System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4462 - **State**: PUBLISHED - **Published Date**: December 30, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:01 UTC - **Reserved Date**: December 30, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in the NetBiterConfig utility (NetBiterConfig.exe) 1.3.0 for Intellicom NetBiter WebSCADA allows remote attackers to execute arbitrary code via a long hn (hostname) parameter in a crafted HICP-protocol UDP packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#181737](http://www.kb.cert.org/vuls/id/181737) 2. [37325](http://www.securityfocus.com/bid/37325) 3. [ADV-2009-3542](http://www.vupen.com/english/advisories/2009/3542) 4. [](http://blog.48bits.com/2009/12/12/exposing-hms-hicp-protocol-0day-light/) 5. [](http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1) 6. [](http://support.intellicom.se/getfile.cfm?FID=150&FPID=85) 7. [20091214 Exposing HMS HICP Protocol + Intellicom NetBiterConfig.exe Remote Buffer Overflow (Not patched)](http://www.securityfocus.com/archive/1/508449/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-4386, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-4386 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-4386 - **State**: PUBLISHED - **Published Date**: July 01, 2023 at 03:30 UTC - **Last Updated**: November 25, 2024 at 18:33 UTC - **Reserved Date**: June 30, 2023 at 15:26 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WP Security Question plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **flippercode - WP Security Question** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/23f9d758-4b5e-44e5-9f58-a37b01c4ffdb?source=cve) 2. [](https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/) 3. [](https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/) 4. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/) 5. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/) 6. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/) 7. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/) 8. [](https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/) 9. [](https://plugins.trac.wordpress.org/browser/wp-security-questions/trunk/modules/settings/model.settings.php#L34) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-25538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-25538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-25538 - **State**: PUBLISHED - **Published Date**: November 13, 2020 at 15:20 UTC - **Last Updated**: August 04, 2024 at 15:33 UTC - **Reserved Date**: September 14, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An authenticated attacker can inject malicious code into "lang" parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.html) 2. [](http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-12773, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-12773 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-12773 - **State**: PUBLISHED - **Published Date**: July 20, 2018 at 19:00 UTC - **Last Updated**: August 05, 2024 at 08:45 UTC - **Reserved Date**: June 25, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. ### Affected Products **n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions** Affected versions: - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html) 2. [1041250](http://www.securitytracker.com/id/1041250) 3. [104701](http://www.securityfocus.com/bid/104701)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44080 - **State**: PUBLISHED - **Published Date**: June 01, 2022 at 00:45 UTC - **Last Updated**: August 04, 2024 at 04:10 UTC - **Reserved Date**: November 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Command Injection vulnerability in httpd web server (setup.cgi) in SerComm h500s, FW: lowi-h500s-v3.4.22 allows logged in administrators to arbitrary OS commands as root in the device via the connection_type parameter of the statussupport_diagnostic_tracing.json endpoint. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sercomm.com) 2. [](https://research.nccgroup.com/2022/05/24/technical-advisory-sercomm-h500s-authenticated-remote-command-execution-cve-2021-44080/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2299 - **State**: PUBLISHED - **Published Date**: April 22, 2016 at 00:00 UTC - **Last Updated**: August 05, 2024 at 23:24 UTC - **Reserved Date**: February 09, 2016 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description SQL injection vulnerability in Ecava IntegraXor before 5.0 build 4522 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-16-236) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-16-238) 3. [](http://www.zerodayinitiative.com/advisories/ZDI-16-237) 4. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-105-03) 5. [](http://www.zerodayinitiative.com/advisories/ZDI-16-239) 6. [](http://www.zerodayinitiative.com/advisories/ZDI-16-240)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48752 - **State**: PUBLISHED - **Published Date**: November 30, 2023 at 16:19 UTC - **Last Updated**: November 20, 2024 at 20:48 UTC - **Reserved Date**: November 18, 2023 at 22:10 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Happyforms Form builder to get in touch with visitors, grow your email list and collect payments — Happyforms allows Reflected XSS.This issue affects Form builder to get in touch with visitors, grow your email list and collect payments — Happyforms: from n/a through 1.25.9. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Happyforms - Form builder to get in touch with visitors, grow your email list and collect payments — Happyforms** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/happyforms/wordpress-happyforms-plugin-1-25-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8059, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8059 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8059 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 08, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0952 - **State**: PUBLISHED - **Published Date**: March 14, 2025 at 05:24 UTC - **Last Updated**: March 14, 2025 at 13:33 UTC - **Reserved Date**: January 31, 2025 at 19:44 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **cmsmasters - Eco Nature - Environment & Ecology WordPress Theme** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ba708a4f-d987-4d63-a218-2ed1c6daa010?source=cve) 2. [](https://themeforest.net/item/eco-nature-environment-ecology-wordpress-theme/8497776) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43745 - **State**: PUBLISHED - **Published Date**: February 24, 2022 at 21:01 UTC - **Last Updated**: August 04, 2024 at 04:03 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Denial of Service vulnerabilty exists in Trilium Notes 0.48.6 in the setupPage function ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/zadam/trilium/issues/2340)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4870 - **State**: PUBLISHED - **Published Date**: September 06, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 20:50 UTC - **Reserved Date**: September 06, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) context parameter to panel/index_amp.php or (2) panel/dhtml/index.php; (3) clid or (4) clidname parameters to panel/flash/mypage.php; (5) PATH_INFO to admin/views/freepbx_reload.php; or (6) login parameter to recordings/index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18649](http://www.exploit-db.com/exploits/18649) 2. [](http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html) 3. [freepbx-multiple-xss(74173)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74173) 4. [20120320 FreePBX remote command execution, xss](http://seclists.org/fulldisclosure/2012/Mar/234) 5. [48463](http://secunia.com/advisories/48463) 6. [52630](http://www.securityfocus.com/bid/52630) 7. [](http://www.freepbx.org/trac/ticket/5711) 8. [48475](http://secunia.com/advisories/48475)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5832 - **State**: PUBLISHED - **Published Date**: June 11, 2024 at 20:58 UTC - **Last Updated**: February 13, 2025 at 17:54 UTC - **Reserved Date**: June 11, 2024 at 06:12 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) ### Affected Products **Google - Chrome** Affected versions: - 126.0.6478.54 (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html) 2. [](https://issues.chromium.org/issues/340196361) 3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/) 4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1910, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1910 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1910 - **State**: PUBLISHED - **Published Date**: October 31, 2019 at 18:36 UTC - **Last Updated**: August 06, 2024 at 15:20 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description yum does not properly handle bad metadata, which allows an attacker to cause a denial of service and possibly have other unspecified impact via a Trojan horse file in the metadata of a remote repository. ### Affected Products **yum - yum** Affected versions: - 3.4.3 (Status: affected) ### References 1. [](https://security-tracker.debian.org/tracker/CVE-2013-1910) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1910) 3. [](https://access.redhat.com/security/cve/cve-2013-1910) 4. [](http://www.securityfocus.com/bid/58533) 5. [](http://www.openwall.com/lists/oss-security/2013/03/29/4) 6. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/83348)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2401 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 01:36 UTC - **Last Updated**: August 05, 2024 at 13:55 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [97137](http://www.securityfocus.com/bid/97137) 2. [](https://support.apple.com/HT207601) 3. [](https://support.apple.com/HT207615) 4. [1038138](http://www.securitytracker.com/id/1038138) 5. [](https://support.apple.com/HT207602) 6. [](https://support.apple.com/HT207617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6523 - **State**: PUBLISHED - **Published Date**: July 22, 2020 at 16:16 UTC - **Last Updated**: August 04, 2024 at 09:02 UTC - **Reserved Date**: January 08, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1080481) 3. [openSUSE-SU-2020:1061](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html) 4. [GLSA-202007-08](https://security.gentoo.org/glsa/202007-08) 5. [FEDORA-2020-bf684961d9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/) 6. [FEDORA-2020-84d87cbd50](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/) 7. [openSUSE-SU-2020:1148](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html) 8. [openSUSE-SU-2020:1172](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html) 9. [openSUSE-SU-2020:1048](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html) 10. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) 11. [GLSA-202101-30](https://security.gentoo.org/glsa/202101-30)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13959 - **State**: PUBLISHED - **Published Date**: March 10, 2021 at 08:00 UTC - **Last Updated**: February 13, 2025 at 16:27 UTC - **Reserved Date**: June 08, 2020 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Apache Software Foundation - Apache Velocity Tools** Affected versions: - Apache Velocity Tools (Status: affected) ### References 1. [](https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E) 2. [[velocity-user] 20210310 CVE-2020-13959: Velocity Tools XSS Vulnerability](https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E) 3. [[velocity-commits] 20210310 [velocity-site] 01/01: CVE announcement](https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6%40%3Ccommits.velocity.apache.org%3E) 4. [[announce] 20210310 CVE-2020-13959: Velocity Tools XSS Vulnerability](https://lists.apache.org/thread.html/rf9868c564cff7adfd5283563f2309b93b3e496354a211a57503b2f72%40%3Cannounce.apache.org%3E) 5. [[oss-security] 20210309 CVE-2020-13959: Velocity Tools XSS Vulnerability](http://www.openwall.com/lists/oss-security/2021/03/10/2) 6. [[debian-lts-announce] 20210317 [SECURITY] [DLA 2597-1] velocity-tools security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html) 7. [[velocity-user] 20210318 Re: CVE-2020-13959: Velocity Tools XSS Vulnerability](https://lists.apache.org/thread.html/r97edad0655770342d2d36620fb1de50b142fcd6c4f5c53dd72ca41d7%40%3Cuser.velocity.apache.org%3E) 8. [GLSA-202107-52](https://security.gentoo.org/glsa/202107-52) ### Credits - This issue was reported and a patch was submitted by Jackson Henry, member of Sakura Samurai.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7561 - **State**: PUBLISHED - **Published Date**: October 05, 2016 at 16:00 UTC - **Last Updated**: August 06, 2024 at 02:04 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://fortiguard.com/advisory/FG-IR-16-030) 2. [93282](http://www.securityfocus.com/bid/93282)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3443 - **State**: PUBLISHED - **Published Date**: March 25, 2021 at 18:45 UTC - **Last Updated**: August 03, 2024 at 16:53 UTC - **Reserved Date**: March 15, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **n/a - jasper** Affected versions: - jasper 2.0.27 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1939233)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-17020, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-17020 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-17020 - **State**: PUBLISHED - **Published Date**: January 08, 2020 at 21:29 UTC - **Last Updated**: August 05, 2024 at 01:24 UTC - **Reserved Date**: September 30, 2019 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox < 72. ### Affected Products **Mozilla - Firefox** Affected versions: - before 72 (Status: affected) ### References 1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1597645) 2. [](https://www.mozilla.org/security/advisories/mfsa2020-01/) 3. [USN-4234-1](https://usn.ubuntu.com/4234-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0497 - **State**: PUBLISHED - **Published Date**: January 25, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 12:19 UTC - **Reserved Date**: January 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in upload/top.php in Upload-Service 1.0, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the maindir parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [uploadservice-top-file-include(31634)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31634) 2. [20070123 [ECHO_ADV_62$2007] Upload Service 1.0 remote file inclusion](http://www.securityfocus.com/archive/1/457800/100/100/threaded) 3. [22189](http://www.securityfocus.com/bid/22189) 4. [](http://echo.or.id/adv/adv62-y3dips-2007.txt) 5. [32938](http://osvdb.org/32938) 6. [ADV-2007-0265](http://www.vupen.com/english/advisories/2007/0265) 7. [23845](http://secunia.com/advisories/23845)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49840 - **State**: PUBLISHED - **Published Date**: December 18, 2023 at 14:46 UTC - **Last Updated**: May 07, 2025 at 20:36 UTC - **Reserved Date**: November 30, 2023 at 17:12 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Palscode Multi Currency For WooCommerce.This issue affects Multi Currency For WooCommerce: from n/a through 1.5.5. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Palscode - Multi Currency For WooCommerce** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wc-multi-currency/wordpress-multi-currency-for-woocommerce-plugin-1-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28230 - **State**: PUBLISHED - **Published Date**: March 07, 2024 at 11:40 UTC - **Last Updated**: August 02, 2024 at 00:48 UTC - **Reserved Date**: March 07, 2024 at 11:39 UTC - **Assigned By**: JetBrains ### Vulnerability Description In JetBrains YouTrack before 2024.1.25893 attaching/detaching workflow to a project was possible without project admin permissions ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N` ### Affected Products **JetBrains - YouTrack** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.jetbrains.com/privacy-security/issues-fixed/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31540 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 12:55 UTC - **Last Updated**: March 31, 2025 at 18:56 UTC - **Reserved Date**: March 31, 2025 at 10:05 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in acmemediakits ACME Divi Modules allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ACME Divi Modules: from n/a through 1.3.5. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **acmemediakits - ACME Divi Modules** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/acme-divi-modules/vulnerability/wordpress-acme-divi-modules-plugin-1-3-5-broken-access-control-vulnerability?_s_id=cve) ### Credits - Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-0602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-0602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-0602 - **State**: PUBLISHED - **Published Date**: January 10, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 14:33 UTC - **Reserved Date**: December 18, 2012 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Use-after-free vulnerability in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:16449](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16449) 2. [SUSE-SU-2013:0044](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html) 3. [SUSE-SU-2013:0047](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html) 4. [openSUSE-SU-2013:0193](http://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html) 5. [openSUSE-SU-2013:0138](http://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html) 6. [](http://www.adobe.com/support/security/bulletins/apsb13-02.html) 7. [RHSA-2013:0150](http://rhn.redhat.com/errata/RHSA-2013-0150.html) 8. [GLSA-201308-03](http://security.gentoo.org/glsa/glsa-201308-03.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1331 - **State**: PUBLISHED - **Published Date**: October 10, 2019 at 13:28 UTC - **Last Updated**: August 04, 2024 at 18:13 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1327. ### Affected Products **Microsoft - Microsoft Excel** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) **Microsoft - Microsoft Office** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2016 for Mac (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) - 2019 for 32-bit editions (Status: affected) - 2019 for 64-bit editions (Status: affected) - 2019 for Mac (Status: affected) **Microsoft - Office Online Server** Affected versions: - unspecified (Status: affected) **Microsoft - Microsoft SharePoint Enterprise Server** Affected versions: - 2013 Service Pack 1 (Status: affected) **Microsoft - Office 365 ProPlus** Affected versions: - 32-bit Systems (Status: affected) - 64-bit Systems (Status: affected) **Microsoft - Excel Services on Microsoft SharePoint Server 2010 Service Pack 2** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1331)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-4720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-4720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-4720 - **State**: PUBLISHED - **Published Date**: May 10, 2024 at 15:00 UTC - **Last Updated**: August 01, 2024 at 20:47 UTC - **Reserved Date**: May 10, 2024 at 05:38 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /model/approve_petty_cash.php. The manipulation of the argument admin_index leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263798 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Campcodes - Complete Web-Based School Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-263798 | Campcodes Complete Web-Based School Management System approve_petty_cash.php cross site scripting](https://vuldb.com/?id.263798) 2. [VDB-263798 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263798) 3. [Submit #331886 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.331886) 4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2043.pdf) ### Credits - SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5762 - **State**: PUBLISHED - **Published Date**: February 20, 2013 at 11:00 UTC - **Last Updated**: August 06, 2024 at 21:14 UTC - **Reserved Date**: November 02, 2012 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the WebAdmin application 6.0.5, 6.0.8, and 7.0 before P2 in IBM Netezza allows remote authenticated users to inject arbitrary web script or HTML via vectors involving the MHTML protocol. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [netezza-mhtml-iframe-xss(80204)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80204) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21624568)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4251 - **State**: PUBLISHED - **Published Date**: June 08, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 05:11 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "Firmware" component. It allows attackers to modify the EFI flash-memory region that a crafted app that has root access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1041027](http://www.securitytracker.com/id/1041027) 2. [](https://support.apple.com/HT208849) 3. [20190326 Repeat of CVE-2018-4251 in Razer Laptops](http://seclists.org/fulldisclosure/2019/Mar/45)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42857 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 16:51 UTC - **Last Updated**: September 16, 2024 at 21:57 UTC - **Reserved Date**: October 25, 2021 at 00:00 UTC - **Assigned By**: GovTech CSG ### Vulnerability Description It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentDaServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/da/pcf" API. The affected endpoint does not have any validation of the user's input that allows a malicious payload to be injected. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Aternity - SteelCentral AppInternals Dynamic Sampling Agent** Affected versions: - 10.x (Status: affected) - 12.13.0 (Status: affected) - 11.8.8 (Status: affected) ### References 1. [](https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Partial-Write-at-AgentDaServlet-CVE-2021-42857) ### Credits - Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-1640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-1640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-1640 - **State**: PUBLISHED - **Published Date**: February 25, 2025 at 00:00 UTC - **Last Updated**: February 25, 2025 at 14:21 UTC - **Reserved Date**: February 24, 2025 at 17:22 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Benner ModernaNet up to 1.1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Home/JS_CarregaCombo?formName=DADOS_PESSOAIS_PLANO&additionalCondition=&insideParameters=&elementToReturn=DADOS_PESSOAIS_PLANO&ordenarPelaDescricao=true&direcaoOrdenacao=asc&_=1739290047295. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **Benner - ModernaNet** Affected versions: - 1.0 (Status: affected) - 1.1 (Status: affected) ### References 1. [VDB-296690 | Benner ModernaNet JS_CarregaCombo sql injection](https://vuldb.com/?id.296690) 2. [VDB-296690 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.296690) 3. [Submit #499115 | benner modernanet < 1.1.1 Blind Boolean-Based SQL Injection](https://vuldb.com/?submit.499115) 4. [](https://github.com/yago3008/CVES) ### Credits - y4g0 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-29241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-29241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-29241 - **State**: PUBLISHED - **Published Date**: June 30, 2023 at 00:00 UTC - **Last Updated**: November 26, 2024 at 19:59 UTC - **Reserved Date**: June 01, 2023 at 00:00 UTC - **Assigned By**: bosch ### Vulnerability Description Improper Information in Cybersecurity Guidebook in Bosch Building Integration System (BIS) 5.0 may lead to wrong configuration which allows local users to access data via network ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-1112: Security Weakness ### Affected Products **Bosch - BIS** Affected versions: - 5.0 (Status: affected) ### References 1. [](https://psirt.bosch.com/security-advisories/BOSCH-SA-988400-BT.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-10676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-10676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-10676 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 00:00 UTC - **Last Updated**: August 04, 2024 at 11:06 UTC - **Reserved Date**: March 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Rancher 2.x before 2.6.13 and 2.7.x before 2.7.4, an incorrectly applied authorization check allows users who have certain access to a namespace to move that namespace to a different project. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://forums.rancher.com/c/announcements) 2. [](https://github.com/advisories/GHSA-8vhc-hwhc-cpj4) 3. [](https://github.com/rancher/rancher/releases/tag/v2.6.13) 4. [](https://github.com/rancher/rancher/releases/tag/v2.7.4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48831, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48831 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48831 - **State**: PUBLISHED - **Published Date**: March 17, 2025 at 18:00 UTC - **Last Updated**: March 17, 2025 at 18:26 UTC - **Reserved Date**: October 08, 2024 at 16:18 UTC - **Assigned By**: dell ### Vulnerability Description Dell SmartFabric OS10 Software, version(s) 10.5.6.x, contain(s) a Use of Hard-coded Password vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-259: Security Weakness ### Affected Products **Dell - SmartFabric OS10 Software** Affected versions: - 10.5.6.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities) ### Credits - Dell would like to thank n3k from TIANGONG Team of Legendsec at QI-ANXIN Group for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2232, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2232 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2232 - **State**: PUBLISHED - **Published Date**: May 05, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 17:43 UTC - **Reserved Date**: May 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Scriptsez Cute Guestbook 20060211 allows remote attackers to inject arbitrary web script or HTML via the Comments field when signing the guestbook. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cuteguestbook-guestbook-xss(26244)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26244) 2. [](http://colander.altervista.org/advisory/CuteGuestbook.txt) 3. [20060504 CuteGuestbook XSS attack](http://www.securityfocus.com/archive/1/432953/100/0/threaded) 4. [844](http://securityreason.com/securityalert/844) 5. [17832](http://www.securityfocus.com/bid/17832)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3594 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 20:03 UTC - **Reserved Date**: December 19, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845, while parsing a private frame in an ID3 tag, a buffer over-read can occur when comparing frame data with predefined owner identifier strings. ### Affected Products **Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear** Affected versions: - MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2018-04-01) 2. [103671](http://www.securityfocus.com/bid/103671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22256 - **State**: PUBLISHED - **Published Date**: August 25, 2021 at 18:30 UTC - **Last Updated**: August 03, 2024 at 18:37 UTC - **Reserved Date**: January 05, 2021 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description Improper authorization in GitLab CE/EE affecting all versions since 12.6 allowed guest users to create issues for Sentry errors and track their status ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Affected Products **GitLab - GitLab** Affected versions: - >=12.6, <13.12.9 (Status: affected) - >=14.0, <14.0.7 (Status: affected) - >=14.1, <14.1.2 (Status: affected) ### References 1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/326948) 2. [](https://hackerone.com/reports/1117768) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22256.json) ### Credits - Thanks @maruthi12 for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13861 - **State**: PUBLISHED - **Published Date**: July 17, 2018 at 14:00 UTC - **Last Updated**: August 05, 2024 at 09:14 UTC - **Reserved Date**: July 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allows unauthorized remote attackers to reboot or execute other functions via the "/xml/system/control.xml" URL, using the GET request "?action=reboot" for example. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vulncode.com/advisory/CVE-2018-13861)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30531, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30531 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30531 - **State**: PUBLISHED - **Published Date**: February 16, 2023 at 20:00 UTC - **Last Updated**: January 27, 2025 at 18:19 UTC - **Reserved Date**: July 02, 2022 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Out-of-bounds read in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1474 may allow a privileged user to potentially enable information disclosure via local access. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Affected Products **n/a - Intel(R) Iris(R) Xe MAX drivers for Windows** Affected versions: - before version 100.0.5.1474 (Status: affected) ### References 1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00727.