System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27689 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 00:00 UTC - **Last Updated**: August 08, 2024 at 20:46 UTC - **Reserved Date**: February 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stupid Simple CMS v1.2.4 was discovered to contain a Cross-Site Request Forgery (CSRF) via /update-article.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Xin246/cms/blob/main/2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0783, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0783 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0783 - **State**: PUBLISHED - **Published Date**: February 04, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 22:05 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Google Chrome before 9.0.597.84 allows user-assisted remote attackers to cause a denial of service (application crash) via vectors involving a "bad volume setting." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43368](http://secunia.com/advisories/43368) 2. [DSA-2166](http://www.debian.org/security/2011/dsa-2166) 3. [ADV-2011-0408](http://www.vupen.com/english/advisories/2011/0408) 4. [](http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html) 5. [oval:org.mitre.oval:def:14730](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14730) 6. [](http://code.google.com/p/chromium/issues/detail?id=68244)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9852, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9852 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9852 - **State**: PUBLISHED - **Published Date**: August 05, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An Incorrect Password Management issue was discovered in SMA Solar Technology products. Default passwords exist that are rarely changed. User passwords will almost always be default. Installer passwords are expected to be default or similar across installations installed by the same company (but are sometimes changed). Hidden user accounts have (at least in some cases, though more research is required to test this for all hidden user accounts) a fixed password for all devices; it can never be changed by a user. Other vulnerabilities exist that allow an attacker to get the passwords of these hidden user accounts. NOTE: the vendor reports that it has no influence on the allocation of passwords, and that global hardcoded master passwords do not exist. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.sma.de/en/statement-on-cyber-security.html) 2. [](https://horusscenario.com/CVE-information/) 3. [](http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27941, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27941 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27941 - **State**: PUBLISHED - **Published Date**: March 26, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 05:41 UTC - **Reserved Date**: March 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_l2len_protocol in common/get.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/appneta/tcpreplay/issues/716) 2. [FEDORA-2022-680ea95f71](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/) 3. [FEDORA-2022-47484afa15](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/) 4. [FEDORA-2022-d31a521866](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/) 5. [GLSA-202210-08](https://security.gentoo.org/glsa/202210-08)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46331 - **State**: PUBLISHED - **Published Date**: April 30, 2025 at 18:27 UTC - **Last Updated**: May 01, 2025 at 18:52 UTC - **Reserved Date**: April 22, 2025 at 22:41 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.8.10 to v1.3.6 (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. This issue has been patched in version 1.8.11. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **openfga - openfga** Affected versions: - >=1.3.6, <1.8.11 (Status: affected) ### References 1. [https://github.com/openfga/openfga/security/advisories/GHSA-w222-m46c-mgh6](https://github.com/openfga/openfga/security/advisories/GHSA-w222-m46c-mgh6) 2. [https://github.com/openfga/openfga/commit/244302e7a8b979d66cc1874a3899cdff7d47862f](https://github.com/openfga/openfga/commit/244302e7a8b979d66cc1874a3899cdff7d47862f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40485 - **State**: PUBLISHED - **Published Date**: September 26, 2022 at 13:14 UTC - **Last Updated**: May 21, 2025 at 18:38 UTC - **Reserved Date**: September 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /package_detail.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Geoduck-CNN/Bug_report/blob/main/vendors/pushpam02/wedding-planner/SQLi-3.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18499 - **State**: REJECTED - **Published Date**: October 28, 2019 at 14:42 UTC - **Last Updated**: October 28, 2019 at 14:42 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-57071, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-57071 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-57071 - **State**: PUBLISHED - **Published Date**: February 05, 2025 at 00:00 UTC - **Last Updated**: February 06, 2025 at 16:21 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A prototype pollution in the lib.combine function of php-parser v3.2.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/tariqhawis/b56500d3a8866467ee769df7453eedaa)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15751, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15751 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15751 - **State**: PUBLISHED - **Published Date**: October 07, 2019 at 11:45 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 28, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An unrestricted file upload vulnerability in SITOS six Build v6.2.1 allows remote attackers to execute arbitrary code by uploading a SCORM file with an executable extension. This allows an unauthenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to the web root of the application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.contextis.com/en/resources/advisories/cve-2019-15751)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35585 - **State**: PUBLISHED - **Published Date**: August 12, 2022 at 15:55 UTC - **Last Updated**: August 03, 2024 at 09:36 UTC - **Reserved Date**: July 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the "start_date" Parameter ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://huntr.dev/bounties/5-other-forkcms/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-3131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-3131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-3131 - **State**: PUBLISHED - **Published Date**: April 09, 2025 at 17:47 UTC - **Last Updated**: April 09, 2025 at 18:33 UTC - **Reserved Date**: April 02, 2025 at 16:30 UTC - **Assigned By**: drupal ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Drupal ECA: Event - Condition - Action allows Cross Site Request Forgery.This issue affects ECA: Event - Condition - Action: from 0.0.0 before 1.1.12, from 2.0.0 before 2.0.16, from 2.1.0 before 2.1.7, from 0.0.0 before 1.2.*. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Drupal - ECA: Event - Condition - Action** Affected versions: - 0.0.0 (Status: affected) - 2.0.0 (Status: affected) - 2.1.0 (Status: affected) - 0.0.0 (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2025-031) ### Credits - Juraj Nemec (poker10) - Benji Fisher (benjifisher) - Jürgen Haas (jurgenhaas) - Lee Rowlands (larowlan) - Greg Knaddison (greggles) - Juraj Nemec (poker10)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6520, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6520 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6520 - **State**: PUBLISHED - **Published Date**: February 02, 2018 at 01:00 UTC - **Last Updated**: August 05, 2024 at 06:10 UTC - **Reserved Date**: February 01, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SimpleSAMLphp before 1.15.2 allows remote attackers to bypass an open redirect protection mechanism via crafted authority data in a URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://simplesamlphp.org/security/201801-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6051, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6051 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6051 - **State**: PUBLISHED - **Published Date**: September 30, 2024 at 12:33 UTC - **Last Updated**: October 01, 2024 at 14:34 UTC - **Reserved