)](http://marc.info/?l=ntbugtraq&m=102256058220402&w=2)
2. [20020527 Reading ANY local file in Opera (GM#001-OP)](http://online.securityfocus.com/archive/1/274202)
3. [opera-browser-file-retrieval(9188)](http://www.iss.net/security_center/static/9188.php)
4. [](http://www.opera.com/windows/changelog/log603.html)
5. [4834](http://www.securityfocus.com/bid/4834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34572
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 21:37 UTC
- **Last Updated**: August 03, 2024 at 09:15 UTC
- **Reserved Date**: June 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wavlink.com/en_us/category/REPEATER.html)
2. [](https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26215, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26215 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26215
- **State**: PUBLISHED
- **Published Date**: March 18, 2021 at 15:44 UTC
- **Last Updated**: August 03, 2024 at 20:19 UTC
- **Reserved Date**: January 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://seeddms.com)
2. [](https://tuhin1729.medium.com/cve-2021-26215-7ce6800be822) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3184
- **State**: PUBLISHED
- **Published Date**: August 14, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:00 UTC
- **Reserved Date**: April 17, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:18271](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18271)
2. [MS13-059](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059)
3. [TA13-225A](http://www.us-cert.gov/ncas/alerts/TA13-225A) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3589
- **State**: PUBLISHED
- **Published Date**: July 19, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 13, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html)
2. [19060](http://www.securityfocus.com/bid/19060)
3. [23680](http://secunia.com/advisories/23680)
4. [21120](http://secunia.com/advisories/21120)
5. [1016536](http://securitytracker.com/id?1016536)
6. [](http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html)
7. [](http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html)
8. [20060718 VMSA-2006-0003 VMware possible incorrect permissions on SSL key files](http://www.securityfocus.com/archive/1/440583/100/0/threaded)
9. [ADV-2006-2880](http://www.vupen.com/english/advisories/2006/2880)
10. [19062](http://www.securityfocus.com/bid/19062)
11. [20070110 VMware ESX server security updates](http://www.securityfocus.com/archive/1/456546/100/200/threaded)
12. [27418](http://www.osvdb.org/27418)
13. [vmware-vmwareconfig-file-permissions(27881)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27881)
14. [](http://kb.vmware.com/kb/2467205)
15. [20060725 Advisory: VMware Possible Incorrect Permissions On SSL Key Files](http://www.securityfocus.com/archive/1/441082/100/0/threaded)
16. [](http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13063
- **State**: PUBLISHED
- **Published Date**: September 23, 2019 at 14:56 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: June 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Within Sahi Pro 8.0.0, an attacker can send a specially crafted URL to include any victim files on the system via the script parameter on the Script_view page. This will result in file disclosure (i.e., being able to pull any file from the remote victim application). This can be used to steal and obtain sensitive config and other files. This can result in complete compromise of the application. The script parameter is vulnerable to directory traversal and both local and remote file inclusion.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sahipro.com/downloads-archive/)
2. [Exploit Database](https://www.exploit-db.com/exploits/47062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51743
- **State**: PUBLISHED
- **Published Date**: November 18, 2024 at 20:04 UTC
- **Last Updated**: November 19, 2024 at 14:50 UTC
- **Reserved Date**: October 31, 2024 at 14:12 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability in the update/upload/create file methods in Controllers allows authenticated instructors to write arbitrary files to any location on the web server MarkUs is running on (depending on the permissions of the underlying filesystem). e.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading.
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**MarkUsProject - Markus**
Affected versions:
- < 2.4.8 (Status: affected)
### References
1. [https://github.com/MarkUsProject/Markus/security/advisories/GHSA-hwgg-qvjx-572x](https://github.com/MarkUsProject/Markus/security/advisories/GHSA-hwgg-qvjx-572x)
2. [https://github.com/MarkUsProject/Markus/pull/7026](https://github.com/MarkUsProject/Markus/pull/7026) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24228
- **State**: PUBLISHED
- **Published Date**: April 12, 2021 at 14:05 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Patreon WordPress**
Affected versions:
- 1.7.2 (Status: affected)
### References
1. [](https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/)
2. [](https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b)
### Credits
- George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5372
- **State**: PUBLISHED
- **Published Date**: June 05, 2019 at 14:47 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
### Affected Products
**n/a - HPE Intelligent Management Center (IMC) PLAT**
Affected versions:
- 7.3 E0506P09 and earlier (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0763
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 21:14 UTC
- **Last Updated**: April 22, 2025 at 16:00 UTC
- **Reserved Date**: January 19, 2024 at 20:41 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
Any user can delete an arbitrary folder (recursively) on a remote server due to bad input sanitization leading to path traversal. The attacker would need access to the server at some privilege level since this endpoint is protected and requires authorization.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**mintplex-labs - mintplex-labs/anything-llm**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5)
2. [](https://github.com/mintplex-labs/anything-llm/commit/8a7324d0e77a15186e1ad5e5119fca4fb224c39c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1721
- **State**: PUBLISHED
