System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1713
- **State**: PUBLISHED
- **Published Date**: May 13, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032282](http://www.securitytracker.com/id/1032282)
2. [MS15-043](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043)
3. [74518](http://www.securityfocus.com/bid/74518) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44178
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 23:01 UTC
- **Last Updated**: September 18, 2024 at 14:42 UTC
- **Reserved Date**: September 26, 2023 at 19:30 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS
* All versions prior to 19.1R3-S10;
* 19.2 versions prior to 19.2R3-S7;
* 19.3 versions prior to 19.3R3-S8;
* 19.4 versions prior to 19.4R3-S12;
* 20.2 versions prior to 20.2R3-S8;
* 20.4 versions prior to 20.4R3-S8;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S2;
* 22.3 versions prior to 22.3R3-S1;
* 22.4 versions prior to 22.4R2-S1;
* 23.2 versions prior to 23.2R2.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.2 (Status: affected)
- 20.4 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
- 23.2 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA73140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1460
- **State**: PUBLISHED
- **Published Date**: March 14, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-2732](http://www.vupen.com/english/advisories/2007/2732)
2. [25056](http://secunia.com/advisories/25056)
3. [APPLE-SA-2007-07-31](http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html)
4. [](http://us2.php.net/releases/4_4_7.php)
5. [](http://us2.php.net/releases/5_2_2.php)
6. [](http://docs.info.apple.com/article.html?artnum=306172)
7. [25159](http://www.securityfocus.com/bid/25159)
8. [](http://www.php-security.org/MOPB/MOPB-20-2007.html)
9. [SUSE-SA:2007:032](http://www.novell.com/linux/security/advisories/2007_32_php.html)
10. [26235](http://secunia.com/advisories/26235)
11. [22954](http://www.securityfocus.com/bid/22954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4500
- **State**: PUBLISHED
- **Published Date**: August 31, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: August 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in ezPortal/ztml CMS 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) about, (2) again, (3) lastname, (4) email, (5) password, (6) album, (7) id, (8) table, (9) desc, (10) doc, (11) mname, (12) max, (13) htpl, (14) pheader, and possibly other parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060830 Ezportal/Ztml v1.0 Multiple vulnerabilities](http://www.securityfocus.com/archive/1/444743/100/0/threaded)
2. [1481](http://securityreason.com/securityalert/1481)
3. [ezportalztml-index-xss(28666)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28666)
4. [19759](http://www.securityfocus.com/bid/19759) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52043, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52043 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52043
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 00:00 UTC
- **Last Updated**: September 06, 2024 at 16:33 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in D-Link COVR 1100, 1102, 1103 AC1200 Dual-Band Whole-Home Mesh Wi-Fi System (Hardware Rev B1) truncates Wireless Access Point Passwords (WPA-PSK) allowing an attacker to gain unauthorized network access via weak authentication controls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exploots.github.io/posts/2024/01/18/d-link-covr-1102-vulnerability.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16144
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 17:59 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: July 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
When using an object storage like S3 as the file store, when a user creates a public link to a folder where anonymous users can upload files, and another user uploads a virus the files antivirus app would detect the virus but fails to delete it due to permission issues. This affects the files_antivirus component versions before 0.15.2 for ownCloud.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owncloud.com/security-advisories/files-antivirus-doesnt-delete-virus-if-uploaded-through-public-link/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36203, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36203 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36203
- **State**: PUBLISHED
- **Published Date**: August 31, 2022 at 20:36 UTC
- **Last Updated**: August 03, 2024 at 10:00 UTC
- **Reserved Date**: July 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Doctor's Appointment System 1.0 is vulnerable to Cross Site Scripting (XSS) via the admin panel. In addition, it leads to takeover the administrator account by stealing the cookie via XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sourcecodester.com/hashenudara/simple-doctors-appointment-project.html)
2. [](https://github.com/aznull/CVEs)
3. [](http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24564
- **State**: PUBLISHED
- **Published Date**: August 23, 2021 at 11:10 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPFront Scroll Top WordPress plugin before 2.0.6.07225 does not sanitise or escape its Image ALT setting before outputting it attributes, leading to an Authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - WPFront Scroll Top**
Affected versions:
- 2.0.6.07225 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b25af0e1-392f-4305-ad44-50e64ef3dbdf)
### Credits
- Asif Nawaz Minhas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4398, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4398
- **State**: PUBLISHED
- **Published Date**: August 18, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple CRLF injection vulnerabilities in the (1) now-playing.rb and (2) xmms.pl 1.1 scripts for WeeChat allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39564](http://osvdb.org/39564)
2. [25281](http://www.securityfocus.com/bid/25281)
3. [3036](http://securityreason.com/securityalert/3036)
4. [39565](http://osvdb.org/39565)
5. [20070812 Vulnerability in multiple "now playing" scripts for various IRC clients](http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html)
6. [26490](http://secunia.com/advisories/26490)
7. [20070812 Vulnerability in multiple "now playing" scripts for various IRC clients](http://www.securityfocus.com/archive/1/476283/100/0/threaded)
8. [irc-multiple-command-execution(35985)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35985)
9. [](http://git.sv.gnu.org/gitweb/?p=weechat/scripts.git%3Ba=commit%3Bh=7429c29a2fab6d7493c0188b5f631a7c2ae1533d)
10. [](http://git.sv.gnu.org/gitweb/?p=weechat/scripts.git%3Ba=commit%3Bh=76f7f7b502352ba2b823e3388a2ca88840fd1945)
11. [26457](http://secunia.com/advisories/26457)
12. [](http://wouter.coekaerts.be/site/security/nowplaying) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8924
- **State**: PUBLISHED
- **Published Date**: September 20, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: June 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3033-1](http://www.ubuntu.com/usn/USN-3033-1)
2. [RHSA-2016:1844](http://rhn.redhat.com/errata/RHSA-2016-1844.html)
3. [](https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
5. [91308](http://www.securityfocus.com/bid/91308)
6. [SUSE-SU-2016:1909](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html)
7. [[oss-security] 20160617 Many invalid memory access issues in libarchive](http://www.openwall.com/lists/oss-security/2016/06/17/2)
8. [GLSA-201701-03](https://security.gentoo.org/glsa/201701-03)
9. [[oss-security] 20160617 Re: Many invalid memory access issues in libarchive](http://www.openwall.com/lists/oss-security/2016/06/17/5)
10. [DSA-3657](http://www.debian.org/security/2016/dsa-3657)
11. [](https://github.com/libarchive/libarchive/issues/515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4795
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 06, 2012 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11681
- **State**: PUBLISHED
- **Published Date**: June 04, 2020 at 18:40 UTC
- **Last Updated**: August 04, 2024 at 11:35 UTC
- **Reserved Date**: April 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass)
2. [20200605 Castel NextGen DVR multiple CVEs](http://seclists.org/fulldisclosure/2020/Jun/8)
3. [](http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53032
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 10:07 UTC
- **Last Updated**: March 05, 2025 at 04:55 UTC
- **Reserved Date**: November 19, 2024 at 01:01 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption may occur in keyboard virtual device due to guest VM interaction.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QAM8620P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QAMSRV1H (Status: affected)
- QAMSRV1M (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6688AQ (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8770P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SRV1H (Status: affected)