Date**: June 17, 2024 at 09:27 UTC - **Assigned By**: CERT-PL ### Vulnerability Description Cross Application Scripting vulnerability in Vercom S.A. Redlink SDK in specific situations allows local code injection and to manipulate the view of a vulnerable application.This issue affects Redlink SDK versions through 1.13. ### Weakness Classification (CWE) - CWE-99: Security Weakness ### Affected Products **Vercom S.A. - Redlink SDK** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert.pl/en/posts/2024/09/CVE-2024-6051/) 2. [](https://cert.pl/posts/2024/09/CVE-2024-6051/) ### Credits - Maksymilian Motyl (Immunity Systems)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-2173, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-2173 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-2173 - **State**: PUBLISHED - **Published Date**: June 21, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 15:27 UTC - **Reserved Date**: February 19, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://vndh.net/note:wordpress-351-denial-service) 2. [](http://wordpress.org/news/2013/06/wordpress-3-5-2/) 3. [DSA-2718](http://www.debian.org/security/2013/dsa-2718) 4. [[oss-security] 20130612 Re: CVE request: WordPress 3.5.1 denial of service vulnerability](http://openwall.com/lists/oss-security/2013/06/12/2) 5. [20130613 Re: WordPress 3.5.1, Denial of Service](http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html) 6. [](http://codex.wordpress.org/Version_3.5.2) 7. [](https://github.com/wpscanteam/wpscan/issues/219)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52789 - **State**: PUBLISHED - **Published Date**: November 19, 2024 at 00:00 UTC - **Last Updated**: November 22, 2024 at 16:27 UTC - **Reserved Date**: November 15, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda W30E v2.0 V16.01.0.8 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://colorful-meadow-5b9.notion.site/W30E_HardCode_vuln-13dc216a1c30805998f8d994f966760a)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-12107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-12107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-12107 - **State**: PUBLISHED - **Published Date**: August 12, 2020 at 18:14 UTC - **Last Updated**: August 04, 2024 at 11:48 UTC - **Reserved Date**: April 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows command injection via a text field, which allow full control over this module's Operating System. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.stengg.com/cybersecurity) 2. [](https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5423, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5423 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5423 - **State**: PUBLISHED - **Published Date**: October 12, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 15:31 UTC - **Reserved Date**: October 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tiki-graph_formula.php in TikiWiki 1.9.8 allows remote attackers to execute arbitrary code via PHP sequences in the f array parameter, which are processed by create_function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-200710-21](http://www.gentoo.org/security/en/glsa/glsa-200710-21.xml) 2. [ADV-2007-3492](http://www.vupen.com/english/advisories/2007/3492) 3. [](http://securityvulns.ru/Sdocument162.html) 4. [20071010 Vulnerabilities digest](http://www.securityfocus.com/archive/1/482006/100/0/threaded) 5. [26006](http://www.securityfocus.com/bid/26006) 6. [27344](http://secunia.com/advisories/27344) 7. [](http://bugs.gentoo.org/show_bug.cgi?id=195503) 8. [40478](http://osvdb.org/40478) 9. [3216](http://securityreason.com/securityalert/3216) 10. [tikiwiki-tikigraphformula-command-execution(37076)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37076) 11. [20071011 Tikiwiki 1.9.8 exploit ITW](http://www.securityfocus.com/archive/1/482128/100/0/threaded) 12. [](http://sourceforge.net/project/shownotes.php?release_id=546283&group_id=64258) 13. [](http://sourceforge.net/forum/forum.php?forum_id=744898) 14. [4509](https://www.exploit-db.com/exploits/4509) 15. [27190](http://secunia.com/advisories/27190)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12094 - **State**: PUBLISHED - **Published Date**: October 24, 2019 at 16:49 UTC - **Last Updated**: August 04, 2024 at 23:10 UTC - **Reserved Date**: May 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Horde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://numanozdemir.com/respdisc/horde/horde.mp4) 2. [](https://numanozdemir.com/respdisc/horde/horde.txt) 3. [](https://packetstormsecurity.com/files/152975/Horde-Webmail-5.2.22-XSS-CSRF-SQL-Injection-Code-Execution.html) 4. [](https://www.exploit-db.com/exploits/46903) 5. [](https://cxsecurity.com/issue/WLB-2019050199) 6. [](https://bugs.horde.org/ticket/14926)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0543 - **State**: PUBLISHED - **Published Date**: February 04, 2006 at 02:00 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: February 04, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cerulean Trillian 3.1.0.120 allows remote attackers to cause a denial of service (client crash) via an AIM message containing the Mac encoded Rich Text Format (RTF) escape sequences (1) \'d1, (2) \'d2, (3) \'d3, (4) \'d4, and (5) \'d5. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22877](http://www.osvdb.org/22877)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1794, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1794 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1794 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 01, 2024 at 18:48 UTC - **Reserved Date**: February 22, 2024 at 20:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Forminator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. 3gpp file) in all versions up to, and including, 1.29.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **wpmudev - Forminator – Contact Form, Payment Form & Custom Form Builder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/23feb72c-7e6f-436b-b56e-dc6185302d31?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3047085%40forminator&old=3028842%40forminator&sfp_email=&sfph_mail=) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9807, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9807 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9807 - **State**: PUBLISHED - **Published Date**: March 30, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: June 02, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1343463) 2. [](https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=be644895456764f2c2670f297d9d9860ff0bdd75) 3. [[oss-security] 20160602 Re: ImageMagick CVEs](http://www.openwall.com/lists/oss-security/2016/06/02/13) 4. [[oss-security] 20141224 Imagemagick fuzzing bug](http://www.openwall.com/lists/oss-security/2014/12/24/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20527, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20527 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20527 - **State**: PUBLISHED - **Published Date**: April 19, 2021 at 16:20 UTC - **Last Updated**: September 16, 2024 at 22:14 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Resilient SOAR V38.0 could allow a privileged user to create create malicious scripts that could be executed as another user. IBM X-Force ID: 198759. ### Affected Products **IBM - Resilient OnPrem** Affected versions: - 38.