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50502 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 12:42 UTC - **Last Updated**: October 28, 2024 at 13:57 UTC - **Reserved Date**: October 24, 2024 at 07:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CozyThemes Cozy Blocks allows Stored XSS.This issue affects Cozy Blocks: from n/a through 2.0.18. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **CozyThemes - Cozy Blocks** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/cozy-addons/wordpress-cozy-blocks-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Michael (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25069 - **State**: PUBLISHED - **Published Date**: February 21, 2022 at 10:45 UTC - **Last Updated**: August 03, 2024 at 19:56 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Download Manager WordPress plugin before 3.2.34 does not sanitise and escape the package_ids parameter before using it in a SQL statement, leading to a SQL injection, which can also be exploited to cause a Reflected Cross-Site Scripting issue ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Download Manager** Affected versions: - 3.2.34 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/4ff5e638-1b89-41df-b65a-f821de8934e8) 2. [](https://plugins.trac.wordpress.org/changeset/2656086) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12222, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12222 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12222 - **State**: PUBLISHED - **Published Date**: May 20, 2019 at 16:33 UTC - **Last Updated**: August 04, 2024 at 23:17 UTC - **Reserved Date**: May 20, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9. There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixels.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.libsdl.org/show_bug.cgi?id=4621) 2. [[debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html) 3. [[debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update](https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html) 4. [openSUSE-SU-2019:2070](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html) 5. [openSUSE-SU-2019:2108](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html) 6. [FEDORA-2019-a6bc0fb143](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ2VRD57UOBT72JUC2DIFHEFCH4N64SW/) 7. [USN-4238-1](https://usn.ubuntu.com/4238-1/) 8. [FEDORA-2020-ff2fe47ba4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-5298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-5298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-5298 - **State**: PUBLISHED - **Published Date**: October 04, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 21:05 UTC - **Reserved Date**: October 04, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mavili Guestbook, as released in November 2007, stores guestbook.mdb under the web root with insufficient access control, which allows remote attackers to read the database via a direct request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120103 mavili guestbook - SQL Injection and XSS Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2012-01/0010.html) 2. [51252](http://www.securityfocus.com/bid/51252) 3. [mavili-guestbook-information-disclosure(72101)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72101) 4. [](http://code.google.com/p/maviliguestbook/issues/detail?id=1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5695 - **State**: PUBLISHED - **Published Date**: October 29, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 15:39 UTC - **Reserved Date**: October 29, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open redirect vulnerability in command.php in SiteBar 3.3.8 allows remote attackers to redirect users to arbitrary web sites via a URL in the forward parameter in a Log In action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [41581](http://osvdb.org/41581) 2. [](http://teamforge.net/viewcvs/viewcvs.cgi/tags/release-3.3.9/doc/history.txt?view=markup) 3. [27503](http://secunia.com/advisories/27503) 4. [3318](http://securityreason.com/securityalert/3318) 5. [20071018 Serious holes affecting SiteBar 3.3.8](http://www.securityfocus.com/archive/1/482499/100/0/threaded) 6. [GLSA-200711-05](http://www.gentoo.org/security/en/glsa/glsa-200711-05.xml) 7. [26126](http://www.securityfocus.com/bid/26126) 8. [28008](http://secunia.com/advisories/28008) 9. [DSA-1423](http://www.debian.org/security/2007/dsa-1423) 10. [ADV-2007-3768](http://www.vupen.com/english/advisories/2007/3768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0560 - **State**: PUBLISHED - **Published Date**: May 03, 2012 at 18:17 UTC - **Last Updated**: August 06, 2024 at 18:30 UTC - **Reserved Date**: January 11, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote attackers to affect integrity via unknown vectors related to Portal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [48882](http://secunia.com/advisories/48882) 2. [1026954](http://www.securitytracker.com/id?1026954) 3. [53073](http://www.securityfocus.com/bid/53073) 4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html) 5. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1053 - **State**: PUBLISHED - **Published Date**: February 09, 2018 at 14:00 UTC - **Last Updated**: September 17, 2024 at 04:20 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file. ### Weakness Classification (CWE) - CWE-377: Security Weakness ### Affected Products **The PostgreSQL Global Development Group - postgresql** Affected versions: - 9.3.x before 9.3.21 (Status: affected) - 9.4.x before 9.4.16 (Status: affected) - 9.5.x before 9.5.11 (Status: affected) - 9.6.x before 9.6.7 (Status: affected) - 10.x before 10.2 (Status: affected) ### References 1. [](https://www.postgresql.org/about/news/1829/) 2. [RHSA-2018:2511](https://access.redhat.com/errata/RHSA-2018:2511) 3. [[debian-lts-announce] 20180207 [SECURITY] [DLA-1271-1] postgresql-9.1 security update](https://lists.debian.org/debian-lts-announce/2018/02/msg00006.html) 4. [RHSA-2018:2566](https://access.redhat.com/errata/RHSA-2018:2566) 5. [RHSA-2018:3816](https://access.redhat.com/errata/RHSA-2018:3816) 6. [102986](http://www.securityfocus.com/bid/102986) 7. [USN-3564-1](https://usn.ubuntu.com/3564-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4442 - **State**: PUBLISHED - **Published Date**: May 08, 2025 at 23:31 UTC - **Last Updated**: May 09, 2025 at 03:59 UTC - **Reserved Date**: May 08, 2025 at 17:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **D-Link - DIR-605L** Affected versions: - 2.13B01 (Status: affected) ### References 1. [VDB-308050 | D-Link DIR-605L formSetWAN_Wizard55 buffer overflow](https://vuldb.com/?id.308050) 2. [VDB-308050 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.308050) 3. [Submit #558352 | D-Link DIR-605L 2.13B01 Buffer Overflow](https://vuldb.com/?submit.558352) 4. [](https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir605l/Buffer_overflow-formSetWAN_Wizard55-curTime/README.md) 5. [](https://www.dlink.com/) ### Credits - jylsec (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49272 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:53 UTC - **Last Updated**: June 06, 2025 at 19:24 UTC - **Reserved Date**: June 04, 2025 at 09:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in sergiotrinity Trinity Audio allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Trinity Audio: from n/a through 5.20.0. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **sergiotrinity - Trinity Audio** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/trinity-audio/vulnerability/wordpress-trinity-audio-5-20-0-broken-access-control-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20791 - **State**: PUBLISHED - **Published Date**: September 17, 2021 at 01:40 UTC - **Last Updated**: August 03, 2024 at 17:53 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Improper access control vulnerability in RevoWorks Browser 2.1.230 and earlier allows an attacker to bypass access restriction and to exchange unauthorized files between the local environment and the isolated environment or settings of the web browser via unspecified vectors. ### Affected Products **J’s Communication Co., Ltd. - RevoWorks Browser** Affected versions: - 2.1.230 and earlier (Status: affected) ### References 1. [](https://jscom.jp/news-20210910_2/) 2. [](https://jvn.jp/en/jp/JVN81658818/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5400 - **State**: PUBLISHED - **Published Date**: February 14, 2014 at 02:00 UTC - **Last Updated**: August 06, 2024 at 17:06 UTC - **Reserved Date**: August 22, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description An unspecified servlet in IBM Platform Symphony Developer Edition (DE) 5.2 and 6.1.x through 6.1.1 has hardcoded credentials, which allows remote attackers to bypass authentication and obtain "local environment" access via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-symphony-cve20135400-code-exec(87296)](https://exchange.xforce.ibmcloud.com/vulnerabilities/87296) 2. [](http://www-01.ibm.com/support/docview.wss?uid=isg3T1020564)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4133 - **State**: PUBLISHED - **Published Date**: August 29, 2019 at 15:00 UTC - **Last Updated**: September 17, 2024 at 00:21 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Cloud Automation Manager 3.1.2 could allow a malicious user on the client side (with access to client computer) to run a custom script. IBM X-Force ID: 158278. ### Affected Products **IBM - Cloud Automation Manager** Affected versions: - 3.1.2 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10967359) 2. [ibm-cam-cve20194133-script-injection (158278)](https://exchange.xforce.ibmcloud.com/vulnerabilities/158278)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28802 - **State**: PUBLISHED - **Published Date**: September 21, 2022 at 19:46 UTC - **Last Updated**: May 27, 2025 at 20:10 UTC - **Reserved Date**: April 08, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.) ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.zenity.io/blog/zapescape-organization-wide-control-over-code-by-zapier/) 2. [](https://www.zenity.io/blog/zapescape-vulnerability-disclosure/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1522 - **State**: PUBLISHED - **Published Date**: March 30, 2024 at 18:02 UTC - **Last Updated**: August 01, 2024 at 18:40 UTC - **Reserved Date**: February 14, 2024 at 23:31 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A Cross-Site Request Forgery (CSRF) vulnerability in the parisneo/lollms-webui project allows remote attackers to execute arbitrary code on a victim's system. The vulnerability stems from the `/execute_code` API endpoint, which does not properly validate requests, enabling an attacker to craft a malicious webpage that, when visited by a victim, submits a form to the victim's local lollms-webui instance to execute arbitrary OS commands. This issue allows attackers to take full control of the victim's system without requiring direct network access to the vulnerable application. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **parisneo - parisneo/lollms-webui** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/687cef92-3432-4d6c-af92-868eccabbb71) 2. [](https://github.com/parisneo/lollms-webui/commit/0b51063119cfb5e391925d232a4af1de9dc32e2b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-17449, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-17449 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-17449 - **State**: PUBLISHED - **Published Date**: August 12, 2020 at 21:47 UTC - **Last Updated**: August 04, 2024 at 13:53 UTC - **Reserved Date**: August 09, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP-Fusion 9.03 allows XSS via the error_log file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sec-consult.com/en/blog/advisories/multiple-cross-site-scripting-xss-vulnerabilities-in-php-fusion-cms/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2833, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2833 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2833 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 19:06 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Quoting product of Oracle E-Business Suite (component: Courseware). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Quoting. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Quoting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Quoting accessible data as well as unauthorized update, insert or delete access to some of Oracle Quoting accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). ### Affected Products **Oracle Corporation - Quoting** Affected versions: - 12.1.1-12.1.3 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6911 - **State**: PUBLISHED - **Published Date**: March 23, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 15:41 UTC - **Reserved Date**: March 15, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description USB Pratirodh is prone to sensitive information disclosure. It stores sensitive information such as username and password in simple usb.xml. An attacker with physical access to the system can modify the file according his own requirements that may aid in further attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [96970](http://www.securityfocus.com/bid/96970) 2. [](http://packetstormsecurity.com/files/141651/USB-Pratirodh-Insecure-Password-Storage.html) 3. [20170316 USB Pratirodh Insecure Password Storage Information Disclosure Vulnerability](http://seclists.org/fulldisclosure/2017/Mar/43) 4. [20170316 CVE-2017-6911: USB Pratirodh Insecure Password Storage Information Disclosure Vulnerability](http://www.securityfocus.com/archive/1/540289/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20602 - **State**: PUBLISHED - **Published Date**: December 30, 2018 at 21:00 UTC - **Last Updated**: September 16, 2024 at 22:55 UTC - **Reserved Date**: December 30, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Lei Feng TV CMS (aka LFCMS) 3.8.6 allows full path disclosure via the /install.php?s=/1 URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#information_disclosure)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3871, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3871 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3871 - **State**: PUBLISHED - **Published Date**: September 11, 2016 at 21:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Multiple buffer overflows in codecs/mp3dec/SoftMP3.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow attackers to gain privileges via a crafted application, aka internal bug 29422022. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://android.googlesource.com/platform/frameworks/av/+/3c4edac2a5b00dec6c8579a0ee658cfb3bb16d94) 2. [](http://source.android.com/security/bulletin/2016-09-01.html) 3. [1036763](http://www.securitytracker.com/id/1036763) 4. [](https://android.googlesource.com/platform/frameworks/av/+/c17ad2f0c7e00fd1bbf01d0dfed41f72d78267ad) 5. [](https://android.googlesource.com/platform/frameworks/av/+/c2639afac631f5c1ffddf70ee8a6fe943d0bedf9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2150 - **State**: PUBLISHED - **Published Date**: April 19, 2007 at 10:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BlueArc-FTPD in BlueArc Titan 2x00 devices with firmware 4.2.944b allows remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command, a variant of CVE-1999-0017. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070417 BlueArc Firmware 4.2.944b FTP bounce](http://www.securityfocus.com/archive/1/466025/100/0/threaded) 2. [35414](http://osvdb.org/35414) 3. [bluearc-port-traffic-hijacking(33721)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33721) 4. [23540](http://www.securityfocus.com/bid/23540)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51573 - **State**: PUBLISHED - **Published Date**: April 01, 2024 at 21:18 UTC - **Last Updated**: August 02, 2024 at 22:40 UTC - **Reserved Date**: December 20, 2023 at 20:38 UTC - **Assigned By**: zdi ### Vulnerability Description Voltronic Power ViewPower Pro updateManagerPassword Exposed Dangerous Function Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the updateManagerPassword function. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21203. ### Weakness Classification (CWE) - CWE-749: Security Weakness ### Affected Products **Voltronic Power - ViewPower Pro** Affected versions: - 2.0-22165 (Status: affected) ### References 1. [ZDI-23-1879](https://www.zerodayinitiative.com/advisories/ZDI-23-1879/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7030 - **State**: PUBLISHED - **Published Date**: February 23, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:50 UTC - **Reserved Date**: February 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Microsoft Internet Explorer 6 SP2 and earlier allows remote attackers to cause a denial of service (crash) via certain malformed HTML, possibly involving applet and base tags without required arguments, which triggers a null pointer dereference in mshtml.dll. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060525 [BuHa-Security] DoS Vulnerability in MS IE 6 SP2](http://www.securityfocus.com/archive/1/435095/30/4710/threaded) 2. [2286](http://securityreason.com/securityalert/2286) 3. [18112](http://www.securityfocus.com/bid/18112) 4. [ie-html-tag-parsing-dos(26808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26808) 5. [20060526 Re: [BuHa-Security] DoS Vulnerability in MS IE 6 SP2](http://www.securityfocus.com/archive/1/435129/30/4710/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15474, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15474 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15474 - **State**: PUBLISHED - **Published Date**: July 01, 2020 at 10:54 UTC - **Last Updated**: August 04, 2024 at 13:15 UTC - **Reserved Date**: July 01, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5812 - **State**: PUBLISHED - **Published Date**: January 02, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: January 02, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple unspecified vulnerabilities in SPIP 1.8 before 1.8.3b, 1.9 before 1.9.2g, and 2.0 before 2.0.2 have unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33307](http://secunia.com/advisories/33307) 2. [](http://www.spip-contrib.net/SPIP-1-8-3b-1-9-2g-2-2) 3. [spip-multiple-unspecified(47695)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47695) 4. [33061](http://www.securityfocus.com/bid/33061)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0972 - **State**: PUBLISHED - **Published Date**: April 15, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 04:57 UTC - **Reserved Date**: March 19, 2009 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Workspace Manager component in Oracle Database 11.1.0.6, 11.1.0.7, 10.2.0.3, 10.2.0.4, 10.1.0.5, 9.2.0.8, and 9.2.0.8DV allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34461](http://www.securityfocus.com/bid/34461) 2. [34693](http://secunia.com/advisories/34693) 3. [TA09-105A](http://www.us-cert.gov/cas/techalerts/TA09-105A.html) 4. [](http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html) 5. [1022052](http://www.securitytracker.com/id?1022052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35733, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35733 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35733 - **State**: PUBLISHED - **Published Date**: August 23, 2022 at 01:35 UTC - **Last Updated**: August 03, 2024 at 09:44 UTC - **Reserved Date**: August 08, 2022 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Missing authentication for critical function vulnerability in UNIMO Technology digital video recorders (UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier) allows a remote unauthenticated attacker to execute an arbitrary OS command by sending a specially crafted request to the affected device web interface. ### Affected Products **UNIMO Technology Co., Ltd - UNIMO Technology digital video recorders UDR-JA1004/JA1008/JA1016 and UDR-JA1016** Affected versions: - UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier (Status: affected) ### References 1. [](http://www.unimo.co.jp/table_notice/index.php?act=1&resid=1643590226-637355) 2. [](https://jvn.jp/en/vu/JVNVU90821877/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27054 - **State**: PUBLISHED - **Published Date**: March 11, 2021 at 15:46 UTC - **Last Updated**: August 03, 2024 at 20:40 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Excel Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1** Affected versions: - 15.0.1 (Status: affected) **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft Office 2019 for Mac** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Office Online Server** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Excel 2016** Affected versions: - 16.