- **Published Date**: June 16, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 16, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2012:1265](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html)
2. [SUSE-SU-2012:1231](http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html)
3. [RHSA-2012:0734](http://rhn.redhat.com/errata/RHSA-2012-0734.html)
4. [](http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html)
5. [53959](http://www.securityfocus.com/bid/53959)
6. [SSRT100919](http://marc.info/?l=bugtraq&m=134496371727681&w=2)
7. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html)
8. [oval:org.mitre.oval:def:16358](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16358)
9. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html)
10. [HPSBUX02805](http://marc.info/?l=bugtraq&m=134496371727681&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0212
- **State**: PUBLISHED
- **Published Date**: March 08, 2018 at 07:00 UTC
- **Last Updated**: December 02, 2024 at 20:58 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf69963.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Cisco Identity Services Engine**
Affected versions:
- Cisco Identity Services Engine (Status: affected)
### References
1. [103333](http://www.securityfocus.com/bid/103333)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise1)
3. [1040471](http://www.securitytracker.com/id/1040471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46814
- **State**: PUBLISHED
- **Published Date**: June 13, 2022 at 14:54 UTC
- **Last Updated**: August 04, 2024 at 05:17 UTC
- **Reserved Date**: May 27, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 10.1.0 (Status: affected)
- 10.1.1 (Status: affected)
- 11.0.0 (Status: affected)
- 12.0.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 3.1.0 (Status: affected)
- 3.1.1 (Status: affected)
- 4.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/6/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5603
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 18:00 UTC
- **Last Updated**: June 04, 2025 at 20:39 UTC
- **Reserved Date**: June 04, 2025 at 10:41 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Campcodes Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument full_name/username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**Campcodes - Hospital Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311089 | Campcodes Hospital Management System registration.php sql injection](https://vuldb.com/?id.311089)
2. [VDB-311089 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311089)
3. [Submit #588843 | Campcodes Hospital Management System v1.0 SQL Injection](https://vuldb.com/?submit.588843)
4. [](https://github.com/YZS17/CVE/blob/main/Hospital_Management_System/hms_registration.php_sqli.md)
5. [](https://www.campcodes.com/)
### Credits
- XU-17 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16608
- **State**: PUBLISHED
- **Published Date**: December 10, 2020 at 21:08 UTC
- **Last Updated**: August 04, 2024 at 13:45 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Notable 1.8.4 allows XSS via crafted Markdown text, with resultant remote code execution (because nodeIntegration in webPreferences is true).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/notable/notable)
2. [](https://sghosh2402.medium.com/cve-2020-16608-8cdad9f4d9b4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3749
- **State**: PUBLISHED
- **Published Date**: September 23, 2011 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 00:02 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ka-Map 1.0-20070205 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by test.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
2. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ka-map-1.0-20070205)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8622
- **State**: PUBLISHED
- **Published Date**: December 12, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8477, CVE-2018-8621.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8622)
2. [106088](http://www.securityfocus.com/bid/106088) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35168
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 19:25 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: December 11, 2020 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**Dell - Dell BSAFE Crypto-C Micro Edition**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000181115/dsa-2020-286-dell-bsafe-crypto-c-micro-edition-4-1-5-and-dell-bsafe-micro-edition-suite-4-6-multiple-security-vulnerabilities)
2. [](https://www.oracle.com/security-alerts/cpujul2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8353
- **State**: PUBLISHED
- **Published Date**: September 28, 2024 at 02:04 UTC
- **Last Updated**: September 30, 2024 at 15:11 UTC
- **Reserved Date**: August 30, 2024 at 15:44 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**webdevmattcrom - GiveWP – Donation Plugin and Fundraising Platform**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c4c530fa-eaf4-4721-bfb6-9fc06d7f343c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/give/tags/3.16.0/includes/process-donation.php#L154)
3. [](https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/includes/process-donation.php)
4. [](https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/includes/admin/admin-actions.php)
5. [](https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/src/Helpers/Utils.php)
6. [](https://plugins.trac.wordpress.org/changeset/3157829/give/tags/3.16.2/includes/process-donation.php)
### Credits
- cuokon |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31929
- **State**: PUBLISHED
- **Published Date**: June 10, 2021 at 13:03 UTC
- **Last Updated**: August 03, 2024 at 23:10 UTC
- **Reserved Date**: April 30, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify loyalty campaigns and settings, such as fraud prevention, coupon groups, email templates, or referrals.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md)
2. [](https://www.annexcloud.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25632
- **State**: PUBLISHED
- **Published Date**: November 27, 2023 at 07:03 UTC
- **Last Updated**: October 11, 2024 at 17:58 UTC
- **Reserved Date**: February 09, 2023 at 15:55 UTC
- **Assigned By**: naver
### Vulnerability Description
The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature.