- SRV1L (Status: affected)
- SRV1M (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26559
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 14:15 UTC
- **Last Updated**: February 13, 2025 at 16:27 UTC
- **Reserved Date**: February 02, 2021 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Airflow**
Affected versions:
- Apache Airflow 2.0.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E)
2. [[oss-security] 20210217 CVE-2021-26559: Apache Airflow 2.0.0: CWE-284 Improper Access Control on Configurations Endpoint for the Stable API](http://www.openwall.com/lists/oss-security/2021/02/17/1)
3. [[announce] 20210217 CVE-2021-26559: Apache Airflow: CWE-284 Privilege Escalation Attack](https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8%40%3Cannounce.apache.org%3E)
### Credits
- Apache Airflow would like to thank Ian Carroll for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11712
- **State**: PUBLISHED
- **Published Date**: July 23, 2019 at 13:19 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 03, 2019 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2019-21/)
2. [](https://www.mozilla.org/security/advisories/mfsa2019-22/)
3. [](https://www.mozilla.org/security/advisories/mfsa2019-23/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1543804)
5. [openSUSE-SU-2019:1811](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html)
6. [openSUSE-SU-2019:1813](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html)
7. [[debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2019/08/msg00001.html)
8. [[debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2019/08/msg00002.html)
9. [GLSA-201908-12](https://security.gentoo.org/glsa/201908-12)
10. [GLSA-201908-20](https://security.gentoo.org/glsa/201908-20)
11. [openSUSE-SU-2019:1990](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html)
12. [openSUSE-SU-2019:2248](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html)
13. [openSUSE-SU-2019:2249](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2563
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:24 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: LDAP Library). Supported versions that are affected are 10 and 11.3. Difficult to exploit vulnerability allows low privileged attacker with network access via LDAP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Solaris Operating System**
Affected versions:
- 10 (Status: affected)
- 11.3 (Status: affected)
### References
1. [1040702](http://www.securitytracker.com/id/1040702)
2. [103888](http://www.securityfocus.com/bid/103888)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2012, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2012
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 13:16 UTC
- **Last Updated**: August 01, 2024 at 18:56 UTC
- **Reserved Date**: February 29, 2024 at 13:42 UTC
- **Assigned By**: Hitachi Energy
### Vulnerability Description
vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway that if exploited an attacker could use to allow unintended commands or
code to be executed on the UNEM server allowing sensitive data to
be read or modified or could cause other unintended behavior
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**Hitachi Energy - FOXMAN-UN**
Affected versions:
- FOXMAN-UN R16B PC2 (Status: affected)
- FOXMAN-UN R16B PC3 (Status: unaffected)
- FOXMAN-UN R15B PC4 (Status: affected)
- FOXMAN-UN R15B PC5 (Status: unaffected)
- FOXMAN-UN R16A (Status: affected)
- FOXMAN-UN R15A (Status: affected)
**Hitachi Energy - UNEM**
Affected versions:
- UNEM R16B PC2 (Status: affected)
- UNEM R16B PC3 (Status: unaffected)
- UNEM R15B PC4 (Status: affected)
- UNEM R15B PC5 (Status: affected)
- UNEM R15A (Status: affected)
- UNEM R16A (Status: affected)
### References
1. [](https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7403
- **State**: PUBLISHED
- **Published Date**: February 05, 2019 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:36 UTC
- **Reserved Date**: February 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PHPMyWind 5.5. It allows remote attackers to delete arbitrary folders via an admin/database_backup.php?action=import&dopost=deldir&tbname=../ URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/panghusec/exploit/issues/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14179
- **State**: PUBLISHED
- **Published Date**: September 21, 2020 at 00:50 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: June 16, 2020 at 00:00 UTC
- **Assigned By**: atlassian
### Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
### Affected Products
**Atlassian - Jira Server**
Affected versions:
- unspecified (Status: affected)
- 8.6.0 (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://jira.atlassian.com/browse/JRASERVER-71536) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12896
- **State**: PUBLISHED
- **Published Date**: July 02, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.kernel.org/show_bug.cgi?id=200189)
2. [USN-3848-2](https://usn.ubuntu.com/3848-2/)
3. [USN-3847-1](https://usn.ubuntu.com/3847-1/)
4. [](https://github.com/torvalds/linux/commit/78c9c4dfbf8c04883941445a195276bb4bb92c76)
5. [USN-3847-2](https://usn.ubuntu.com/3847-2/)
6. [USN-3849-1](https://usn.ubuntu.com/3849-1/)
7. [USN-3849-2](https://usn.ubuntu.com/3849-2/)
8. [USN-3848-1](https://usn.ubuntu.com/3848-1/)
9. [USN-3847-3](https://usn.ubuntu.com/3847-3/)
10. [](https://github.com/lcytxw/bug_repro/tree/master/bug_200189)
11. [[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html)
12. [[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html)
13. [[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update](https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10800
- **State**: PUBLISHED
- **Published Date**: July 13, 2022 at 11:50 UTC
- **Last Updated**: September 16, 2024 at 22:08 UTC
- **Reserved Date**: April 03, 2019 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C`
### Affected Products
**n/a - codecov**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-PYTHON-CODECOV-552149)
2. [](https://github.com/codecov/codecov-python/commit/2a80aa434f74feb31242b6f213b75ce63ae97902)
### Credits
- Sam Sanoop of Snyk Security Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3998
- **State**: PUBLISHED
- **Published Date**: April 28, 2025 at 03:00 UTC
- **Last Updated**: April 28, 2025 at 18:04 UTC
- **Reserved Date**: April 26, 2025 at 08:19 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file renew.php?id=6. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**CodeAstro - Membership Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306334 | CodeAstro Membership Management System renew.php sql injection](https://vuldb.com/?id.306334)
2. [VDB-306334 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306334)
3. [Submit #557972 | codeastro MembershipM-PHP V1.0 SQL Injection](https://vuldb.com/?submit.557972)
4. [](https://github.com/lyg986443/cve/issues/4)
5. [](https://codeastro.com/)
### Credits
- bjbzbj (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10993
- **State**: PUBLISHED
- **Published Date**: March 26, 2020 at 23:41 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Osmand through 2.0.0 allow XXE because of binary/BinaryMapIndexReader.java.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/osmandapp/Osmand/issues/8711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0489, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0489
- **State**: PUBLISHED
- **Published Date**: June 11, 2021 at 16:42 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In memory management driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183464866
### Affected Products
**n/a - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21237
- **State**: PUBLISHED
- **Published Date**: December 27, 2021 at 22:22 UTC
- **Last Updated**: August 04, 2024 at 14:22 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the user login box of LJCMS v1.11 allows attackers to hijack user accounts via brute force attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wind-cyber/LJCMS-UserTraversal-Vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1253, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1253
- **State**: PUBLISHED
- **Published Date**: December 05, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: December 27, 2015 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The most package in Debian wheezy before 5.0.0a-2.2, in Debian jessie before 5.0.0a-2.3+deb8u1, and in Debian unstable before 5.0.0a-3 allows remote attackers to execute arbitrary commands via shell metacharacters in the name of an LZMA-compressed file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94931](http://www.securityfocus.com/bid/94931)
2. [[oss-security] 20161214 CVE-2016-1253 most: shell command injection through filenames](http://seclists.org/oss-sec/2016/q4/666)
3. [[debian-lts-announce] 20161216 [SECURITY] [DLA 745-1] most security update](https://lists.debian.org/debian-lts-announce/2016/12/msg00020.html)
4. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848132) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13784
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45046](https://www.exploit-db.com/exploits/45046/)
2. [](https://github.com/PrestaShop/PrestaShop/pull/9222)
3. [](http://build.prestashop.com/news/prestashop-1-7-3-4-1-6-1-20-maintenance-releases/)
4. [](https://github.com/PrestaShop/PrestaShop/pull/9218)
5. [45047](https://www.exploit-db.com/exploits/45047/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0211
- **State**: PUBLISHED
- **Published Date**: June 11, 2020 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In SumCompoundHorizontalTaps of convolve_neon.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147491773
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2020-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4333
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38547
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 15:24 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Logitech Z120 and S120 speakers through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nassiben.com/glowworm-attack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45077
- **State**: PUBLISHED
- **Published Date**: December 30, 2021 at 21:31 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 30, 2021 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
### Affected Products
**n/a - Netgear Nighthawk R6700**
Affected versions:
- 1.0.4.120 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2021-57) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2350
- **State**: PUBLISHED
- **Published Date**: July 07, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: July 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Internet Explorer 6.0.2900.2180 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://websecurity.com.ua/3386/)
2. [](http://websecurity.com.ua/3275/)
3. [20090703 Re: Cross-Site Scripting vulnerabilities in Mozilla, Internet Explorer, Opera and Chrome](http://www.securityfocus.com/archive/1/504723/100/0/threaded)
4. [20090702 Cross-Site Scripting vulnerabilities in Mozilla, Internet Explorer, Opera and Chrome](http://www.securityfocus.com/archive/1/504718/100/0/threaded)
5. [35570](http://www.securityfocus.com/bid/35570) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7230, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7230
- **State**: PUBLISHED
- **Published Date**: September 14, 2009 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:02 UTC
- **Reserved Date**: September 14, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Small Footprint CIM Broker (SFCB) before 1.2.5 has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50224](http://osvdb.org/50224)
2. [](http://freshmeat.net/projects/sfcb/releases/269256) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32521
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 08:56 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 09:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Client-Side Enforcement of Server-Side Security vulnerability in Highfivery LLC Zero Spam allows Removing Important Client Functionality.This issue affects Zero Spam: from n/a through 5.5.6.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**Highfivery LLC - Zero Spam**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/zero-spam/wordpress-zero-spam-for-wordpress-plugin-5-5-5-bypass-spam-protection-vulnerability?_s_id=cve)
### Credits
- Brandon Roldan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34295, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34295
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:57 UTC
- **Last Updated**: August 02, 2024 at 16:10 UTC
- **Reserved Date**: May 31, 2023 at 19:51 UTC
- **Assigned By**: zdi
### Vulnerability Description
Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21125.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Sante - DICOM Viewer Pro**
Affected versions:
- 12.2.3.0 (Status: affected)
### References
1. [ZDI-23-854](https://www.zerodayinitiative.com/advisories/ZDI-23-854/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5887
- **State**: PUBLISHED
- **Published Date**: November 17, 2012 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 17, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21626891)
2. [51371](http://secunia.com/advisories/51371)
3. [openSUSE-SU-2012:1700](http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html)
4. [](http://svn.apache.org/viewvc?view=revision&revision=1392248)
5. [RHSA-2013:0631](http://rhn.redhat.com/errata/RHSA-2013-0631.html)
6. [RHSA-2013:0640](http://rhn.redhat.com/errata/RHSA-2013-0640.html)
7. [USN-1637-1](http://www.ubuntu.com/usn/USN-1637-1)
8. [56403](http://www.securityfocus.com/bid/56403)
9. [](http://tomcat.apache.org/security-7.html)
10. [RHSA-2013:0648](http://rhn.redhat.com/errata/RHSA-2013-0648.html)
11. [RHSA-2013:0633](http://rhn.redhat.com/errata/RHSA-2013-0633.html)
12. [RHSA-2013:0629](http://rhn.redhat.com/errata/RHSA-2013-0629.html)
13. [tomcat-digest-security-bypass(79809)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79809)
14. [RHSA-2013:0647](http://rhn.redhat.com/errata/RHSA-2013-0647.html)
15. [RHSA-2013:0632](http://rhn.redhat.com/errata/RHSA-2013-0632.html)
16. [](http://tomcat.apache.org/security-6.html)
17. [](http://svn.apache.org/viewvc?view=revision&revision=1380829)
18. [openSUSE-SU-2013:0147](http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html)
19. [RHSA-2013:0623](http://rhn.redhat.com/errata/RHSA-2013-0623.html)
20. [](http://tomcat.apache.org/security-5.html)
21. [](http://svn.apache.org/viewvc?view=revision&revision=1377807)
22. [openSUSE-SU-2012:1701](http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html)
23. [RHSA-2013:0726](http://rhn.redhat.com/errata/RHSA-2013-0726.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14041
- **State**: PUBLISHED
- **Published Date**: July 13, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20190509 dotCMS v5.1.1 Vulnerabilities](https://seclists.org/bugtraq/2019/May/18)
2. [20190510 dotCMS v5.1.1 HTML Injection & XSS Vulnerability](http://seclists.org/fulldisclosure/2019/May/11)
3. [20190510 dotCMS v5.1.1 Vulnerabilities](http://seclists.org/fulldisclosure/2019/May/10)
4. [20190510 Re: dotCMS v5.1.1 HTML Injection & XSS Vulnerability](http://seclists.org/fulldisclosure/2019/May/13)
5. [RHSA-2019:1456](https://access.redhat.com/errata/RHSA-2019:1456)
6. [[superset-dev] 20190926 Re: [VOTE] Release Superset 0.34.1 based on Superset 0.34.1rc1](https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e%40%3Cdev.superset.apache.org%3E)
7. [[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities](https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E)
8. [[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E)
9. [[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities](https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E)
10. [](http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html)
11. [](http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html)
12. [[hbase-issues] 20201116 [GitHub] [hbase] symat opened a new pull request #2661: HBASE-25261 Upgrade Bootstrap to 3.4.1](https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714%40%3Cissues.hbase.apache.org%3E)
13. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
14. [](https://github.com/twbs/bootstrap/pull/26630)
15. [](https://github.com/twbs/bootstrap/issues/26423)
16. [](https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/)
17. [](https://github.com/twbs/bootstrap/issues/26627) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11241
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 14:31 UTC
- **Last Updated**: November 15, 2024 at 18:27 UTC
- **Reserved Date**: November 15, 2024 at 07:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Job Recruitment 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file reset.php. The manipulation of the argument e leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Job Recruitment**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-284677 | code-projects Job Recruitment reset.php sql injection](https://vuldb.com/?id.284677)
2. [VDB-284677 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.284677)
3. [Submit #442036 | code-projects Job-recruitment-in-php v1.0 Sql Injection And write Trojans](https://vuldb.com/?submit.442036)
4. [](https://github.com/Anti-Entropy-Zhurong/cve/blob/main/sql-1.md)
5. [](https://code-projects.org/)
### Credits
- TTMSTW (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19389
- **State**: PUBLISHED
- **Published Date**: November 20, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (Break instruction exception and application crash) via BMP data because of a ConvertToPDF_x86!ConnectedPDF::ConnectedPDFSDK::FCP_SendEmailNotification issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/20/2018/11/2018-11-20/index.html)