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6444747) 2. [ibm-resilient-cve202120527-code-exec (198759)](https://exchange.xforce.ibmcloud.com/vulnerabilities/198759)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4385, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4385 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4385 - **State**: PUBLISHED - **Published Date**: June 19, 2019 at 13:30 UTC - **Last Updated**: September 16, 2024 at 19:40 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Spectrum Protect Plus 10.1.2 may display the vSnap CIFS password in the IBM Spectrum Protect Plus Joblog. This can result in an attacker gaining access to sensitive information as well as vSnap. IBM X-Force ID: 162173. ### Affected Products **IBM - Spectrum Protect Plus** Affected versions: - 10.1.2 (Status: affected) ### References 1. [](http://www.ibm.com/support/docview.wss?uid=ibm10886099) 2. [ibm-spectrum-cve20194385-info-disc (162173)](https://exchange.xforce.ibmcloud.com/vulnerabilities/162173) 3. [108899](http://www.securityfocus.com/bid/108899)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32240 - **State**: PUBLISHED - **Published Date**: June 14, 2022 at 22:30 UTC - **Last Updated**: August 03, 2024 at 07:39 UTC - **Reserved Date**: June 02, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description When a user opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **SAP SE - SAP 3D Visual Enterprise Viewer** Affected versions: - 9.0 (Status: affected) ### References 1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html) 2. [](https://launchpad.support.sap.com/#/notes/3206271)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-43009, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-43009 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-43009 - **State**: PUBLISHED - **Published Date**: April 08, 2022 at 19:57 UTC - **Last Updated**: August 04, 2024 at 03:47 UTC - **Reserved Date**: October 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross Site Scripting (XSS) vulnerability exists in OpServices OpMon through 9.11 via the search parameter in the request URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/166619/Opmon-9.11-Cross-Site-Scripting.html) 2. [](https://www.exploit-db.com/exploits/50857)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3273 - **State**: PUBLISHED - **Published Date**: August 10, 2008 at 20:00 UTC - **Last Updated**: August 07, 2024 at 09:28 UTC - **Reserved Date**: July 24, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2008:0828](http://rhn.redhat.com/errata/RHSA-2008-0828.html) 2. [RHSA-2008:0826](http://rhn.redhat.com/errata/RHSA-2008-0826.html) 3. [HPSBMU02736](http://marc.info/?l=bugtraq&m=132698550418872&w=2) 4. [](http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp03/html-single/readme/index.html) 5. [jbosseap-statusservlet-info-disclosure(44235)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44235) 6. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457757) 7. [](http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp01/html-single/readme/) 8. [RHSA-2008:0827](http://rhn.redhat.com/errata/RHSA-2008-0827.html) 9. [SSRT100699](http://marc.info/?l=bugtraq&m=132698550418872&w=2) 10. [](https://jira.jboss.org/jira/browse/JBPAPP-544) 11. [RHSA-2008:0825](http://rhn.redhat.com/errata/RHSA-2008-0825.html) 12. [1020628](http://www.securitytracker.com/id?1020628) 13. [30540](http://www.securityfocus.com/bid/30540)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3597 - **State**: PUBLISHED - **Published Date**: October 08, 2020 at 04:20 UTC - **Last Updated**: November 13, 2024 at 17:51 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the configuration restore feature of Cisco Nexus Data Broker software could allow an unauthenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient validation of configuration backup files. An attacker could exploit this vulnerability by persuading an administrator to restore a crafted configuration backup file. A successful exploit could allow the attacker to overwrite arbitrary files that are accessible through the affected software on an affected device. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-23: Security Weakness ### Affected Products **Cisco - Cisco Nexus Data Broker** Affected versions: - n/a (Status: affected) ### References 1. [20201007 Cisco Nexus Data Broker Software Path Traversal Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-path-traversal-wVDyXZPy)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27249 - **State**: PUBLISHED - **Published Date**: February 04, 2021 at 06:14 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 19, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0004 and 0x0015, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **n/a - Softmaker** Affected versions: - SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014) (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0886, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0886 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0886 - **State**: PUBLISHED - **Published Date**: January 25, 2024 at 21:31 UTC - **Last Updated**: September 12, 2024 at 19:27 UTC - **Reserved Date**: January 25, 2024 at 13:44 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in Poikosoft EZ CD Audio Converter 8.0.7. Affected by this vulnerability is an unknown functionality of the component Activation Handler. The manipulation of the argument Key leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-252037 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **Poikosoft - EZ CD Audio Converter** Affected versions: - 8.0.7 (Status: affected) ### References 1. [](https://vuldb.com/?id.252037) 2. [](https://vuldb.com/?ctiid.252037) 3. [](https://fitoxs.com/vuldb/09-exploit-perl.txt) ### Credits - fernando.mengali (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5488, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5488 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5488 - **State**: PUBLISHED - **Published Date**: January 15, 2017 at 02:00 UTC - **Last Updated**: August 05, 2024 at 15:04 UTC - **Reserved Date**: January 14, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [95397](http://www.securityfocus.com/bid/95397) 2. [DSA-3779](http://www.debian.org/security/2017/dsa-3779) 3. [](https://wpvulndb.com/vulnerabilities/8716) 4. [](https://codex.wordpress.org/Version_4.7.1) 5. [[oss-security] 20170114 Re: CVE Request: Wordpress: 8 security issues in 4.7](http://www.openwall.com/lists/oss-security/2017/01/14/6) 6. [1037591](http://www.securitytracker.com/id/1037591) 7. [](https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/) 8. [](https://github.com/WordPress/WordPress/commit/c9ea1de1441bb3bda133bf72d513ca9de66566c2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14843 - **State**: PUBLISHED - **Published Date**: January 07, 2020 at 16:34 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 10, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks. Versions shipped with Red Hat Jboss EAP 7 and Red Hat SSO 7 are vulnerable to this issue. ### Weakness Classification (CWE) - CWE-592: Security Weakness ### Affected Products **Red Hat - wildfly-security-manager** Affected versions: - As shipped with Red Hat Jboss EAP 7 and Red Hat SSO 7 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14843)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-37513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-37513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-37513 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 00:25 UTC - **Last Updated**: October 04, 2024 at 13:06 UTC - **Reserved Date**: July 06, 2023 at 16:11 UTC - **Assigned By**: HCL ### Vulnerability Description When the app is put to the background and the user goes to the task switcher of iOS, the app snapshot is not blurred which may reveal sensitive information. ### CVSS Metrics - **CVSS Base Score**: 3.3/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Affected Products **HCL Software - HCL Traveler To Do** Affected versions: - < 12.0.6 (Status: affected) ### References 1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106692)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6999, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6999 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6999 - **State**: PUBLISHED - **Published Date**: December 07, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 17:53 UTC - **Reserved Date**: December 06, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The IsHandleEntrySecure function in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 SP2 does not properly validate the tagPROCESSINFO pW32Job field, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted NtUserValidateHandleSecure call for an owned object. NOTE: the vendor reportedly disputes the significance of this report, stating that "it appears to be a local DOS ... we don't consider it a security vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [64057](http://www.securityfocus.com/bid/64057) 2. [](http://pastebin.com/raw.php?i=we0ZSQC0) 3. [55633](http://secunia.com/advisories/55633)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-41034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-41034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-41034 - **State**: PUBLISHED - **Published Date**: September 29, 2021 at 21:35 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: eclipse ### Vulnerability Description