### Weakness Classification (CWE)
- CWE-359: Security Weakness
### Affected Products
**NAVER - NAVER Whale browser**
Affected versions:
- 3.0.1.2 (Status: unaffected)
### References
1. [NAVER Security Advisory](https://cve.naver.com/detail/cve-2023-25632.html)
### Credits
- Mohit Raj (shadow2639), sec4life@protonmail.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23186
- **State**: PUBLISHED
- **Published Date**: May 06, 2024 at 06:36 UTC
- **Last Updated**: February 13, 2025 at 17:33 UTC
- **Reserved Date**: January 12, 2024 at 07:03 UTC
- **Assigned By**: OX
### Vulnerability Description
E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. We now use safer methods of handling external content when embedding displayname information to the web interface. No publicly available exploits are known.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**Open-Xchange GmbH - OX App Suite**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://documentation.open-xchange.com/appsuite/releases/8.22/)
2. [](https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json)
3. [](http://seclists.org/fulldisclosure/2024/May/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1774
- **State**: PUBLISHED
- **Published Date**: July 21, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 19, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
WebKit in Apple Safari before 5.0.6 has improper libxslt security settings, which allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted web site. NOTE: this may overlap CVE-2011-1425.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8481](http://securityreason.com/securityalert/8481)
2. [](http://support.apple.com/kb/HT4981)
3. [APPLE-SA-2011-10-12-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html)
4. [APPLE-SA-2011-10-11-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html)
5. [](http://support.apple.com/kb/HT4999)
6. [](http://support.apple.com/kb/HT4808)
7. [APPLE-SA-2011-07-20-1](http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1379
- **State**: PUBLISHED
- **Published Date**: January 19, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:46 UTC
- **Reserved Date**: January 19, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [xine-dvd-subpicture-bo(17423)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17423)
2. [SSA:2004-266](http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.320308)
3. [](http://xinehq.de/index.php/security/XSA-2004-5)
4. [DSA-657](http://www.debian.org/security/2005/dsa-657)
5. [11205](http://www.securityfocus.com/bid/11205)
6. [20040906 XSA-2004-5: heap overflow in DVD subpicture decoder](http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0)
7. [GLSA-200409-30](http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml)
8. [](http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4614
- **State**: PUBLISHED
- **Published Date**: December 29, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:25 UTC
- **Reserved Date**: December 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in item.php in Ero Auktion 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2010-0723.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45503](http://www.securityfocus.com/bid/45503)
2. [15769](http://www.exploit-db.com/exploits/15769)
3. [38666](http://secunia.com/advisories/38666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4219
- **State**: PUBLISHED
- **Published Date**: December 14, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:38 UTC
- **Reserved Date**: December 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
setting.php in Innovative CMS (ICMS, formerly Imoel-CMS) contains username and password information in cleartext, which might allow attackers to obtain this information via a direct request to setting.php. NOTE: on a properly configured web server, it would be expected that a .php file would be processed before content is returned to the user, so this might not be a vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21766](http://www.osvdb.org/21766)
2. [20051212 IMOEL CMS Sql password discovery](http://www.securityfocus.com/archive/1/419238/100/0/threaded)
3. [250](http://securityreason.com/securityalert/250)
4. [20051214 Re: IMOEL CMS Sql password discovery](http://www.securityfocus.com/archive/1/419500/100/0/threaded)
5. [1015343](http://securitytracker.com/id?1015343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41472
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: May 14, 2025 at 20:35 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
74cmsSE v3.12.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /apiadmin/notice/add. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xxhzz1/74cmsSE-Storage-cross-site-scripting-vulnerability/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24920, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24920 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24920
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: February 28, 2025 at 20:04 UTC
- **Reserved Date**: January 31, 2023 at 20:37 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Microsoft - Microsoft Dynamics 365 (on-premises) version 9.1**
Affected versions:
- 9.0 (Status: affected)
**Microsoft - Microsoft Dynamics 365 (on-premises) version 9.0**
Affected versions:
- 9.0.0 (Status: affected)
### References
1. [Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24920) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13530
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 07:23 UTC
- **Last Updated**: January 31, 2025 at 19:34 UTC
- **Reserved Date**: January 20, 2025 at 15:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Custom Login Page Styler – Limit Login Attempts – Restrict Content With Login – Redirect After Login – Change Login URL – Sign in , Sign out plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the lps_handle_delete_all_logs(), lps_handle_delete_login_log(), and lps_handle_end_session() functions in all versions up to, and including, 7.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete login logs and end user sessions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**zia-imtiaz - Custom Login Page Styler – Limit Login Attempts – Restrict Content With Login – Redirect After Login – Change Login URL – Sign in , Sign out**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a143d611-9e22-49d1-9a9f-12f1c45685c4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/login-page-styler/tags/7.1.2/loginPageStylerLogSettings.php#L111)
3. [](https://plugins.trac.wordpress.org/browser/login-page-styler/tags/7.1.2/loginPageStylerLogSettings.php#L122)
4. [](https://wordpress.org/plugins/login-page-styler)
5. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3232237%40login-page-styler&new=3232237%40login-page-styler&sfp_email=&sfph_mail=)
### Credits
- Youcef Hamdani |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38660
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 21:11 UTC
- **Last Updated**: November 14, 2024 at 19:37 UTC
- **Reserved Date**: June 25, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Protection mechanism failure in the SPP for some Intel(R) Xeon(R) processor family (E-Core) may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**n/a - Intel(R) Xeon(R) processor family (E-Core)**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01196.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01196.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6417, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6417 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6417
- **State**: PUBLISHED
- **Published Date**: September 28, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 15, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2377-1](http://www.ubuntu.com/usn/USN-2377-1)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1142072)
3. [](https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8)
4. [[oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel](http://www.openwall.com/lists/oss-security/2014/09/15/7)
5. [USN-2378-1](http://www.ubuntu.com/usn/USN-2378-1)
6. [](http://tracker.ceph.com/issues/9560)
7. [](http://tracker.ceph.com/issues/8979)