2. [](https://yan-1-20.github.io/2018/11/20/2018/11/2018-11-20/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47421
- **State**: PUBLISHED
- **Published Date**: October 09, 2024 at 14:29 UTC
- **Last Updated**: October 09, 2024 at 15:57 UTC
- **Reserved Date**: September 24, 2024 at 17:40 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Adobe Framemaker**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/framemaker/apsb24-82.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1093, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1093
- **State**: PUBLISHED
- **Published Date**: March 15, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: March 15, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in msgchk in Digital UNIX 4.0G and earlier allows local users to execute arbitrary code via a long command line argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [du-msgchk-bo(7101)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7101)
2. [3311](http://www.securityfocus.com/bid/3311)
3. [20010910 Digital Unix 4.0x msgchk multiple vulnerabilities](http://www.securityfocus.com/archive/1/213238) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14196
- **State**: PUBLISHED
- **Published Date**: November 30, 2017 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Squiz Matrix from 5.3 through to 5.3.6.1 and 5.4.1.3. An information disclosure caused by a Path Traversal issue in the 'File Bridge' plugin allowed the existence of files outside of the bridged path to be confirmed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://devalias.net/devalias/2017/09/07/squiz-matrix-multiple-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0244
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 14:49 UTC
- **Last Updated**: August 02, 2024 at 05:02 UTC
- **Reserved Date**: January 12, 2023 at 14:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in TuziCMS 2.0.6. This vulnerability affects the function delall of the file \App\Manage\Controller\KefuController.class.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218152.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - TuziCMS**
Affected versions:
- 2.0.6 (Status: affected)
### References
1. [](https://vuldb.com/?id.218152)
2. [](https://vuldb.com/?ctiid.218152)
3. [](https://github.com/yeyinshi/tuzicms/issues/13)
### Credits
- Evilmu1 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23661
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:06 UTC
- **Last Updated**: January 17, 2025 at 19:16 UTC
- **Reserved Date**: January 16, 2025 at 11:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana NV Slider allows Stored XSS.This issue affects NV Slider: from n/a through 1.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Ryan Sutana - NV Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/nv-slider/vulnerability/wordpress-nv-slider-plugin-1-6-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4366
- **State**: PUBLISHED
- **Published Date**: September 18, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Mail in Apple iOS before 8 does not prevent sending a LOGIN command to a LOGINDISABLED IMAP server, which allows remote attackers to obtain sensitive cleartext information by sniffing the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT6441)
2. [1030866](http://www.securitytracker.com/id/1030866)
3. [69882](http://www.securityfocus.com/bid/69882)
4. [appleios-cve20144366-info-disc(96098)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96098)
5. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html)
6. [69914](http://www.securityfocus.com/bid/69914) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1206
- **State**: PUBLISHED
- **Published Date**: October 06, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:33 UTC
- **Reserved Date**: January 21, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap-based buffer overflow in Google Chrome before M40 allows remote attackers to cause a denial of service (unpaged memory write and process crash) via a crafted MP4 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=453979)
2. [](https://gist.github.com/bittorrent3389/8fee7cdaa73d1d351ee9)
3. [](https://bugs.chromium.org/p/chromium/issues/detail?id=444522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2279
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 05:33 UTC
- **Last Updated**: September 27, 2024 at 19:11 UTC
- **Reserved Date**: April 25, 2023 at 11:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Directory Kit plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the 'admin_page_display' function. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, modify or delete Directory Kit related posts and terms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Partial patches were made avilable in versions 1.2.0 and 1.2.1 but the issue was not fully patched until 1.2.2
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**listingthemes - WP Directory Kit**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7a6da3-d67c-42b3-8826-7e7fc9b938b4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wpdirectorykit/tags/1.1.8/admin/class-wpdirectorykit-admin.php#L170)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2905795%40wpdirectorykit%2Ftrunk&old=2905046%40wpdirectorykit%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13653
- **State**: REJECTED
- **Published Date**: May 08, 2020 at 15:10 UTC
- **Last Updated**: May 08, 2020 at 15:10 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21994
- **State**: PUBLISHED
- **Published Date**: July 18, 2023 at 20:18 UTC
- **Last Updated**: September 13, 2024 at 18:25 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Mobile Security Suite product of Oracle Fusion Middleware (component: Android Mobile Authenticator App). Supported versions that are affected are Prior to 11.1.2.3.1. Easily exploitable vulnerability allows unauthenticated attacker with access to the physical communication segment attached to the hardware where the Oracle Mobile Security Suite executes to compromise Oracle Mobile Security Suite. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Mobile Security Suite accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Mobile Security Suite**
Affected versions:
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujul2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29607
- **State**: PUBLISHED
- **Published Date**: December 16, 2020 at 14:28 UTC
- **Last Updated**: April 16, 2025 at 14:24 UTC
- **Reserved Date**: December 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pluck-cms/pluck/issues/96)
2. [](http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html)
3. [](https://github.com/Hacker5preme/Exploits/tree/main/CVE-2020-29607-Exploit)
4. [](https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-29607.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46450
- **State**: PUBLISHED
- **Published Date**: October 26, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 20:42 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://youtu.be/LQy0_xIK2q0)
2. [](https://github.com/yte121/-CVE-2023-46450/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8621
- **State**: PUBLISHED
- **Published Date**: August 21, 2020 at 20:50 UTC
- **Last Updated**: September 16, 2024 at 16:18 UTC
- **Reserved Date**: February 05, 2020 at 00:00 UTC
- **Assigned By**: isc
### Vulnerability Description
In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**ISC - BIND9**
Affected versions:
- 9.14.0 (Status: affected)
### References
1. [](https://kb.isc.org/docs/cve-2020-8621)
2. [](https://security.netapp.com/advisory/ntap-20200827-0003/)
3. [USN-4468-1](https://usn.ubuntu.com/4468-1/)
4. [GLSA-202008-19](https://security.gentoo.org/glsa/202008-19)
5. [](https://www.synology.com/security/advisory/Synology_SA_20_19)
6. [openSUSE-SU-2020:1699](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html)
7. [openSUSE-SU-2020:1701](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html)
### Credits
- ISC would like to thank Joseph Gullo for bringing this vulnerability to our attention. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30177
- **State**: PUBLISHED
- **Published Date**: April 07, 2021 at 10:48 UTC
- **Last Updated**: August 03, 2024 at 22:24 UTC
- **Reserved Date**: April 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a SQL Injection vulnerability in PHP-Nuke 8.3.3 in the User Registration section, leading to remote code execution. This occurs because the U.S. state is not validated to be two letters, and the OrderBy field is not validated to be one of LASTNAME, CITY, or STATE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/stacksmasher007/41e946fc9a5a2f0b6950626cc9d43d47) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9663, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9663
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22610
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 18:58 UTC
- **Last Updated**: May 22, 2025 at 18:09 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to code execution.