The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che. ### Weakness Classification (CWE) - CWE-924: Security Weakness ### Affected Products **The Eclipse Foundation - Eclipse Che** Affected versions: - 6.0 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1332, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1332 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1332 - **State**: PUBLISHED - **Published Date**: February 04, 2021 at 16:41 UTC - **Last Updated**: November 08, 2024 at 23:48 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Cisco - Cisco Small Business RV Series Router Firmware** Affected versions: - n/a (Status: affected) ### References 1. [20210203 Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-5210, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-5210 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-5210 - **State**: PUBLISHED - **Published Date**: January 19, 2017 at 05:43 UTC - **Last Updated**: August 06, 2024 at 00:53 UTC - **Reserved Date**: May 31, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. ### Affected Products **n/a - Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android** Affected versions: - Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android (Status: affected) ### References 1. [RHSA-2016:2919](http://rhn.redhat.com/errata/RHSA-2016-2919.html) 2. [94633](http://www.securityfocus.com/bid/94633) 3. [](https://crbug.com/654183) 4. [](https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html) 5. [GLSA-201612-11](https://security.gentoo.org/glsa/201612-11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4252 - **State**: PUBLISHED - **Published Date**: April 08, 2020 at 14:05 UTC - **Last Updated**: September 16, 2024 at 17:43 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM DOORS Next Generation (DNG/RRC) 6.0.2. 6.0.6, and 6.0.61 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 175490. ### Affected Products **IBM - Rational DOORS Next Generation** Affected versions: - 6.0.2 (Status: affected) - 6.0.6 (Status: affected) - 6.0.61 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6172635) 2. [ibm-dng-cve20204252-xss (175490)](https://exchange.xforce.ibmcloud.com/vulnerabilities/175490)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-0370, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-0370 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-0370 - **State**: PUBLISHED - **Published Date**: April 13, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 17:02 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax's link parameter. ### Affected Products **mediawiki - mediawiki** Affected versions: - n/a (Status: affected) ### References 1. [[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16](https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html) 2. [](https://security-tracker.debian.org/tracker/CVE-2017-0370) 3. [](https://phabricator.wikimedia.org/T48143)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8890, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8890 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8890 - **State**: PUBLISHED - **Published Date**: May 10, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [98562](http://www.securityfocus.com/bid/98562) 2. [](https://source.android.com/security/bulletin/2017-09-01) 3. [RHSA-2017:2669](https://access.redhat.com/errata/RHSA-2017:2669) 4. [RHSA-2018:1854](https://access.redhat.com/errata/RHSA-2018:1854) 5. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=657831ffc38e30092a2d5f03d385d710eb88b09a) 6. [](https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a) 7. [RHSA-2017:2077](https://access.redhat.com/errata/RHSA-2017:2077) 8. [DSA-3886](http://www.debian.org/security/2017/dsa-3886) 9. [RHSA-2017:1842](https://access.redhat.com/errata/RHSA-2017:1842)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-1741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-1741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-1741 - **State**: PUBLISHED - **Published Date**: July 19, 2011 at 20:00 UTC - **Last Updated**: August 06, 2024 at 22:37 UTC - **Reserved Date**: April 19, 2011 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Stack-based buffer overflow in ftserver.exe in the OpenText Hummingbird Client Connector, as used in the Indexing Server in EMC Documentum eRoom 7.x before 7.4.3.f and other products, allows remote attackers to execute arbitrary code by sending a crafted message over TCP. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [48712](http://www.securityfocus.com/bid/48712) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-11-236) 3. [8311](http://securityreason.com/securityalert/8311) 4. [20110715 ESA-2011-022: EMC Documentum eRoom Indexing Server HummingBird Client Connector Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/518897/100/0/threaded) 5. [20110718 ZDI-11-236: EMC Documentum eRoom Indexing Server OpenText HummingBird Connector Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/518913/100/0/threaded) 6. [1025790](http://securitytracker.com/id?1025790)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25607, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25607 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25607 - **State**: PUBLISHED - **Published Date**: October 10, 2023 at 16:51 UTC - **Last Updated**: October 22, 2024 at 20:57 UTC - **Reserved Date**: February 08, 2023 at 13:42 UTC - **Assigned By**: fortinet ### Vulnerability Description An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Fortinet - FortiAnalyzer** Affected versions: - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) - 6.2.0 (Status: affected) - 6.0.0 (Status: affected) **Fortinet - FortiManager** Affected versions: - 7.2.0 (Status: affected) - 7.0.0 (Status: affected) - 6.4.0 (Status: affected) - 6.2.0 (Status: affected) - 6.0.0 (Status: affected) **Fortinet - FortiADC** Affected versions: - 7.1.0 (Status: affected) - 7.0.0 (Status: affected) - 6.2.0 (Status: affected) - 6.1.0 (Status: affected) - 6.0.0 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-22-352](https://fortiguard.com/psirt/FG-IR-22-352)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39947 - **State**: PUBLISHED - **Published Date**: July 31, 2024 at 03:22 UTC - **Last Updated**: October 27, 2024 at 21:48 UTC - **Reserved Date**: July 05, 2024 at 03:08 UTC - **Assigned By**: dahua ### Vulnerability Description A vulnerability has been found in Dahua products.After obtaining the ordinary user's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Dahua - NVR4XXX** Affected versions: - NVR4XXX Versions which Build time before 2023/12/13 (Status: affected) ### References 1. [](https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8366, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8366 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8366 - **State**: PUBLISHED - **Published Date**: August 31, 2024 at 18:00 UTC - **Last Updated**: September 03, 2024 at 13:57 UTC - **Reserved Date**: August 31, 2024 at 05:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /index.php?id=userProfileEdit of the component Update My Profile Page. The manipulation of the argument fname/lname/email with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **code-projects - Pharmacy Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-276261 | code-projects Pharmacy Management System Update My Profile Page index.php cross site scripting](https://vuldb.com/?id.276261) 2. [VDB-276261 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276261) 3. [Submit #398777 | https://code-projects.org/ https://code-projects.org/pharmacy-management-system-in-php-with-source-code/ 1.0 Stored XSS](https://vuldb.com/?submit.398777) 4. [](https://code-projects.org/) ### Credits - vulrep (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46382, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46382 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46382 - **State**: PUBLISHED - **Published Date**: December 06, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 16:14 UTC - **Reserved Date**: December 03, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has Insecure Permissions. After signing into Digital Rebar, users are issued authentication tokens tied to their account to perform actions within Digital Rebar. During the validation process of these tokens, Digital Rebar did not check if the user account still exists. Deleted Digital Rebar users could still use their tokens to perform actions within Digital Rebar. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rackn.com/products/rebar/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8617 - **State**: PUBLISHED - **Published Date**: December 12, 2018 at 00:00 UTC - **Last Updated**: August 05, 2024 at 07:02 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8618, CVE-2018-8624, CVE-2018-8629. ### Affected Products **Microsoft - Microsoft Edge** Affected versions: - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) - Windows Server 2019 (Status: affected) **Microsoft - ChakraCore** Affected versions: - ChakraCore (Status: affected) ### References 1. [106112](http://www.securityfocus.com/bid/106112) 2. [46202](https://www.exploit-db.com/exploits/46202/) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8617)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38936, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38936 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38936 - **State**: PUBLISHED - **Published Date**: August 07, 2023 at 00:00 UTC - **Last Updated**: October 15, 2024 at 20:05 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, AC5 V1.0 V15.03.06.28, FH1203 V2.0.1.6, AC9 V3.0 V15.03.06.42_multi and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetSpeedWan/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4287, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4287 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4287 - **State**: PUBLISHED - **Published Date**: July 29, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Firepower Extensible Operating System 1.1(1.86) on Firepower 9000 devices allows remote attackers to bypass intended access restrictions and obtain sensitive device information by visiting an unspecified web page, aka Bug ID CSCuu82230. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20150727 Cisco Firepower 9000 Series Unauthenticated Web Page Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=40136)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20154, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20154 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20154 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 13:18 UTC - **Last Updated**: August 03, 2024 at 02:02 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-06-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11538 - **State**: PUBLISHED - **Published Date**: November 22, 2024 at 20:49 UTC - **Last Updated**: November 22, 2024 at 21:35 UTC - **Reserved Date**: November 20, 2024 at 21:54 UTC - **Assigned By**: zdi ### Vulnerability Description IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24629. ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **IrfanView - IrfanView** Affected versions: - 4.67.0.0 (Status: affected) ### References 1. [ZDI-24-1588](https://www.zerodayinitiative.com/advisories/ZDI-24-1588/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32633, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32633 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32633 - **State**: PUBLISHED - **Published Date**: May 21, 2021 at 13:55 UTC - **Last Updated**: August 03, 2024 at 23:25 UTC - **Reserved Date**: May 12, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **zopefoundation - Zope** Affected versions: - < 4.6 (Status: affected) - >= 5.0, < 5.2 (Status: affected) ### References 1. [](https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36) 2. [](https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91) 3. [[oss-security] 20210521 Plone security hotfix 20210518](http://www.openwall.com/lists/oss-security/2021/05/21/1) 4. [[oss-security] 20210522 Re: Plone security hotfix 20210518](http://www.openwall.com/lists/oss-security/2021/05/22/1) 5. [](https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47358 - **State**: PUBLISHED - **Published Date**: November 01, 2024 at 14:17 UTC - **Last Updated**: November 01, 2024 at 20:20 UTC - **Reserved Date**: September 24, 2024 at 13:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Popup Maker allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Popup Maker: from n/a through 1.19.2. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Popup Maker - Popup Maker** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/popup-maker/wordpress-popup-maker-plugin-1-19-2-broken-access-control-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-25964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-25964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-25964 - **State**: PUBLISHED - **Published Date**: March 25, 2024 at 08:13 UTC - **Last Updated**: August 23, 2024 at 18:53 UTC - **Reserved Date**: February 13, 2024 at 05:34 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS 9.5.0.x through 9.7.0.x contain a covert timing channel vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-385: Security Weakness ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 9.5.0.0 (Status: affected) - 9.6.1.0 (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000222691/dsa-2024-062-security-update-for-dell-powerscale-onefs-for-proprietary-code-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23118 - **State**: PUBLISHED - **Published Date**: March 01, 2025 at 01:52 UTC - **Last Updated**: March 04, 2025 at 19:14 UTC - **Reserved Date**: January 11, 2025 at 01:00 UTC - **Assigned By**: hackerone ### Vulnerability Description An Improper Certificate Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system. ### Affected Products **Ubiquiti Inc - UniFi Protect Cameras** Affected versions: - 4.74.106 (Status: affected) ### References 1. [](https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11117, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11117 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11117 - **State**: PUBLISHED - **Published Date**: July 31, 2017 at 13:00 UTC - **Last Updated**: August 05, 2024 at 17:57 UTC - **Reserved Date**: July 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ExifImageFile::readDHT function in ExifImageFileRead.cpp in OpenExif 2.1.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted jpg file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/openexif/bugs/18/) 2. [](http://seclists.org/fulldisclosure/2017/Jul/77)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-1172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-1172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-1172 - **State**: PUBLISHED - **Published Date**: December 19, 2000 at 05:00 UTC - **Last Updated**: August 08, 2024 at 05:45 UTC - **Reserved Date**: December 14, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Gaim 0.10.3 and earlier using the OSCAR protocol allows remote attackers to conduct a denial of service and possibly execute arbitrary commands via a long HTML tag. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1948](http://www.securityfocus.com/bid/1948) 2. [20001110 Advisory: Gaim remote vulnerability](http://archives.neohapsis.com/archives/bugtraq/2000-11/0204.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27959, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27959 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27959 - **State**: PUBLISHED - **Published Date**: March 17, 2024 at 16:27 UTC - **Last Updated**: August 02, 2024 at 00:41 UTC - **Reserved Date**: February 28, 2024 at 16:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wpexpertsio WC Shop Sync – Integrate Square and WooCommerce for Seamless Shop Management allows Reflected XSS.This issue affects WC Shop Sync – Integrate Square and WooCommerce for Seamless Shop Management: from n/a through 4.2.9. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Wpexpertsio - WC Shop Sync – Integrate Square and WooCommerce for Seamless Shop Management** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/woosquare/wordpress-apiexperts-square-for-woocommerce-plugin-4-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - stealthcopter (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0853 - **State**: PUBLISHED - **Published Date**: April 20, 2011 at 10:00 UTC - **Last Updated**: September 16, 2024 at 23:02 UTC - **Reserved Date**: February 04, 2011 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle PeopleSoft Enterprise HRMS 9.0 Bundle #15 and 9.1 Bundle #5 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to ePerformance. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9782, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9782 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9782 - **State**: PUBLISHED - **Published Date**: June 21, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 17:18 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mdadams/jasper/issues/140) 2. [GLSA-201908-03](https://security.gentoo.org/glsa/201908-03) 3. [openSUSE-SU-2020:1517](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html) 4. [openSUSE-SU-2020:1523](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2500, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2500 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2500 - **State**: PUBLISHED - **Published Date**: May 24, 2023 at 23:38 UTC - **Last Updated**: January 13, 2025 at 16:47 UTC - **Reserved Date**: May 03, 2023 at 14:57 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.3.19 via deserialization of untrusted input from the 'go_pricing' shortcode 'data' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Granth - Go Pricing - WordPress Responsive Pricing Tables** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f7686b11-97a8-4f09-bbfa-d77120cc35b7?source=cve) 2. [](https://codecanyon.net/item/go-pricing-wordpress-responsive-pricing-tables/3725820) ### Credits - Lana Codes