8. [USN-2379-1](http://www.ubuntu.com/usn/USN-2379-1)
9. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3)
10. [USN-2376-1](http://www.ubuntu.com/usn/USN-2376-1)
11. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2535
- **State**: REJECTED
- **Published Date**: May 05, 2023 at 07:22 UTC
- **Last Updated**: May 05, 2023 at 08:21 UTC
- **Reserved Date**: May 05, 2023 at 06:51 UTC
- **Assigned By**: KNIME
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0866
- **State**: PUBLISHED
- **Published Date**: June 14, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 04, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Java Runtime Environment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2011:0863](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00001.html)
2. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2)
3. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
4. [SUSE-SA:2011:036](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00022.html)
5. [SUSE-SA:2011:032](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00002.html)
6. [](http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html)
7. [oval:org.mitre.oval:def:14545](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14545)
8. [SUSE-SU-2011:0966](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00025.html)
9. [44930](http://secunia.com/advisories/44930)
10. [SUSE-SA:2011:030](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00003.html)
11. [oval:org.mitre.oval:def:14011](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14011)
12. [SSRT100591](http://marc.info/?l=bugtraq&m=132439520301822&w=2)
13. [SSRT100867](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
14. [SUSE-SU-2011:0807](http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00009.html)
15. [openSUSE-SU-2011:0633](http://lists.opensuse.org/opensuse-security-announce/2011-06/msg00003.html)
16. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html)
17. [HPSBUX02697](http://marc.info/?l=bugtraq&m=132439520301822&w=2)
18. [HPSBMU02797](http://marc.info/?l=bugtraq&m=134254957702612&w=2)
19. [](http://www.ibm.com/developerworks/java/jdk/alerts/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39611
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 18:18 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Software FX Chart FX 7 version 7.0.4962.20829 allows attackers to enumerate and read files from the local filesystem by sending crafted web requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1147, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1147
- **State**: PUBLISHED
- **Published Date**: December 19, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: December 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in IIS ISAPI .ASP parsing mechanism allows attackers to execute arbitrary commands via a long string to the "LANGUAGE" argument in a script tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001103 IIS ASP $19.95 hack - IISHack 1.5](http://www.securityfocus.com/archive/1/143070)
2. [iis-isapi-asp-bo(5510)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5510)
3. [1911](http://www.securityfocus.com/bid/1911) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11122
- **State**: PUBLISHED
- **Published Date**: October 04, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 17:57 UTC
- **Reserved Date**: July 09, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On Broadcom BCM4355C0 Wi-Fi chips 9.44.78.27.0.1.56, an attacker can trigger an information leak due to insufficient length validation, related to ICMPv6 router advertisement offloading.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/144461/Broadcom-ICMPv6-Information-Leak.html)
2. [](https://support.apple.com/en-us/HT208113)
3. [](https://support.apple.com/en-us/HT208112)
4. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=1300)
5. [](https://support.apple.com/HT208113)
6. [](https://support.apple.com/HT208112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0508
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 00:00 UTC
- **Last Updated**: January 07, 2025 at 16:58 UTC
- **Reserved Date**: January 25, 2023 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. Open redirection was possible via HTTP response splitting in the NPM package API.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-113: Security Weakness
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=12.9, <15.10.8 (Status: affected)
- >=15.11, <15.11.7 (Status: affected)
- >=16.0, <16.0.2 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/389328)
2. [](https://hackerone.com/reports/1842314)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0508.json)
### Credits
- Thanks [akadrian](https://hackerone.com/akadrian) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42495
- **State**: PUBLISHED
- **Published Date**: September 05, 2024 at 22:41 UTC
- **Last Updated**: September 06, 2024 at 13:26 UTC
- **Reserved Date**: August 05, 2024 at 16:23 UTC
- **Assigned By**: icscert
### Vulnerability Description
Credentials to access device configuration were transmitted using an unencrypted protocol. These credentials would allow read-only access to network configuration information and terminal configuration data.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**Hughes Network Systems - WL3000 Fusion Software**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-249-01)
### Credits
- An anonymous researcher reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44321
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 11:04 UTC
- **Last Updated**: August 13, 2024 at 07:52 UTC
- **Reserved Date**: September 28, 2023 at 16:18 UTC
- **Assigned By**: siemens
### Vulnerability Description
Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Siemens - RUGGEDCOM RM1224 LTE(4G) EU**
Affected versions:
- 0 (Status: affected)
**Siemens - RUGGEDCOM RM1224 LTE(4G) NAM**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M804PB**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M812-1 ADSL-Router family**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M816-1 ADSL-Router family**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M826-2 SHDSL-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M874-2**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M874-3**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M874-3 3G-Router (CN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-3**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-3 (ROK)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE M876-4 (NAM)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM853-1 (A1)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM853-1 (B1)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM853-1 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (A1)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (B1)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (CN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (EU)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE MUM856-1 (RoW)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE S615 EEC LAN-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE S615 LAN-Router**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3 (SC, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3LD (SC, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB205-3LD (SC, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB208 (E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB208 (PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3 (SC, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3 (SC, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3 (ST, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3 (ST, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3LD (SC, E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB213-3LD (SC, PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB216 (E/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XB216 (PN)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2 (SC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2 (ST/BFOC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE (54 V DC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE EEC (54 V DC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2SFP**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2SFP EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G (EIP DEF.)