### Affected Products
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213182)
2. [](https://support.apple.com/en-us/HT213193)
3. [](https://support.apple.com/en-us/HT213183)
4. [](https://support.apple.com/en-us/HT213186)
5. [](https://support.apple.com/en-us/HT213187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4555
- **State**: PUBLISHED
- **Published Date**: December 28, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in add.php in DEV web management system 1.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) ENTER_ARTICLE_TITLE, (2) SPECIFY_ZONE, (3) ENTER_ARTICLE_HEADER, and (4) ENTER_ARTICLE_BODY indices in the language array parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dev-add-xss(23900)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23900)
2. [](http://rgod.altervista.org/dev_15_sql_xpl.html)
3. [16063](http://www.securityfocus.com/bid/16063)
4. [18239](http://secunia.com/advisories/18239)
5. [1015410](http://securitytracker.com/id?1015410)
6. [20051224 Dev web management system <= 1.5 SQL injection / cross site scripting](http://www.securityfocus.com/archive/1/420253/100/0/threaded)
7. [22043](http://www.osvdb.org/22043) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4158
- **State**: PUBLISHED
- **Published Date**: December 30, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: November 04, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2011:004](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html)
2. [42778](http://secunia.com/advisories/42778)
3. [42801](http://secunia.com/advisories/42801)
4. [20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console](http://www.securityfocus.com/archive/1/520102/100/0/threaded)
5. [RHSA-2011:0017](http://www.redhat.com/support/errata/RHSA-2011-0017.html)
6. [46397](http://secunia.com/advisories/46397)
7. [SUSE-SA:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html)
8. [FEDORA-2010-18983](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html)
9. [SUSE-SA:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html)
10. [42932](http://secunia.com/advisories/42932)
11. [RHSA-2011:0007](http://www.redhat.com/support/errata/RHSA-2011-0007.html)
12. [ADV-2011-0124](http://www.vupen.com/english/advisories/2011/0124)
13. [[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters](http://www.spinics.net/lists/netdev/msg146361.html)
14. [20101118 Re: Kernel 0-day](http://www.securityfocus.com/archive/1/514845)
15. [SUSE-SA:2011:007](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html)
16. [SUSE-SA:2010:060](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html)
17. [ADV-2010-3321](http://www.vupen.com/english/advisories/2010/3321)
18. [ADV-2011-0298](http://www.vupen.com/english/advisories/2011/0298)
19. [RHSA-2010:0958](http://www.redhat.com/support/errata/RHSA-2010-0958.html)
20. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2)
21. [42963](http://secunia.com/advisories/42963)
22. [44758](http://www.securityfocus.com/bid/44758)
23. [](http://www.vmware.com/security/advisories/VMSA-2011-0012.html)
24. [42884](http://secunia.com/advisories/42884)
25. [ADV-2011-0375](http://www.vupen.com/english/advisories/2011/0375)
26. [42890](http://secunia.com/advisories/42890)
27. [](https://bugzilla.redhat.com/show_bug.cgi?id=651698)
28. [RHSA-2011:0162](http://www.redhat.com/support/errata/RHSA-2011-0162.html)
29. [ADV-2011-0012](http://www.vupen.com/english/advisories/2011/0012)
30. [SUSE-SA:2011:008](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html)
31. [ADV-2011-0168](http://www.vupen.com/english/advisories/2011/0168)
32. [MDVSA-2011:029](http://www.mandriva.com/security/advisories?name=MDVSA-2011:029)
33. [42745](http://secunia.com/advisories/42745)
34. [43291](http://secunia.com/advisories/43291)
35. [20101109 Kernel 0-day](http://www.securityfocus.com/archive/1/514705)
36. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb)
37. [20101109 Kernel 0-day](http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1435
- **State**: PUBLISHED
- **Published Date**: February 13, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities](http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml)
2. [12117](http://secunia.com/advisories/12117)
3. [10768](http://www.securityfocus.com/bid/10768)
4. [VU#277048](http://www.kb.cert.org/vuls/id/277048)
5. [cisco-ons-tcp-ack-dos(16763)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16763) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28915
- **State**: PUBLISHED
- **Published Date**: November 18, 2020 at 07:59 UTC
- **Last Updated**: August 04, 2024 at 16:40 UTC
- **Reserved Date**: November 18, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16)
3. [](https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd)
4. [](https://bugzilla.suse.com/show_bug.cgi?id=1178886)
5. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26132
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 18:30 UTC
- **Last Updated**: August 01, 2024 at 23:59 UTC
- **Reserved Date**: February 14, 2024 at 17:40 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Element Android is an Android Matrix Client. A third-party malicious application installed on the same phone can force Element Android, version 0.91.0 through 1.6.12, to share files stored under the `files` directory in the application's private data directory to an arbitrary room. The impact of the attack is reduced by the fact that the databases stored in this folder are encrypted. However, it contains some other potentially sensitive information, such as the FCM token. Forks of Element Android which have set `android:exported="false"` in the `AndroidManifest.xml` file for the `IncomingShareActivity` activity are not impacted. This issue is fixed in Element Android 1.6.12. There is no known workaround to mitigate the issue.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**element-hq - element-android**
Affected versions:
- >= 0.91.0, < 1.6.12 (Status: affected)
### References
1. [https://github.com/element-hq/element-android/security/advisories/GHSA-8wj9-cx7h-pvm4](https://github.com/element-hq/element-android/security/advisories/GHSA-8wj9-cx7h-pvm4)
2. [https://github.com/element-hq/element-android/commit/8f9695a9a8d944cb9b92568cbd76578c51d32e07](https://github.com/element-hq/element-android/commit/8f9695a9a8d944cb9b92568cbd76578c51d32e07)
3. [https://element.io/blog/security-release-element-android-1-6-12](https://element.io/blog/security-release-element-android-1-6-12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20686
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 15:28 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In display drm, there is a possible double free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07570826; Issue ID: ALPS07570826.