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21125 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 17:10 UTC - **Last Updated**: February 12, 2025 at 20:51 UTC - **Reserved Date**: December 04, 2024 at 17:19 UTC - **Assigned By**: adobe ### Vulnerability Description InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Adobe - InDesign Desktop** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/indesign/apsb25-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6422 - **State**: PUBLISHED - **Published Date**: September 20, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:17 UTC - **Reserved Date**: September 16, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://linux.oracle.com/errata/ELSA-2014-1676) 2. [61933](http://secunia.com/advisories/61933) 3. [openSUSE-SU-2014:1249](http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html) 4. [RHSA-2014:1677](http://rhn.redhat.com/errata/RHSA-2014-1677.html) 5. [RHSA-2014:1676](http://rhn.redhat.com/errata/RHSA-2014-1676.html) 6. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920) 7. [DSA-3049](http://www.debian.org/security/2014/dsa-3049) 8. [SUSE-SU-2014:1221](http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html) 9. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984) 10. [60280](http://secunia.com/advisories/60280) 11. [60578](http://secunia.com/advisories/60578) 12. [](http://linux.oracle.com/errata/ELSA-2014-1677) 13. [](http://www.wireshark.org/security/wnpa-sec-2014-12.html) 14. [61929](http://secunia.com/advisories/61929)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2398 - **State**: PUBLISHED - **Published Date**: August 08, 2022 at 13:48 UTC - **Last Updated**: August 03, 2024 at 00:39 UTC - **Reserved Date**: July 13, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - WordPress Comments Fields** Affected versions: - 4.1 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672) ### Credits - Rafshanzani Suhada
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38655 - **State**: PUBLISHED - **Published Date**: November 13, 2024 at 01:54 UTC - **Last Updated**: November 23, 2024 at 21:06 UTC - **Reserved Date**: June 19, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description Argument injection in Ivanti Connect Secure before version 22.7R2.1 and 9.1R18.9 and Ivanti Policy Secure before version 22.7R1.1 and 9.1R18.9 allows a remote authenticated attacker with admin privileges to achieve remote code execution. ### Affected Products **Ivanti - Connect Secure** Affected versions: - 22.7R2.1 (Status: affected) - 9.1R18.9 (Status: affected) **Ivanti - Policy Secure** Affected versions: - 22.7R1.1 (Status: affected) - 9.1R18.9 (Status: affected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22169, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22169 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22169 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 00:21 UTC - **Last Updated**: September 17, 2024 at 00:35 UTC - **Reserved Date**: December 21, 2021 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker who sends specific packets in certain orders and at specific timings to force OSPFv3 to unexpectedly enter graceful-restart (GR helper mode) even though there is not any Grace-LSA received in OSPFv3 causing a Denial of Service (DoS). Unexpectedly entering GR helper mode might cause the OSPFv3 neighbor adjacency formed on this interface to be stuck in the "INIT" state which can be observed by issuing the following command: user@device> show ospf3 neighbor ID Interface State xx.xx.xx.xx ae100.0 Init <<<<<<<<<< An indicator of compromise can be seen in log files when traceoptions for OSPFv3 are enabled before the issue occurs. These logfile messages are as follows: OSPF restart signaling: Received hello with LR bit set from nbr ip=xx::xx id=xx.xx.xx.xx. Set oob-resync capabilty 1. OSPF Restart Signaling: Start helper mode for nbr ip xx::xx id xx.xx.xx.xx OSPF restart signaling: abort helper mode for nbr ip=xx::xx id=xx.xx.xx.xx OSPF neighbor xx::xx (realm ipv6-unicast <interface.unit> area xx.xx.xx.xx) state changed from Full to Init due to 1WayRcvd (event reason: neighbor is in one-way mode) (nbr helped: 0) This issue affects: Juniper Networks Junos OS. 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S4; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect any version of Juniper Networks Junos OS 12.3. This issue affects Juniper Networks Junos OS Evolved all versions prior to 21.2R2-EVO. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-665: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 12.3 Any (Status: unaffected) - 15.1 (Status: affected) - 18.3 (Status: affected) - 18.4 (Status: affected) - 19.1 (Status: affected) - 19.2 (Status: affected) - 19.3 (Status: affected) - 19.4 (Status: affected) - 20.1 (Status: affected) - 20.2 (Status: affected) - 20.3 (Status: affected) - 20.4 (Status: affected) - 21.1 (Status: affected) - 21.2 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - unspecified (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11276)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8158, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8158 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8158 - **State**: PUBLISHED - **Published Date**: September 18, 2020 at 20:12 UTC - **Last Updated**: August 04, 2024 at 09:48 UTC - **Reserved Date**: January 28, 2020 at 00:00 UTC - **Assigned By**: hackerone ### Vulnerability Description Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks. ### Weakness Classification (CWE) - CWE-471: Security Weakness ### Affected Products **n/a - typeorm** Affected versions: - Fixed Version: 0.2.25 (Status: affected) ### References 1. [](https://hackerone.com/reports/869574)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13505 - **State**: PUBLISHED - **Published Date**: January 26, 2025 at 11:23 UTC - **Last Updated**: January 27, 2025 at 14:52 UTC - **Reserved Date**: January 17, 2025 at 12:47 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Survey Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ays_sections[5][questions][8][title]’ parameter in all versions up to, and including, 5.1.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ays-pro - Survey Maker** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/fc3c22a2-b766-419c-a481-48e6a73b084c?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/survey-maker/tags/5.1.3.2/admin/partials/surveys/actions/partials/survey-maker-surveys-actions-tab1.php#L1160) ### Credits - Joel Indra