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208G**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208G (EIP def.)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208G EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208G PoE**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC208G PoE (54 V DC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-3G PoE**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-3G PoE (54 V DC)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-4C**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-4C G**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-4C G (EIP Def.)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216-4C G EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC216EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC224**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC224-4C G**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC224-4C G (EIP Def.)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XC224-4C G EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XF204**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XF204 DNA**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XF204-2BA**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XF204-2BA DNA**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP208**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP208 (Ethernet/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP208EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP208PoE EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP216**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP216 (Ethernet/IP)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP216EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XP216POE EEC**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR324WG (24 x FE, AC 230V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR324WG (24 X FE, DC 24V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR326-2C PoE WG**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR326-2C PoE WG (without UL)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (28xGE, AC 230V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (28xGE, DC 24V)**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC206-2**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC206-2SFP**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC208**
Affected versions:
- 0 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC216-4C**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf)
2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf)
3. [](https://cert-portal.siemens.com/productcert/html/ssa-699386.html)
4. [](https://cert-portal.siemens.com/productcert/html/ssa-180704.html)
5. [](https://cert-portal.siemens.com/productcert/html/ssa-602936.html)
6. [](https://cert-portal.siemens.com/productcert/html/ssa-353002.html)
7. [](https://cert-portal.siemens.com/productcert/html/ssa-087301.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25951
- **State**: PUBLISHED
- **Published Date**: March 09, 2024 at 05:56 UTC
- **Last Updated**: August 22, 2024 at 19:03 UTC
- **Reserved Date**: February 13, 2024 at 05:29 UTC
- **Assigned By**: dell
### Vulnerability Description
A command injection vulnerability exists in local RACADM. A malicious authenticated user could gain control of the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1288: Security Weakness
### Affected Products
**Dell - Integrated Dell Remote Access Controller 8**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000222591/dsa-2024-089-security-update-for-dell-idrac8-local-racadm-vulnerability)
### Credits
- NCC Group |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32606
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2021/05/11/16)
2. [[oss-security] 20210512 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation](http://www.openwall.com/lists/oss-security/2021/05/12/1)
3. [[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation](http://www.openwall.com/lists/oss-security/2021/05/13/2)
4. [[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation](http://www.openwall.com/lists/oss-security/2021/05/14/1)
5. [FEDORA-2021-4f852b79d1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HD3NJBG25AADVGPRC63RX2JOQBMPSWK4/)
6. [FEDORA-2021-bae582b42c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/)
7. [FEDORA-2021-8832eab899](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73D53S4IZFPFQMRABMXXLW4AJK3EULDX/)
8. [[oss-security] 20210528 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation](http://www.openwall.com/lists/oss-security/2021/05/28/1)
9. [](https://security.netapp.com/advisory/ntap-20210625-0001/)
10. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b17c400aeb44daf041627722581ade527bb3c1d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0390
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:17 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 27, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Improper access control in Gitlab CE/EE versions 12.7 to 14.5.4, 14.6 to 14.6.4, and 14.7 to 14.7.1 allowed for project non-members to retrieve issue details when it was linked to an item from the vulnerability dashboard.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=14.7, <14.7.1 (Status: affected)
- >=14.6, <14.6.4 (Status: affected)
- >=12.7, <14.5.4 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/330030)
2. [](https://hackerone.com/reports/1179733)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0390.json)
### Credits
- Thanks [wi11](https://hackerone.com/wi11) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21671
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 05:26 UTC
- **Last Updated**: February 27, 2025 at 20:34 UTC
- **Reserved Date**: December 07, 2022 at 02:58 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory Corruption in Core during syscall for Sectools Fuse comparison feature.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6700 (Status: affected)
- FastConnect 6900 (Status: affected)
- QCA6391 (Status: affected)
- QCM6490 (Status: affected)
- QCS6490 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- SD888 (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN6740 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45431
- **State**: PUBLISHED
- **Published Date**: December 27, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 23:07 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: dahua
### Vulnerability Description
Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server.
### Affected Products
**n/a - DSS Professional, DSS Express, DHI-DSS7016D-S2/DHI-DSS7016DR-S2, DHI-DSS4004-S2**
Affected versions:
- V8.0.2, V8.0.4, V8.1 (Status: affected)
### References
1. [](https://www.dahuasecurity.com/support/cybersecurity/details/1137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24189
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 00:00 UTC
- **Last Updated**: March 12, 2025 at 14:27 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XML External Entity (XXE) vulnerability in urule v2.1.7 allows attackers to execute arbitrary code via uploading a crafted XML file to /urule/common/saveFile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/youseries/urule)
2. [](https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24189.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10632
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:11 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
apk-parser2 is a module which extracts Android Manifest info from an APK file. apk-parser2 downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - apk-parser2 node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/223) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9986
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 23:31 UTC
- **Reserved Date**: December 16, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Foundation Reporting Service (JRS) 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120552.