### Affected Products
**MediaTek, Inc. - MT6879, MT6895, MT6983, MT8781**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1038, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1038
- **State**: PUBLISHED
- **Published Date**: February 22, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: February 18, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in stconf.nsf in the server in IBM Lotus Sametime 8.0.1 allow remote attackers to inject arbitrary web script or HTML via (1) the messageString parameter in a WebMessage action or (2) the PATH_INFO.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sametime-stcenter-xss(65555)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65555)
2. [8100](http://securityreason.com/securityalert/8100)
3. [46471](http://www.securityfocus.com/bid/46471)
4. [43430](http://secunia.com/advisories/43430)
5. [20110221 Domino Sametime Multiple Reflected Cross-Site Scripting](http://www.securityfocus.com/archive/1/516563/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12941
- **State**: PUBLISHED
- **Published Date**: August 18, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 18, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://seclists.org/oss-sec/2017/q3/290)
2. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10241)
3. [GLSA-201709-24](https://security.gentoo.org/glsa/201709-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23902
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 20:18 UTC
- **Last Updated**: August 03, 2024 at 03:59 UTC
- **Reserved Date**: January 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tongda2000 v11.10 was discovered to contain a SQL injection vulnerability in export_data.php via the d_name parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://note.youdao.com/noteshare?id=7b52ec937a029a1b2c7f994d4b174583) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8971
- **State**: PUBLISHED
- **Published Date**: March 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 25, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere MQ 8.0 could allow an authenticated user with queue manager permissions to cause a segmentation fault which would result in the box having to be rebooted to resume normal operations. IBM Reference #: 1998663.
### Affected Products
**IBM Corporation - WebSphere MQ**
Affected versions:
- 5.1 (Status: affected)
- 5.3 (Status: affected)
- 6.0 (Status: affected)
- 7.0 (Status: affected)
- 5.30.0 (Status: affected)
- 6.0.1.0 (Status: affected)
- 6.0.1.1 (Status: affected)
- 6.0.2.0 (Status: affected)
- 6.0.2.1 (Status: affected)
- 6.0.2.10 (Status: affected)
- 6.0.2.2 (Status: affected)
- 6.0.2.3 (Status: affected)
- 6.0.2.4 (Status: affected)
- 6.0.2.5 (Status: affected)
- 6.0.2.6 (Status: affected)
- 6.0.2.7 (Status: affected)
- 6.0.2.8 (Status: affected)
- 6.0.2.9 (Status: affected)
- 7.0.0.1 (Status: affected)
- 7.0.0.2 (Status: affected)
- 7.0.1.0 (Status: affected)
- 7.0.1.1 (Status: affected)
- 7.0.1.2 (Status: affected)
- 7.0.1.3 (Status: affected)
- 7.0.1.4 (Status: affected)
- 7.1 (Status: affected)
- 7.5 (Status: affected)
- 7.5.0.1 (Status: affected)
- 7.1.0.1 (Status: affected)
- 7.1.0.2 (Status: affected)
- 7.0.1 (Status: affected)
- 7.0.1.5 (Status: affected)
- 7.0.1.6 (Status: affected)
- 7.0.1.8 (Status: affected)
- 7.0.1.7 (Status: affected)
- 7.0.1.9 (Status: affected)
- 7.0.1.10 (Status: affected)
- 7.0.2 (Status: affected)
- 7.0.3 (Status: affected)
- 7.0.4 (Status: affected)
- 7.0.4.1 (Status: affected)
- 7.0.4.2 (Status: affected)
- 7.0.4.3 (Status: affected)
- 7.5.0.2 (Status: affected)
- 7.1.0.3 (Status: affected)
- 7.1.0.4 (Status: affected)
- 7.5.0.3 (Status: affected)
- 8.0.0.0 (Status: affected)
- 8.0.0.1 (Status: affected)
- 7.5.0.4 (Status: affected)
- 8.0 (Status: affected)
- 5.3.1 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.1.2 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.2.11 (Status: affected)
- 6.0.2.12 (Status: affected)
- 7.0.1.11 (Status: affected)
- 7.0.1.12 (Status: affected)
- 2.1 (Status: affected)
- 7.1.0.5 (Status: affected)
- 2.0 (Status: affected)
- 8.0.0.2 (Status: affected)
- 8 (Status: affected)
- 8.0.0.4 (Status: affected)
- 8.0.0.3 (Status: affected)
- 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=swg21998663) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9933
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 16:50 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An authorization issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to read sensitive location information.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211288)
2. [](https://support.apple.com/HT211290)
3. [](https://support.apple.com/HT211291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35624, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35624
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 22:36 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T268794)
2. [](https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3290
- **State**: PUBLISHED
- **Published Date**: October 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: October 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Accelerated Mortgage Manager allows remote attackers to execute arbitrary SQL commands via the password field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15097](http://www.securityfocus.com/bid/15097)
2. [21581](http://www.osvdb.org/21581) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3005
- **State**: PUBLISHED
- **Published Date**: September 29, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mozilla.org/security/announce/2011/mfsa2011-44.html)
2. [oval:org.mitre.oval:def:14352](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14352)
3. [46315](http://secunia.com/advisories/46315)
4. [49055](http://secunia.com/advisories/49055)
5. [MDVSA-2011:141](http://www.mandriva.com/security/advisories?name=MDVSA-2011:141)
6. [MDVSA-2011:142](http://www.mandriva.com/security/advisories?name=MDVSA-2011:142)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=675747)
8. [openSUSE-SU-2011:1076](http://lists.opensuse.org/opensuse-updates/2011-10/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43303
- **State**: PUBLISHED
- **Published Date**: November 07, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 18:02 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pypi.org/project/d8s-strings/)
2. [](https://pypi.org/project/democritus-uuids/)
3. [](https://github.com/dadadadada111/info/issues/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0919
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 24, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in PHPix Photo Album 1.0.2 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [472](http://www.osvdb.org/472)
2. [phpix-dir-traversal(5331)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5331)
3. [20001007 PHPix advisory](http://archives.neohapsis.com/archives/bugtraq/2000-10/0117.html)
4. [1773](http://www.securityfocus.com/bid/1773) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22973
- **State**: PUBLISHED
- **Published Date**: February 20, 2025 at 00:00 UTC
- **Last Updated**: February 21, 2025 at 17:35 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25484
- **State**: PUBLISHED
- **Published Date**: April 25, 2023 at 16:50 UTC
- **Last Updated**: January 09, 2025 at 15:34 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Oliver Schlöbe Simple Yearly Archive plugin <= 2.1.8 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Oliver Schlöbe - Simple Yearly Archive**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/simple-yearly-archive/wordpress-simple-yearly-archive-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23330
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 17:22 UTC
- **Last Updated**: May 30, 2025 at 14:19 UTC