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5290, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5290 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5290 - **State**: PUBLISHED - **Published Date**: April 01, 2020 at 19:25 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the challenge are unknowingly (and against their will) signed into the attacker team&#39;s account. Then, the attacker can gain points / value off the backs of the victims. This is patched in version 2.3. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-384: Security Weakness ### Affected Products **redpwn - rctf** Affected versions: - < 2.3 (Status: affected) ### References 1. [](https://github.com/redpwn/rctf/security/advisories/GHSA-p5fh-2vhw-fvpq) 2. [](https://github.com/redpwn/rctf/issues/147)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16705, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16705 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16705 - **State**: PUBLISHED - **Published Date**: September 10, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 10:32 UTC - **Reserved Date**: September 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FURUNO FELCOM 250 and 500 devices allow unauthenticated access to the xml/permission.xml file containing all of the system's usernames and passwords. This includes the Admin and Service user accounts and their unsalted MD5 hashes, as well as the SMS server password in cleartext. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cyberskr.com/blog/furuno-felcom.html) 2. [](https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33229, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33229 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33229 - **State**: PUBLISHED - **Published Date**: July 26, 2023 at 14:22 UTC - **Last Updated**: October 15, 2024 at 15:56 UTC - **Reserved Date**: May 18, 2023 at 17:07 UTC - **Assigned By**: SolarWinds ### Vulnerability Description The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject passive HTML. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **SolarWinds - SolarWinds Platform** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.solarwinds.com/trust-center/security-advisories/cve-2023-33229) 2. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm) ### Credits - SolarWinds would like to thank Juampa Rodriguez (@UnD3sc0n0c1d0) for reporting on the issue in a responsible manner.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52859, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52859 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52859 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 22:04 UTC - **Last Updated**: December 11, 2024 at 16:58 UTC - **Reserved Date**: November 15, 2024 at 18:03 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3879 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 19:00 UTC - **Last Updated**: August 19, 2024 at 18:45 UTC - **Reserved Date**: April 16, 2024 at 10:49 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in Tenda W30E 1.0.1.25(633). This affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260913 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - W30E** Affected versions: - 1.0.1.25(633) (Status: affected) ### References 1. [VDB-260913 | Tenda W30E setcfm formSetCfm stack-based overflow](https://vuldb.com/?id.260913) 2. [VDB-260913 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.260913) 3. [Submit #312822 | Tenda W30Ev1.0 V1.0.1.25(633) buffer overflow](https://vuldb.com/?submit.312822) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md) ### Credits - wxhwxhwxh_mie (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15881, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15881 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15881 - **State**: REJECTED - **Published Date**: July 14, 2020 at 17:02 UTC - **Last Updated**: July 14, 2020 at 17:02 UTC - **Reserved Date**: September 03, 2019 at 00:00 UTC - **Assigned By**: freebsd ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30265, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30265 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30265 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 22:55 UTC - **Last Updated**: August 02, 2024 at 01:32 UTC - **Reserved Date**: March 26, 2024 at 12:52 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Collabora Online is a collaborative online office suite based on LibreOffice technology. Any deployment of voilà dashboard allow local file inclusion. Any file on a filesystem that is readable by the user that runs the voilà dashboard server can be downloaded by someone with network access to the server. Whether this still requires authentication depends on how voilà is deployed. This issue has been patched in 0.2.17, 0.3.8, 0.4.4 and 0.5.6. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **voila-dashboards - voila** Affected versions: - >= 0.0.2, < 0.2.17 (Status: affected) - >= 0.3.0a0, < 0.3.8 (Status: affected) - >= 0.4.0a0, < 0.4.4 (Status: affected) - >= 0.5.0a0, < 0.5.6 (Status: affected) ### References 1. [https://github.com/voila-dashboards/voila/security/advisories/GHSA-2q59-h24c-w6fg](https://github.com/voila-dashboards/voila/security/advisories/GHSA-2q59-h24c-w6fg) 2. [https://github.com/voila-dashboards/voila/commit/00d6362c237b6b4d466873535554d6076ead0c52](https://github.com/voila-dashboards/voila/commit/00d6362c237b6b4d466873535554d6076ead0c52) 3. [https://github.com/voila-dashboards/voila/commit/28faacc9b03b160fd8fa920ad045f4ec0667ab67](https://github.com/voila-dashboards/voila/commit/28faacc9b03b160fd8fa920ad045f4ec0667ab67) 4. [https://github.com/voila-dashboards/voila/commit/5542e4ae36bb5d184deaa48f95e76be477756af2](https://github.com/voila-dashboards/voila/commit/5542e4ae36bb5d184deaa48f95e76be477756af2) 5. [https://github.com/voila-dashboards/voila/commit/98b6a40fec27723572314fdbba99bdc147d904c8](https://github.com/voila-dashboards/voila/commit/98b6a40fec27723572314fdbba99bdc147d904c8) 6. [https://github.com/voila-dashboards/voila/commit/c045be6988539d07cceeb9f82fc660a49485d504](https://github.com/voila-dashboards/voila/commit/c045be6988539d07cceeb9f82fc660a49485d504)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1127, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1127 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1127 - **State**: PUBLISHED - **Published Date**: March 12, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:19 UTC - **Reserved Date**: March 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Whale Communications e-Gap 2.5 on Windows 2000 allows remote attackers to obtain the source code for the login page via the HTTP TRACE method, which bypasses the preprocessor. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#371470](http://www.kb.cert.org/vuls/id/371470) 2. [](http://www.procheckup.com/security_info/vuln_pr0307.html) 3. [egap-url-information-disclosure(14869)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14869) 4. [9431](http://www.securityfocus.com/bid/9431)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0414 - **State**: PUBLISHED - **Published Date**: February 03, 2009 at 23:00 UTC - **Last Updated**: August 07, 2024 at 04:31 UTC - **Reserved Date**: February 03, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2009-0210](http://www.vupen.com/english/advisories/2009/0210) 2. [34583](http://secunia.com/advisories/34583) 3. [[or-announce] 20090122 Tor 0.2.0.33 is released](http://archives.seul.org/or/announce/Jan-2009/msg00000.html) 4. [33677](http://secunia.com/advisories/33677) 5. [FEDORA-2009-0897](https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html) 6. [33399](http://www.securityfocus.com/bid/33399) 7. [33635](http://secunia.com/advisories/33635) 8. [GLSA-200904-11](http://security.gentoo.org/glsa/glsa-200904-11.xml) 9. [](http://blog.torproject.org/blog/tor-0.2.0.33-stable-released) 10. [1021633](http://www.securitytracker.com/id?1021633)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0568, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0568 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0568 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 16:58 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 28, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Race condition in the Intel(R) Driver and Support Assistant before version 20.1.5 may allow an authenticated user to potentially enable denial of service via local access. ### Affected Products **n/a - Intel(R) Driver and Support Assistant** Affected versions: - Before version 20.1.5 (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00344.