### Affected Products
**IBM - Jazz Reporting Service**
Affected versions:
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 5.0.2 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/120552)
2. [99353](http://www.securityfocus.com/bid/99353)
3. [](http://www.ibm.com/support/docview.wss?uid=swg22001007) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0657
- **State**: PUBLISHED
- **Published Date**: February 18, 2010 at 17:19 UTC
- **Last Updated**: August 07, 2024 at 00:59 UTC
- **Reserved Date**: February 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 4.0.249.78 on Windows does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut, which allows user-assisted remote attackers to execute arbitrary programs or obtain sensitive information by tricking a user into creating a crafted shortcut.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html)
2. [oval:org.mitre.oval:def:14306](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14306)
3. [1023506](http://securitytracker.com/id?1023506)
4. [](http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs)
5. [](http://code.google.com/p/chromium/issues/detail?id=23693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38101
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 13:17 UTC
- **Last Updated**: January 24, 2025 at 17:44 UTC
- **Reserved Date**: September 29, 2022 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) NUC Chaco Canyon BIOS update software**
Affected versions:
- before version iFlashV Windows 5.13.00.2105 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9199
- **State**: REJECTED
- **Last Updated**: March 17, 2025 at 22:38 UTC
- **Reserved Date**: April 02, 2018 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2267
- **State**: PUBLISHED
- **Published Date**: July 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 13, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SR:2005:018](http://www.novell.com/linux/security/advisories/2005_18_sr.html)
2. [P-252](http://www.ciac.org/ciac/bulletins/p-252.shtml)
3. [1014469](http://securitytracker.com/id?1014469)
4. [oval:org.mitre.oval:def:1172](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1172)
5. [FLSA:160202](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202)
6. [RHSA-2005:587](http://www.redhat.com/support/errata/RHSA-2005-587.html)
7. [](http://www.mozilla.org/security/announce/mfsa2005-53.html)
8. [ADV-2005-1075](http://www.vupen.com/english/advisories/2005/1075)
9. [oval:org.mitre.oval:def:11334](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11334)
10. [oval:org.mitre.oval:def:100006](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100006)
11. [SUSE-SA:2005:045](http://www.novell.com/linux/security/advisories/2005_45_mozilla.html)
12. [14242](http://www.securityfocus.com/bid/14242)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=298255)
14. [RHSA-2005:586](http://www.redhat.com/support/errata/RHSA-2005-586.html)
15. [16043](http://secunia.com/advisories/16043)
16. [oval:org.mitre.oval:def:1073](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37957
- **State**: PUBLISHED
- **Published Date**: October 08, 2021 at 21:30 UTC
- **Last Updated**: August 04, 2024 at 01:30 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html)
2. [](https://crbug.com/1242269)
3. [FEDORA-2021-ab09a05562](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/)
4. [FEDORA-2021-591b3a2af0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/)
5. [DSA-5046](https://www.debian.org/security/2022/dsa-5046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9701
- **State**: PUBLISHED
- **Published Date**: June 19, 2019 at 15:55 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 11, 2019 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
DLP 15.5 MP1 and all prior versions may be susceptible to a cross-site scripting (XSS) vulnerability, a type of issue that can enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
### Affected Products
**n/a - Data Loss Prevention**
Affected versions:
- Prior to and including DLP 15.5 MP1 (Status: affected)
### References
1. [](https://support.symantec.com/us/en/article.SYMSA1484.html)
2. [](http://packetstormsecurity.com/files/153512/Symantec-DLP-15.5-MP1-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23984
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 14:23 UTC
- **Last Updated**: February 03, 2025 at 15:01 UTC
- **Reserved Date**: January 16, 2025 at 11:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainvireinfo Dynamic URL SEO allows Reflected XSS. This issue affects Dynamic URL SEO: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Brainvireinfo - Dynamic URL SEO**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/dynamic-url-seo/vulnerability/wordpress-dynamic-url-seo-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40362, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40362
- **State**: PUBLISHED
- **Published Date**: January 12, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 18:31 UTC
- **Reserved Date**: August 14, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user's account when the user ID and contractor information is known.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.classaction.org/news/centralsquare-hit-with-class-action-over-2017-2018-click2gov-data-breach)
2. [](https://github.com/ally-petitt/CVE-2023-40362) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3978
- **State**: PUBLISHED
- **Published Date**: November 17, 2010 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 03:26 UTC
- **Reserved Date**: October 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) admin/products.json, (2) admin/users.json, or (3) admin/overview/get_report_data, related to a "JSON hijacking" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.conviso.com.br/json-hijacking-vulnerability/)
2. [](http://spreecommerce.com/blog/2010/11/02/json-hijacking-vulnerability/)
3. [](https://github.com/railsdog/spree/commit/19944bd999c310d9b10d16a41f48ebac97dc4fac)
4. [](http://spreecommerce.com/blog/2010/11/09/spree-0-30-0-released/)
5. [](https://github.com/railsdog/spree/commit/d881b2bb610ea33e2364ff16feb8e702dfeda135)
6. [](http://www.conviso.com.br/security-advisory-spree-e-commerce-json-v-0-11x/)
7. [](http://twitter.com/conviso/statuses/29555076248)
8. [20101108 Spree e-commerce JSON Hijacking Vulnerabilities - CVE-2010-3978](http://www.securityfocus.com/archive/1/514674/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21912
- **State**: PUBLISHED
- **Published Date**: March 26, 2024 at 15:34 UTC
- **Last Updated**: August 05, 2024 at 16:44 UTC
- **Reserved Date**: January 03, 2024 at 16:40 UTC
- **Assigned By**: Rockwell
### Vulnerability Description
An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Rockwell Automation - Arena Simulation**
Affected versions:
- Version 16.00 - 16.20.02 (Status: affected)
### References
1. [](https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html)
### Credits
- Michael Heinzl |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5509
- **State**: PUBLISHED
- **Published Date**: August 18, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 06:50 UTC
- **Reserved Date**: July 10, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Administration Views module 7.x-1.x before 7.x-1.4 for Drupal, when used with other unspecified modules, does not properly grant access to administration pages, which allows remote administrators to bypass intended restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2430043)