- **Reserved Date**: January 15, 2024 at 15:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Tuta is an encrypted email service. In versions prior to 119.10, an attacker can attach an image in a html mail which is loaded from external resource in the default setting, which should prevent loading of external resources. When displaying emails containing external content, they should be loaded by default only after confirmation by the user. However, it could be recognized that certain embedded images (see PoC) are loaded, even though the "Automatic Reloading of Images" function is disabled by default. The reloading is also done unencrypted via HTTP and redirections are followed. This behavior is unexpected for the user, since the user assumes that external content will only be loaded after explicit manual confirmation. The loading of external content in e-mails represents a risk, because this makes the sender aware that the e-mail address is used, when the e-mail was read, which device is used and expose the user's IP address. Version 119.10 contains a patch for this issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**tutao - tutanota**
Affected versions:
- < 119.10 (Status: affected)
### References
1. [https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7](https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1757
- **State**: PUBLISHED
- **Published Date**: June 15, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:59 UTC
- **Reserved Date**: May 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the Modweb agent for Novell NetMail 3.52 before 3.52C, when renaming folders, may allow attackers to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm)
2. [ADV-2005-0727](http://www.vupen.com/english/advisories/2005/0727)
3. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm)
4. [15644](http://secunia.com/advisories/15644)
5. [13926](http://www.securityfocus.com/bid/13926)
6. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm)
7. [17241](http://www.osvdb.org/17241)
8. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42940, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42940 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42940
- **State**: PUBLISHED
- **Published Date**: December 19, 2023 at 21:13 UTC
- **Last Updated**: May 06, 2025 at 18:51 UTC
- **Reserved Date**: September 14, 2023 at 19:05 UTC
- **Assigned By**: apple
### Vulnerability Description
A session rendering issue was addressed with improved session tracking. This issue is fixed in macOS Sonoma 14.2.1. A user who shares their screen may unintentionally share the incorrect content.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT214048)
2. [](http://seclists.org/fulldisclosure/2023/Dec/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12894
- **State**: PUBLISHED
- **Published Date**: December 22, 2024 at 12:00 UTC
- **Last Updated**: December 24, 2024 at 16:30 UTC
- **Reserved Date**: December 21, 2024 at 20:17 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in TreasureHuntGame TreasureHunt up to 963e0e0. Affected is an unknown function of the file TreasureHunt/acesso.php. The manipulation of the argument usuario leads to sql injection. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 8bcc649abc35b7734951be084bb522a532faac4e. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**TreasureHuntGame - TreasureHunt**
Affected versions:
- 963e0e0 (Status: affected)
### References
1. [VDB-289164 | TreasureHuntGame TreasureHunt acesso.php sql injection](https://vuldb.com/?id.289164)
2. [VDB-289164 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289164)
3. [](https://github.com/TreasureHuntGame/TreasureHunt/commit/8bcc649abc35b7734951be084bb522a532faac4e)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47170
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 17:02 UTC
- **Last Updated**: June 10, 2025 at 19:01 UTC
- **Reserved Date**: May 01, 2025 at 17:10 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- N/A (Status: affected)
**Microsoft - Microsoft Office LTSC 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2024**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Word Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3891
- **State**: PUBLISHED
- **Published Date**: September 15, 2023 at 02:07 UTC
- **Last Updated**: September 25, 2024 at 13:29 UTC
- **Reserved Date**: July 24, 2023 at 17:48 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
Race condition in Lapce v0.2.8 allows an attacker to elevate privileges on the system
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Lapce - Lapce**
Affected versions:
- 0.2.8 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/aerosmith)
2. [](https://lapce.dev) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43931
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 15:04 UTC
- **Last Updated**: August 29, 2024 at 15:33 UTC
- **Reserved Date**: August 18, 2024 at 21:56 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.3.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**eyecix - JobSearch**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-3-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22341
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 17:54 UTC
- **Last Updated**: March 26, 2025 at 18:02 UTC
- **Reserved Date**: January 13, 2023 at 06:43 UTC
- **Assigned By**: f5
### Vulnerability Description
On version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate:
* An OAuth Server that references an OAuth Provider
* An OAuth profile with the Authorization Endpoint set to '/'
* An access profile that references the above OAuth profile and is associated with an HTTPS virtual server
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 14.1.0 (Status: affected)
- 13.1.0 (Status: affected)
### References
1. [](https://my.f5.com/manage/s/article/K20717585) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46101
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:00 UTC
- **Reserved Date**: November 28, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AyaCMS v3.1.2 was found to have a code flaw in the ust_sql.inc.php file, which allows attackers to cause command execution by inserting malicious code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/loadream/AyaCMS/issues/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8494
- **State**: PUBLISHED
- **Published Date**: October 10, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka "MS XML Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- Version 1809 for 32-bit Systems (Status: affected)
- Version 1809 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [1041844](http://www.securitytracker.com/id/1041844)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8494)
3. [105457](http://www.securityfocus.com/bid/105457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11394
- **State**: PUBLISHED
- **Published Date**: August 03, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: July 17, 2017 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the T parameter within Proxy.php. Formerly ZDI-CAN-4544.
### Affected Products
**Trend Micro - Trend Micro OfficeScan**
Affected versions:
- 11, XG (12) (Status: affected)
### References
1. [100130](http://www.securityfocus.com/bid/100130)
2. [](https://success.trendmicro.com/solution/1117769)
3. [42971](https://www.exploit-db.com/exploits/42971/)
4. [](http://www.zerodayinitiative.com/advisories/ZDI-17-521) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37348
- **State**: PUBLISHED
- **Published Date**: August 13, 2021 at 11:30 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-xi/change-log/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42623
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 00:00 UTC
- **Last Updated**: August 13, 2024 at 19:52 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/layout/delete/1
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Kirtoc/cms/tree/main/8/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44197
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 23:05 UTC
- **Last Updated**: September 19, 2024 at 13:07 UTC
- **Reserved Date**: September 26, 2023 at 19:30 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
On all Junos OS and Junos OS Evolved devices an rpd crash and restart can occur while processing BGP route updates received over an established BGP session. This specific issue is observed for BGP routes learned via a peer which is configured with a BGP import policy that has hundreds of terms matching IPv4 and/or IPv6 prefixes.
This issue affects Juniper Networks Junos OS:
* All versions prior to 20.4R3-S8;
* 21.1 version 21.1R1 and later versions;
* 21.2 versions prior to 21.2R3-S2;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R2-S1, 21.4R3-S5.