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Excel 2010 Service Pack 2** Affected versions: - 13.0.0.0 (Status: affected) **Microsoft - Microsoft Excel 2013 Service Pack 1** Affected versions: - 15.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2010 Service Pack 2** Affected versions: - 13.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27054) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-507/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29873, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29873 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29873 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 15:52 UTC - **Last Updated**: June 06, 2025 at 16:36 UTC - **Reserved Date**: March 12, 2025 at 08:06 UTC - **Assigned By**: qnap ### Vulnerability Description A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **QNAP Systems Inc. - File Station 5** Affected versions: - 5.5.x (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-25-16) ### Credits - coral
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6796 - **State**: PUBLISHED - **Published Date**: February 07, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 06:10 UTC - **Reserved Date**: February 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP Scripts Mall Multilanguage Real Estate MLM Script 3.0 has Stored XSS via every profile input field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43989](https://exploit-db.com/exploits/43989/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3387, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3387 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3387 - **State**: PUBLISHED - **Published Date**: April 07, 2025 at 22:31 UTC - **Last Updated**: April 08, 2025 at 18:24 UTC - **Reserved Date**: April 07, 2025 at 06:56 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic has been found in renrenio renren-security up to 5.4.0. This affects an unknown part of the component JSON Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **renrenio - renren-security** Affected versions: - 5.0 (Status: affected) - 5.1 (Status: affected) - 5.2 (Status: affected) - 5.3 (Status: affected) - 5.4 (Status: affected) ### References 1. [VDB-303633 | renrenio renren-security JSON cross site scripting](https://vuldb.com/?id.303633) 2. [VDB-303633 | CTI Indicators (IOB, IOC, TTP)](https://vuldb.com/?ctiid.303633) 3. [](https://gitee.com/renrenio/renren-security/issues/IBOU02) ### Credits - VulDB Gitee Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0353 - **State**: PUBLISHED - **Published Date**: August 21, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:50 UTC - **Reserved Date**: May 28, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030821 AppSecInc Security Alert: Buffer Overflow in UDP broadcasts for Microsoft SQL Server client utilities](http://marc.info/?l=bugtraq&m=106149556627778&w=2) 2. [MS03-033](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-033) 3. [8455](http://www.securityfocus.com/bid/8455) 4. [oval:org.mitre.oval:def:1039](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1039) 5. [20030821 AppSecInc Security Alert: Buffer Overflow in UDP broadcasts for Microsoft SQL Server client utilities](http://marc.info/?l=ntbugtraq&m=106251069107953&w=2) 6. [oval:org.mitre.oval:def:6954](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6954) 7. [oval:org.mitre.oval:def:961](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A961) 8. [oval:org.mitre.oval:def:962](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A962)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1660 - **State**: PUBLISHED - **Published Date**: May 17, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 17, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in URUWorks ViPlay3 3.0 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long file entry in a .vpl file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [viplay3-vpl-bo(50403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50403) 2. [8644](https://www.exploit-db.com/exploits/8644) 3. [34877](http://www.securityfocus.com/bid/34877)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4700 - **State**: PUBLISHED - **Published Date**: October 22, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 22, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in admin.php in Libera CMS 1.12 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the libera_staff_pass cookie parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4472](http://securityreason.com/securityalert/4472) 2. [31811](http://secunia.com/advisories/31811) 3. [libera-admin-sql-injection(45011)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45011) 4. [31102](http://www.securityfocus.com/bid/31102) 5. [6416](https://www.exploit-db.com/exploits/6416)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25151 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 01:51 UTC - **Last Updated**: December 20, 2024 at 23:49 UTC - **Reserved Date**: June 06, 2023 at 13:42 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Funnel Builder plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the activate_plugin function in versions up to, and including, 1.3.0. This makes it possible for authenticated attackers to activate any plugin on the vulnerable service. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L` ### Affected Products **cartflowswp - WooCommerce Checkout & Funnel Builder by CartFlows – Create High Converting Stores For WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f0b95670-0767-4325-88d0-4ae6d7302558?source=cve) 2. [](https://blog.nintechnet.com/privilege-escalation-vulnerability-fixed-in-wordpress-cartflows-plugin/) 3. [](https://wpscan.com/vulnerability/b6725319-909f-4d5c-9b34-8b6ea627b223%5D) 4. [](https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-funnel-builder-by-cartflows-create-high-converting-sales-funnels-for-wordpress-privilege-escalation-1-3-0/) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31011 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 00:00 UTC - **Last Updated**: August 20, 2024 at 14:57 UTC - **Reserved Date**: March 27, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Arbitrary file write vulnerability in beescms v.4.0, allows a remote attacker to execute arbitrary code via a file path that was not isolated and the suffix was not verified in admin_template.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ss122-0ss/beescms/blob/main/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41282 - **State**: PUBLISHED - **Published Date**: March 01, 2022 at 22:45 UTC - **Last Updated**: August 04, 2024 at 03:08 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description diag_routes.php in pfSense 2.5.2 allows sed data injection. Authenticated users are intended to be able to view data about the routes set in the firewall. The data is retrieved by executing the netstat utility, and then its output is parsed via the sed utility. Although the common protection mechanisms against command injection (i.e., the usage of the escapeshellarg function for the arguments) are used, it is still possible to inject sed-specific code and write an arbitrary file in an arbitrary location. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.shielder.it/advisories/) 2. [](https://www.shielder.it/advisories/pfsense-remote-command-execution/) 3. [](https://docs.netgate.com/pfsense/en/latest/releases/22-01_2-6-0.html) 4. [](http://packetstormsecurity.com/files/166208/pfSense-2.5.2-Shell-Upload.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7884 - **State**: PUBLISHED - **Published Date**: June 05, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 06:37 UTC - **Reserved Date**: March 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in DisplayLink Core Software Cleaner Application 8.2.1956. When the drivers are updated to a newer version, the product launches a process as SYSTEM to uninstall the old version: cl_1956.exe is run as SYSTEM on the %systemroot%\Temp folder, where any user can write a DLL (e.g., version.dll) to perform DLL Hijacking and elevate privileges to SYSTEM. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20180601 DisplayLink Installer 8.2.1956 DLL Hijack to privilege escalation CVE-2018-7884](http://seclists.org/fulldisclosure/2018/Jun/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34821, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34821 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34821 - **State**: PUBLISHED - **Published Date**: July 12, 2022 at 00:00 UTC - **Last Updated**: April 21, 2025 at 13:52 UTC - **Reserved Date**: June 29, 2022 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2), SCALANCE M804PB (6GK5804-0AP00-2AA2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), SCALANCE M874-2 (6GK5874-2AA00-2AA2), SCALANCE M874-3 (6GK5874-3AA00-2AA2), SCALANCE M876-3 (6GK5876-3AA02-2BA2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2), SCALANCE M876-4 (6GK5876-4AA10-2BA2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0), SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **Siemens - RUGGEDCOM RM1224 LTE(4G) EU** Affected versions: - 0 (Status: affected) **Siemens - RUGGEDCOM RM1224 LTE(4G) NAM** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M804PB** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M812-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M812-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M816-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M816-1 ADSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M826-2 SHDSL-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M874-2** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M874-3** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-3** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-3 (ROK)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE M876-4 (NAM)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM853-1 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM856-1 (EU)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE MUM856-1 (RoW)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE S615 EEC LAN-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE S615 LAN-Router** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC622-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC622-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE SC626-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC626-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE SC632-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC632-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE SC636-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC636-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE SC642-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC642-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE SC646-2C** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE SC646-2C** Affected versions: - V2.3 (Status: affected) **Siemens - SCALANCE WAB762-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WAM766-1 EEC (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUB762-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUB762-1 iFeatures** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM763-1 (US)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1 (ME)** Affected versions: - 0 (Status: affected) **Siemens - SCALANCE WUM766-1 (USA)** Affected versions: - 0 (Status: affected) **Siemens - SIMATIC CP 1242-7 V2** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIMATIC CP 1243-1** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIMATIC CP 1243-7 LTE EU** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIMATIC CP 1243-7 LTE US** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIMATIC CP 1243-8 IRC** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIMATIC CP 1542SP-1 IRC** Affected versions: - V2.0 (Status: affected) **Siemens - SIMATIC CP 1543-1** Affected versions: - All versions < V3.0.22 (Status: affected) **Siemens - SIMATIC CP 1543SP-1** Affected versions: - V2.0 (Status: affected) **Siemens - SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL** Affected versions: - V2.0 (Status: affected) **Siemens - SIPLUS ET 200SP CP 1543SP-1 ISEC** Affected versions: - V2.0 (Status: affected) **Siemens - SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL** Affected versions: - V2.0 (Status: affected) **Siemens - SIPLUS NET CP 1242-7 V2** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIPLUS NET CP 1543-1** Affected versions: - All versions < V3.0.22 (Status: affected) **Siemens - SIPLUS S7-1200 CP 1243-1** Affected versions: - All versions < V3.3.46 (Status: affected) **Siemens - SIPLUS S7-1200 CP 1243-1 RAIL** Affected versions: - All versions < V3.3.46 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-517377.pdf) 2. [](https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf) 3. [](https://cert-portal.siemens.com/productcert/html/ssa-517377.html) 4. [](https://cert-portal.siemens.com/productcert/html/ssa-413565.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17571 - **State**: PUBLISHED - **Published Date**: September 28, 2018 at 05:00 UTC - **Last Updated**: August 05, 2024 at 10:54 UTC - **Reserved Date**: September 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Vanilla before 2.6.1 allows XSS via the email field of a profile. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackerone.com/reports/361957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4198 - **State**: PUBLISHED - **Published Date**: December 04, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 06:54 UTC - **Reserved Date**: December 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in my_orders.php in MyMiniBill allows remote authenticated users to execute arbitrary SQL commands via the orderid parameter in a status action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-1490](http://www.vupen.com/english/advisories/2009/1490) 2. [8864](http://www.exploit-db.com/exploits/8864) 3. [35285](http://secunia.com/advisories/35285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1184, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1184 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1184 - **State**: PUBLISHED - **Published Date**: January 13, 2021 at 21:21 UTC - **Last Updated**: November 12, 2024 at 20:46 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4987 - **State**: PUBLISHED - **Published Date**: September 24, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:17 UTC - **Reserved Date**: September 19, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27364](http://secunia.com/advisories/27364) 2. [20071112 FLEA-2007-0066-1 ImageMagick](http://www.securityfocus.com/archive/1/483572/100/0/threaded) 3. [USN-523-1](http://www.ubuntu.com/usn/usn-523-1) 4. [27309](http://secunia.com/advisories/27309) 5. [25766](http://www.securityfocus.com/bid/25766) 6. [](http://www.imagemagick.org/script/changelog.php) 7. [imagemagick-readblogstring-bo(36739)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36739) 8. [ADV-2007-3245](http://www.vupen.com/english/advisories/2007/3245) 9. [GLSA-200710-27](http://security.gentoo.org/glsa/glsa-200710-27.xml) 10. [1018729](http://www.securitytracker.com/id?1018729) 11. [27048](http://secunia.com/advisories/27048) 12. [28721](http://secunia.com/advisories/28721) 13. [27439](http://secunia.com/advisories/27439) 14. [](https://issues.rpath.com/browse/RPL-1743) 15. [DSA-1858](http://www.debian.org/security/2009/dsa-1858) 16. [[Magick-announce] 20070917 ImageMagick 6.3.5-9, important security updates](http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html) 17. [26926](http://secunia.com/advisories/26926) 18. [MDVSA-2008:035](http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035) 19. [20070919 Multiple Vendor ImageMagick Off-By-One Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=595) 20. [](http://bugs.gentoo.org/show_bug.cgi?id=186030) 21. [SUSE-SR:2007:023](http://www.novell.com/linux/security/advisories/2007_23_sr.html) 22. [36260](http://secunia.com/advisories/36260)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18753, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18753 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18753 - **State**: REJECTED - **Published Date**: May 04, 2020 at 15:39 UTC - **Last Updated**: May 05, 2020 at 13:56 UTC - **Reserved Date**: April 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2763, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2763 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2763 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7603 - **State**: PUBLISHED - **Published Date**: April 09, 2017 at 14:00 UTC - **Last Updated**: August 05, 2024 at 16:04 UTC - **Reserved Date**: April 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description au_channel.h in HE-AAC+ Codec (aka libaacplus) 2.0.2 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.gentoo.org/ago/2017/04/01/libaacplus-signed-integer-overflow-left-shift-and-assertion-failure/) 2. [GLSA-202209-13](https://security.gentoo.org/glsa/202209-13)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3721, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3721 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3721 - **State**: PUBLISHED - **Published Date**: February 13, 2020 at 14:50 UTC - **Last Updated**: August 04, 2024 at 07:44 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Framemaker** Affected versions: - 2019.0.4 and below versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/framemaker/apsb20-04.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29710, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29710 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29710 - **State**: PUBLISHED - **Published Date**: May 24, 2022 at 23:56 UTC - **Last Updated**: August 03, 2024 at 06:33 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in uploadConfirm.php of LimeSurvey v5.3.9 and below allows attackers to execute arbitrary web scripts or HTML via a crafted plugin. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/LimeSurvey/LimeSurvey/commit/f7b35619a1c4b0893754594c7d5870fd599a0f9c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21883 - **State**: PUBLISHED - **Published Date**: December 22, 2021 at 18:06 UTC - **Last Updated**: August 03, 2024 at 18:23 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An OS command injection vulnerability exists in the Web Manager Diagnostics: Ping functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **n/a - Lantronix** Affected versions: - Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU) (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1327)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46547, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46547 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46547 - **State**: PUBLISHED - **Published Date**: January 27, 2022 at 20:22 UTC - **Last Updated**: August 04, 2024 at 05:10 UTC - **Reserved Date**: January 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cesanta/mjs/issues/221)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35798, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35798 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35798 - **State**: PUBLISHED - **Published Date**: June 27, 2023 at 11:39 UTC - **Last Updated**: October 07, 2024 at 18:25 UTC - **Reserved Date**: June 17, 2023 at 20:00 UTC - **Assigned By**: apache ### Vulnerability Description Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it. This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1. It is recommended to upgrade to a version that is not affected ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Apache Software Foundation - Apache Airflow ODBC Provider** Affected versions: - 0 (Status: affected) **Apache Software Foundation - Apache Airflow MSSQL Provider** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/apache/airflow/pull/31984) 2. [](https://lists.apache.org/thread/951rb9m7wwox5p30tdvcfjxq8j1mp4pj) ### Credits - id_No2015429 of 3H Secruity Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10363 - **State**: PUBLISHED - **Published Date**: October 19, 2017 at 17:00 UTC - **Last Updated**: October 04, 2024 at 16:47 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Security). Supported versions that are affected are 11.3, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. Note: Contact Support for fixes. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). ### Affected Products **Oracle Corporation - FLEXCUBE Universal Banking** Affected versions: - 11.3 (Status: affected) - 11.4.0 (Status: affected) - 12.0.1 (Status: affected) - 12.0.2 (Status: affected) - 12.0.3 (Status: affected) - 12.1.0 (Status: affected) - 12.2.0 (Status: affected) - 12.3.0 (Status: affected) - 12.4.0 (Status: affected) ### References 1. [1039594](http://www.securitytracker.com/id/1039594) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 3. [101297](http://www.securityfocus.com/bid/101297)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1749 - **State**: PUBLISHED - **Published Date**: April 04, 2023 at 16:54 UTC - **Last Updated**: January 16, 2025 at 21:36 UTC - **Reserved Date**: March 30, 2023 at 20:02 UTC - **Assigned By**: icscert ### Vulnerability Description The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N` ### Affected Products **Nexx - Smart Alarm NXAL-100** Affected versions: - 0 (Status: affected) **Nexx - Smart Plug NXPG-100W** Affected versions: - 0 (Status: affected) **Nexx - Garage Door Controller NXG-100B, NXG-200** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38450, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38450 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38450 - **State**: PUBLISHED - **Published Date**: September 04, 2023 at 01:16 UTC - **Last Updated**: October 11, 2024 at 16:24 UTC - **Reserved Date**: July 18, 2023 at 07:24 UTC - **Assigned By**: Unisoc ### Vulnerability Description In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9832E/SC9863A/T606/T612/T616/T610/T618** Affected versions: - Android9/Android10/Android11 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0306 - **State**: PUBLISHED - **Published Date**: May 07, 2001 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: May 11, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in calserver in SCO OpenServer allows remote attackers to gain root access via a long message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19981229 Local/remote exploit for SCO UNIX.](http://www.securityfocus.com/templates/archive.pike?list=1&date=1998-12-29&msg=AAh6GYsGU1%40leshka.chuvashia.su) 2. [SB-99.02](ftp://ftp.sco.com/SSE/security_bulletins/SB-99.02a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-4629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-4629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-4629 - **State**: PUBLISHED - **Published Date**: January 23, 2023 at 14:31 UTC - **Last Updated**: April 02, 2025 at 15:40 UTC - **Reserved Date**: December 21, 2022 at 10:04 UTC - **Assigned By**: WPScan ### Vulnerability Description The Product Slider for WooCommerce WordPress plugin before 2.6.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Product Slider for WooCommerce** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45160, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45160 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45160 - **State**: PUBLISHED - **Published Date**: October 05, 2023 at 15:12 UTC - **Last Updated**: May 20, 2025 at 08:27 UTC - **Reserved Date**: October 04, 2023 at 23:59 UTC - **Assigned By**: 1E ### Vulnerability Description In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch. Resolution: This has been fixed in patch Q23094  This issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. Customers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-552: Security Weakness ### Affected Products **1E - 1E Client** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) ### References 1. [](https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33447 - **State**: PUBLISHED - **Published Date**: July 26, 2022 at 12:26 UTC - **Last Updated**: August 03, 2024 at 23:50 UTC - **Reserved Date**: May 20, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cesanta/mjs/issues/164) 2. [](https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0193 - **State**: PUBLISHED - **Published Date**: May 06, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 09:05 UTC - **Reserved Date**: December 03, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [67182](http://www.securityfocus.com/bid/67182) 2. [RHSA-2015:0765](http://rhn.redhat.com/errata/RHSA-2015-0765.html) 3. [59290](http://secunia.com/advisories/59290) 4. [RHSA-2015:0675](http://rhn.redhat.com/errata/RHSA-2015-0675.html) 5. [RHSA-2015:0720](http://rhn.redhat.com/errata/RHSA-2015-0720.html) 6. [RHSA-2014:1020](http://rhn.redhat.com/errata/RHSA-2014-1020.html) 7. [RHSA-2014:1021](http://rhn.redhat.com/errata/RHSA-2014-1021.html) 8. [](https://github.com/netty/netty/issues/2441) 9. [58280](http://secunia.com/advisories/58280) 10. [RHSA-2014:1019](http://rhn.redhat.com/errata/RHSA-2014-1019.html) 11. [](http://netty.io/news/2014/04/30/release-day.html) 12. [RHSA-2014:1351](http://rhn.redhat.com/errata/RHSA-2014-1351.html) 13. [[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1](https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E) 14. [[debian-lts-announce] 20200219 [SECURITY] [DLA 2110-1] netty-3.9 security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21320, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21320 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21320 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:24 UTC - **Last Updated**: September 24, 2024 at 20:24 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H` ### Affected Products **Oracle Corporation - MySQL Cluster** Affected versions: - 8.0.27 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html) 2. [](https://security.netapp.com/advisory/ntap-20220121-0008/) 3. [](https://www.zerodayinitiative.com/advisories/ZDI-22-105/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27494, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27494 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27494 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 09:48 UTC - **Last Updated**: March 11, 2025 at 13:21 UTC - **Reserved Date**: February 26, 2025 at 18:05 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Siemens - SiPass integrated AC5102 (ACC-G2)** Affected versions: - 0 (Status: affected) **Siemens - SiPass integrated ACC-AP** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-515903.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12771, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12771 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12771 - **State**: PUBLISHED - **Published Date**: December 21, 2024 at 07:02 UTC - **Last Updated**: December 28, 2024 at 00:50 UTC - **Reserved Date**: December 18, 2024 at 20:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The eCommerce Product Catalog Plugin for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.43. This is due to missing or incorrect nonce validation on the 'customer_panel_password_reset' function. This makes it possible for unauthenticated attackers to reset the password of any administrator or customer account via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **implecode - eCommerce Product Catalog Plugin for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3513ec24-0b1b-4528-9f89-eee5654e4e98?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ecommerce-product-catalog/trunk/modules/cart/includes/customers/includes/transactions/customer-panel.php#L44) 3. [](https://plugins.trac.wordpress.org/browser/ecommerce-product-catalog/trunk/modules/cart/includes/customers/includes/transactions/customer-panel.php#L108) 4. [](https://plugins.trac.wordpress.org/changeset/3210939/) ### Credits - Khayal Farzaliyev
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7656 - **State**: PUBLISHED - **Published Date**: October 21, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:56 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Indian Management (aka com.magzter.indianmanagement) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#866121](http://www.kb.cert.org/vuls/id/866121) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)