2. [75278](http://www.securityfocus.com/bid/75278)
3. [](https://www.drupal.org/node/2507645)
4. [[oss-security] 20150704 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-100 to SA-CONTRIB-2015-131)](http://www.openwall.com/lists/oss-security/2015/07/04/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0469
- **State**: PUBLISHED
- **Published Date**: May 05, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 19, 2013 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Stack-based buffer overflow in a certain Debian patch for xbuffy before 3.3.bl.3.dfsg-9 allows remote attackers to execute arbitrary code via the subject of an email, possibly related to indent subject lines.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [67090](http://www.securityfocus.com/bid/67090)
2. [DSA-2921](http://www.debian.org/security/2014/dsa-2921)
3. [[oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing](http://www.openwall.com/lists/oss-security/2014/04/28/3)
4. [](http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15161
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 22:32 UTC
- **Last Updated**: November 05, 2020 at 22:32 UTC
- **Reserved Date**: October 08, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29949
- **State**: PUBLISHED
- **Published Date**: June 24, 2021 at 13:18 UTC
- **Last Updated**: August 03, 2024 at 22:18 UTC
- **Reserved Date**: April 01, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-13/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1682101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0064
- **State**: PUBLISHED
- **Published Date**: February 02, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 01, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001219 def-2000-03: MDaemon 3.5.0 DoS](http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html)
2. [2134](http://www.securityfocus.com/bid/2134) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5391
- **State**: PUBLISHED
- **Published Date**: September 11, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the JobScheduler Operations Center (JOC) in SOS JobScheduler before 1.6.4246 and 1.7.x before 1.7.4241 allows remote attackers to inject arbitrary web script or HTML via the hash property (location.hash).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69660](http://www.securityfocus.com/bid/69660)
2. [](http://packetstormsecurity.com/files/128180/JobScheduler-Cross-Site-Scripting.html)
3. [](http://www.sos-berlin.com/modules/news/article.php?storyid=73)
4. [](http://www.sos-berlin.com/modules/news/article.php?storyid=74)
5. [20140907 CVE-2014-5391 DOM-based Cross-Site Scripting (XSS) in "JobScheduler"](http://www.securityfocus.com/archive/1/533372/100/0/threaded)
6. [](https://change.sos-berlin.com/browse/JS-1203)
7. [jobscheduler-cve20145391-xss(95797)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95797)
8. [](http://www.christian-schneider.net/advisories/CVE-2014-5391.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10699
- **State**: PUBLISHED
- **Published Date**: June 30, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 17:41 UTC
- **Reserved Date**: June 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
avcodec 2.2.x, as used in VideoLAN VLC media player 2.2.7-x before 2017-06-29, allows out-of-bounds heap memory write due to calling memcpy() with a wrong size, leading to a denial of service (application crash) or possibly code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1038816](http://www.securitytracker.com/id/1038816)
2. [DSA-4045](https://www.debian.org/security/2017/dsa-4045)
3. [](https://trac.videolan.org/vlc/ticket/18467) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22696
- **State**: PUBLISHED
- **Published Date**: February 04, 2025 at 14:21 UTC
- **Last Updated**: February 04, 2025 at 15:35 UTC
- **Reserved Date**: January 07, 2025 at 21:03 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in EmbedPress Document Block – Upload & Embed Docs. This issue affects Document Block – Upload & Embed Docs: from n/a through 1.1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**EmbedPress - Document Block – Upload & Embed Docs**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/document/vulnerability/wordpress-document-block-upload-embed-docs-pdf-ppt-xls-or-any-documents-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve)
### Credits
- savphill (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8813
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210727)
2. [](https://support.apple.com/HT210721)
3. [](https://support.apple.com/HT210726)
4. [](https://support.apple.com/HT210723)
5. [](https://support.apple.com/HT210725)
6. [GLSA-202003-22](https://security.gentoo.org/glsa/202003-22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24122
- **State**: PUBLISHED
- **Published Date**: January 29, 2022 at 21:33 UTC
- **Last Updated**: August 03, 2024 at 03:59 UTC
- **Reserved Date**: January 29, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/f9d87929d451d3e649699d0f1d74f71f77ad38f5)
2. [](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9d87929d451d3e649699d0f1d74f71f77ad38f5)
3. [](https://www.openwall.com/lists/oss-security/2022/01/29/1)
4. [FEDORA-2022-57fd391bf8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSR3AI2IQGRKZCHNKF6S25JGDKUEAWWL/)
5. [FEDORA-2022-667a5c6e26](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVSZKUJAZ2VN6LJ35J2B6YD6BOPQTU3B/)
6. [](https://security.netapp.com/advisory/ntap-20220221-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20963
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 21:18 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31180
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 19:11 UTC
- **Last Updated**: August 03, 2024 at 22:55 UTC
- **Reserved Date**: April 14, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Graphics Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Word 2016**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office 2013 Service Pack 1**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1**
Affected versions:
- 15.0.1 (Status: affected)
**Microsoft - Microsoft Word 2013 Service Pack 1 **
Affected versions:
- 15.0.1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31180) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1945
- **State**: PUBLISHED
- **Published Date**: May 18, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in openMairie Openfoncier 2.00, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) action.class.php, (2) architecte.class.php, (3) avis.class.php, (4) bible.class.php, and (5) blocnote.class.php in obj/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64197](http://www.osvdb.org/64197)
2. [12366](http://www.exploit-db.com/exploits/12366)
3. [](http://packetstormsecurity.org/1004-exploits/openfoncier-rfilfi.txt)
4. [39607](http://secunia.com/advisories/39607)
5. [64196](http://www.osvdb.org/64196)
6. [64200](http://www.osvdb.org/64200)
7. [64199](http://www.osvdb.org/64199)
8. [64198](http://www.osvdb.org/64198) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8694
- **State**: PUBLISHED