This issue affects Juniper Networks Junos OS Evolved:
* All versions prior to 20.4R3-S8-EVO;
* 21.1-EVO version 21.1R1-EVO and later versions;
* 21.2-EVO versions prior to 21.2R3-S2-EVO;
* 21.3-EVO version 21.3R1-EVO and later versions;
* 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.1R1 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 0 (Status: affected)
- 21.1R1-EVO (Status: affected)
- 21.2-EVO (Status: affected)
- 21.3R1-EVO (Status: affected)
- 21.4-EVO (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA73163) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2878
- **State**: PUBLISHED
- **Published Date**: September 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407)
2. [17020](http://secunia.com/advisories/17020)
3. [GLSA-200509-10](http://www.gentoo.org/security/en/glsa/glsa-200509-10.xml)
4. [16783](http://secunia.com/advisories/16783)
5. [20050909 GNU Mailutils 0.6 imap4d 'search' Format String Vulnerability](http://www.idefense.com/application/poi/display?id=303&type=vulnerabilities&flashstatus=true)
6. [](http://www.rosiello.org/archivio/imap4d_FreeBSD_exploit.c)
7. [DSA-841](http://www.debian.org/security/2005/dsa-841)
8. [20050926 FreeBSD GNU Mailutils 0.6 imap4d exploit](http://marc.info/?l=bugtraq&m=112785181316043&w=2)
9. [14794](http://www.securityfocus.com/bid/14794) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4004
- **State**: PUBLISHED
- **Published Date**: June 07, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: May 15, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3004-1](http://www.ubuntu.com/usn/USN-3004-1)
2. [74669](http://www.securityfocus.com/bid/74669)
3. [[linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities](https://lkml.org/lkml/2015/5/13/739)
4. [USN-3001-1](http://www.ubuntu.com/usn/USN-3001-1)
5. [USN-3000-1](http://www.ubuntu.com/usn/USN-3000-1)
6. [USN-3002-1](http://www.ubuntu.com/usn/USN-3002-1)
7. [USN-2989-1](http://www.ubuntu.com/usn/USN-2989-1)
8. [[oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities](http://openwall.com/lists/oss-security/2015/06/05/7)
9. [USN-3003-1](http://www.ubuntu.com/usn/USN-3003-1)
10. [USN-2998-1](http://www.ubuntu.com/usn/USN-2998-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0243
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Linux cfingerd could be exploited to gain root access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5046
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 11:55 UTC
- **Last Updated**: August 02, 2024 at 07:44 UTC
- **Reserved Date**: September 18, 2023 at 13:25 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Biltay Technology - Procost**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0581)
### Credits
- Alican OZDEMIR |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1569
- **State**: PUBLISHED
- **Published Date**: July 14, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 02:31 UTC
- **Reserved Date**: July 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Openwave WAP gateway does not verify the fully qualified domain name URL with X.509 certificates from root certificate authorities, which allows remote attackers to spoof SSL certificates via a man-in-the-middle attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [wap-gateway-ssl-certificates(6814)](http://www.iss.net/security_center/static/6814.php)
2. [20010709 Many WAP gateways do not properly check SSL certificates](http://www.securityfocus.com/archive/1/195619) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43652
- **State**: PUBLISHED
- **Published Date**: September 27, 2023 at 18:31 UTC
- **Last Updated**: March 25, 2025 at 19:27 UTC
- **Reserved Date**: September 20, 2023 at 15:35 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
JumpServer is an open source bastion host. As an unauthenticated user, it is possible to authenticate to the core API with a username and an SSH public key without needing a password or the corresponding SSH private key. An SSH public key should be considered public knowledge and should not used as an authentication secret alone. JumpServer provides an API for the KoKo component to validate user private key logins. This API does not verify the source of requests and will generate a personal authentication token. Given that public keys can be easily leaked, an attacker can exploit the leaked public key and username to authenticate, subsequently gaining access to the current user's information and authorized actions. This issue has been addressed in versions 2.28.20 and 3.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**jumpserver - jumpserver**
Affected versions:
- >= 2.0.0, < 2.28.20 (Status: affected)
- >= 3.0.0, < 3.7.1 (Status: affected)
### References
1. [https://github.com/jumpserver/jumpserver/security/advisories/GHSA-fr8h-xh5x-r8g9](https://github.com/jumpserver/jumpserver/security/advisories/GHSA-fr8h-xh5x-r8g9)
2. [https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2](https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0845
- **State**: PUBLISHED
- **Published Date**: March 24, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 24, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the Webmail interface in SurgeMail 2.2g3 allows remote authenticated users to write arbitrary files or directories via a .. (dot dot) in the attach_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://netwinsite.com/cgi/dnewsweb.cgi?cmd=article&group=netwin.surgemail&item=8814&utag=)
2. [20050323 [SIG^2 G-TEC] SurgeMail Webmail Attachment Upload and XSS](http://marc.info/?l=bugtraq&m=111159967417903&w=2)
3. [14658](http://secunia.com/advisories/14658)
4. [](http://www.security.org.sg/vuln/surgemail22g3.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9399
- **State**: PUBLISHED
- **Published Date**: March 23, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 17, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure)
2. [[oss-security] 20161117 Re: jasper: multiple assertion failures](http://www.openwall.com/lists/oss-security/2016/11/17/1)
3. [94380](http://www.securityfocus.com/bid/94380)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1396981)
5. [openSUSE-SU-2020:1517](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html)
6. [openSUSE-SU-2020:1523](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html)
7. [FEDORA-2021-2b151590d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/)
8. [FEDORA-2021-0a6290f865](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6039
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2013 SP1 and SharePoint Foundation 2013 SP1 allows remote authenticated users to inject arbitrary web script or HTML via crafted content in an Office Marketplace instance, aka "Microsoft SharePoint Security Feature Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-110](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-110)
2. [1033804](http://www.securitytracker.com/id/1033804) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3159
- **State**: PUBLISHED
- **Published Date**: July 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:35 UTC
- **Reserved Date**: May 03, 2014 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The WebContentsDelegateAndroid::OpenURLFromTab function in components/web_contents_delegate_android/web_contents_delegate_android.cc in Google Chrome before 36.0.1985.122 on Android does not properly restrict URL loading, which allows remote attackers to spoof the URL in the Omnibox via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2014/07/chrome-for-android-update.html)
2. [](https://code.google.com/p/chromium/issues/detail?id=352083)
3. [](https://src.chromium.org/viewvc/chrome?revision=273865&view=revision) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16451
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27412
- **State**: PUBLISHED
- **Published Date**: May 09, 2022 at 17:31 UTC
- **Last Updated**: August 03, 2024 at 05:25 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Explore CMS v1.0 was discovered to contain a SQL injection vulnerability via a /page.php?id= request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exploreit.com.bd)
2. [](http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2783
- **State**: PUBLISHED
- **Published Date**: June 16, 2023 at 08:39 UTC
- **Last Updated**: December 06, 2024 at 23:03 UTC
- **Reserved Date**: May 18, 2023 at 10:17 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Mattermost - Mattermost App Framework**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 7.10.0 (Status: affected)
- 7.10.1 (Status: unaffected)
- 7.8.5 (Status: unaffected)
- 7.9.4 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- Rohitesh Gupta |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.