- **Published Date**: January 31, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 15, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The bm_readbody_bmp function in bitmap_io.c in potrace before 1.13 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted BMP image, a different vulnerability than CVE-2016-8695 and CVE-2016-8696.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93778](http://www.securityfocus.com/bid/93778)
2. [[oss-security] 20161015 Re: potrace: multiple crashes](http://www.openwall.com/lists/oss-security/2016/10/16/12)
3. [](https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/)
4. [[oss-security] 20160818 potrace: multiple crashes](http://www.openwall.com/lists/oss-security/2016/08/18/11)
5. [](http://potrace.sourceforge.net/ChangeLog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4825
- **State**: PUBLISHED
- **Published Date**: December 15, 2011 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: December 14, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Static code injection vulnerability in inc/function.base.php in Ajax File and Image Manager before 1.1, as used in tinymce before 1.4.2, phpMyFAQ 2.6 before 2.6.19 and 2.7 before 2.7.1, and possibly other products, allows remote attackers to inject arbitrary PHP code into data.php via crafted parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zenphoto.org/trac/ticket/2005)
2. [](http://www.phpmyfaq.de/advisory_2011-10-25.php)
3. [](http://www.phpletter.com/en/DOWNLOAD/1/)
4. [50523](http://www.securityfocus.com/bid/50523)
5. [18075](http://www.exploit-db.com/exploits/18075) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7534
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3416
- **State**: PUBLISHED
- **Published Date**: January 09, 2023 at 22:13 UTC
- **Last Updated**: April 09, 2025 at 19:14 UTC
- **Reserved Date**: October 07, 2022 at 05:51 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPtouch WordPress plugin before 4.3.45 does not properly validate images to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness
### Affected Products
**Unknown - WPtouch**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6)
### Credits
- Nguyen Duy Quoc Khanh
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2454, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2454
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 02:05 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 13, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Hyperion Common Admin component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows remote attackers to affect confidentiality via unknown vectors related to User Interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6576
- **State**: PUBLISHED
- **Published Date**: December 07, 2023 at 20:31 UTC
- **Last Updated**: August 02, 2024 at 08:35 UTC
- **Reserved Date**: December 07, 2023 at 12:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Byzoro S210 up to 20231123. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php of the component HTTP POST Request Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Byzoro - S210**
Affected versions:
- 20231123 (Status: affected)
### References
1. [VDB-247156 | Byzoro S210 HTTP POST Request uploadfile.php unrestricted upload](https://vuldb.com/?id.247156)
2. [VDB-247156 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.247156)
3. [Submit #242777 | Beijing Baizhuo Network Technology Co., LTD S210 multi-service security gateway intelligent management platform S210 Any file upload](https://vuldb.com/?submit.242777)
4. [](https://github.com/willchen0011/cve/blob/main/upload.md)
### Credits
- willchen (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25153
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 10:11 UTC
- **Last Updated**: February 12, 2025 at 20:51 UTC
- **Reserved Date**: February 03, 2025 at 13:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in djjmz Simple Auto Tag allows Stored XSS. This issue affects Simple Auto Tag: from n/a through 1.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**djjmz - Simple Auto Tag**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simple-auto-tag/vulnerability/wordpress-simple-auto-tag-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34213
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 16:42 UTC
- **Last Updated**: February 13, 2025 at 15:53 UTC
- **Reserved Date**: May 02, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the SetPortForwardRules function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetPortForwardRules) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11964
- **State**: PUBLISHED
- **Published Date**: April 21, 2020 at 12:05 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In IQrouter through 3.3.1, the Lua function diag_set_password in the web-panel allows remote attackers to change the root password arbitrarily. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://evenroute.com/)
2. [](https://pastebin.com/grSCSBSu)
3. [](https://openwrt.org/docs/guide-quick-start/walkthrough_login)
4. [](https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0031
- **State**: PUBLISHED
- **Published Date**: June 11, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: January 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflows in Yahoo! Messenger 5,0,0,1064 and earlier allows remote attackers to execute arbitrary code via a ymsgr URI with long arguments to (1) call, (2) sendim, (3) getimv, (4) chat, (5) addview, or (6) addfriend.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [CA-2002-16](http://www.cert.org/advisories/CA-2002-16.html)
2. [VU#137115](http://www.kb.cert.org/vuls/id/137115)
3. [20020527 Yahoo Messenger - Multiple Vulnerabilities](http://online.securityfocus.com/archive/1/274223)
4. [4837](http://www.securityfocus.com/bid/4837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1502
- **State**: PUBLISHED
- **Published Date**: March 25, 2008 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29491](http://secunia.com/advisories/29491)
2. [31017](http://secunia.com/advisories/31017)
3. [32400](http://secunia.com/advisories/32400)
4. [SUSE-SR:2008:015](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html)
5. [32446](http://secunia.com/advisories/32446)
6. [DSA-1871](http://www.debian.org/security/2009/dsa-1871)
7. [30986](http://secunia.com/advisories/30986)
8. [egroupware-badprotocolonce-security-bypass(41435)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41435)
9. [](http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110)
10. [FEDORA-2008-6226](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html)
11. [31018](http://secunia.com/advisories/31018)
12. [USN-658-1](https://usn.ubuntu.com/658-1/)
13. [](http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5)
14. [[oss-security] 20080708 Re: CVE request: moodle xss in < 1.8.5](http://www.openwall.com/lists/oss-security/2008/07/08/14)
15. [30073](http://secunia.com/advisories/30073)
16. [](http://www.egroupware.org/changelog)
17. [28424](http://www.securityfocus.com/bid/28424)
18. [GLSA-200805-04](http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml)
19. [ADV-2008-0989](http://www.vupen.com/english/advisories/2008/0989/references)
20. [DSA-1691](http://www.debian.org/security/2008/dsa-1691)
21. [31167](http://secunia.com/advisories/31167) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.