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15912, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15912 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15912 - **State**: PUBLISHED - **Published Date**: July 23, 2020 at 14:40 UTC - **Last Updated**: August 04, 2024 at 13:30 UTC - **Reserved Date**: July 23, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cansecwest.com/post/2020-03-09-22:00:00_2020_Speakers) 2. [](https://www.youtube.com/watch?v=kQWg-Ywv3S4) 3. [](https://www.youtube.com/watch?v=VYKsfgox-bs) 4. [](https://twitter.com/Kevin2600/status/1218892338182836224) 5. [](https://www.youtube.com/watch?v=nn-_3AbtEkI) 6. [](https://www.carhackingvillage.com/speaker-bios#htm3nrr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5574 - **State**: PUBLISHED - **Published Date**: December 15, 2008 at 17:45 UTC - **Last Updated**: August 07, 2024 at 10:56 UTC - **Reserved Date**: December 15, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in member.php in Webmaster Marketplace allows remote attackers to execute arbitrary SQL commands via the u parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [33096](http://secunia.com/advisories/33096) 2. [4747](http://securityreason.com/securityalert/4747) 3. [unwebmastermarketplace-member-sql-injection(47210)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47210) 4. [7407](https://www.exploit-db.com/exploits/7407) 5. [50655](http://osvdb.org/50655) 6. [32756](http://www.securityfocus.com/bid/32756)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5966, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5966 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5966 - **State**: PUBLISHED - **Published Date**: November 19, 2013 at 15:00 UTC - **Last Updated**: September 17, 2024 at 02:37 UTC - **Reserved Date**: September 30, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in ZK Framework before 5.0.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131115 CVE-2013-5966 - XSS in ZK Framework](http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0101.html) 2. [](https://github.com/zkoss/zk/blob/v5.0.13/zkdoc/release-note) 3. [55690](http://secunia.com/advisories/55690)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1844 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 06:48 UTC - **Last Updated**: August 01, 2024 at 19:08 UTC - **Reserved Date**: February 23, 2024 at 15:45 UTC - **Assigned By**: Wordfence ### Vulnerability Description The RevivePress – Keep your Old Content Evergreen plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the import_data and copy_data functions in all versions up to, and including, 1.5.6. This makes it possible for authenticated attackers, with subscriber-level access or higher, to overwrite plugin settings and view them. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **infosatech - RevivePress – Keep your Old Content Evergreen** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/63ecb518-50d6-49ad-92e4-c5a7494ced82?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wp-auto-republish/trunk/includes/Tools/Database.php#L161) 3. [](https://plugins.trac.wordpress.org/browser/wp-auto-republish/trunk/includes/Tools/Database.php#L148) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0806, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0806 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0806 - **State**: PUBLISHED - **Published Date**: January 27, 2012 at 00:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 19, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in Bip 0.8.8 and earlier might allow remote authenticated users to execute arbitrary code via vectors involving a series of TCP connections that triggers use of many open file descriptors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20120124 Re: CVE request: bip buffer overflow](http://openwall.com/lists/oss-security/2012/01/24/10) 2. [MDVSA-2013:063](http://www.mandriva.com/security/advisories?name=MDVSA-2013:063) 3. [47679](http://secunia.com/advisories/47679) 4. [](https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c) 5. [FEDORA-2012-0941](http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072752.html) 6. [FEDORA-2012-0916](http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072767.html) 7. [](https://projects.duckcorp.org/issues/269) 8. [[oss-security] 20120124 CVE request: bip buffer overflow](http://openwall.com/lists/oss-security/2012/01/24/4) 9. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657217)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4924, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4924 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4924 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 08:31 UTC - **Last Updated**: May 19, 2025 at 14:41 UTC - **Reserved Date**: May 18, 2025 at 06:29 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /user_void_transaction.php. The manipulation of the argument order_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection - CWE-74: Security Weakness ### Affected Products **SourceCodester - Client Database Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-309486 | SourceCodester Client Database Management System user_void_transaction.php sql injection](https://vuldb.com/?id.309486) 2. [VDB-309486 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.309486) 3. [Submit #579111 | SourceCodester Client Database Management System v1.0 SQL injection](https://vuldb.com/?submit.579111) 4. [](https://github.com/akihi0342/cve/issues/2) 5. [](https://www.sourcecodester.com/) ### Credits - Akihi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32258, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32258 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32258 - **State**: PUBLISHED - **Published Date**: April 23, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:06 UTC - **Reserved Date**: April 12, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The network server of fceux 2.7.0 has a path traversal vulnerability, allowing attackers to overwrite any files on the server without authentication by fake ROM. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TASEmulators/fceux/issues/727) 2. [](https://github.com/liyansong2018/CVE-2024-32258)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2429 - **State**: PUBLISHED - **Published Date**: July 10, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 10, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SmartFilter Web Gateway Security 4.2.1.00 stores user credentials in cleartext in admin_backup.xml files and uses insecure permissions for these files, which allows local users to gain privileges. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [smartfilter-configtxt-info-disclosure(49338)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49338) 2. [20090319 Secure Computing (McAfee) Smart Filter possible issue](http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0314.html) 3. [34390](http://secunia.com/advisories/34390)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3517, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3517 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3517 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:50 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect integrity via vectors related to PC / Get Shortcut. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 2. [92011](http://www.securityfocus.com/bid/92011) 3. [1036402](http://www.securitytracker.com/id/1036402) 4. [91787](http://www.securityfocus.com/bid/91787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2555, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2555 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2555 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 17:02 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). ### Affected Products **Oracle Corporation - WebCenter Portal** Affected versions: - 12.2.1.3.0 (Status: affected) - 12.2.1.4.0 (Status: affected) **Oracle Corporation - Utilities Framework** Affected versions: - 4.2.0.2.0 (Status: affected) - 4.2.0.3.0 (Status: affected) - 4.3.0.1.0-4.3.0.6.0 (Status: affected) - 4.4.0.0.0 (Status: affected) - 4.4.0.2.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2020.html) 2. [](https://www.oracle.com/security-alerts/cpujan2020.html) 3. [](http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html) 4. [](http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html) 5. [](http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html) 6. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 7. [](https://www.oracle.com/security-alerts/cpujan2021.html) 8. [](https://www.oracle.com/security-alerts/cpujul2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14738, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14738 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14738 - **State**: PUBLISHED - **Published Date**: July 29, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in libpbc.a in cloudwu PBC through 2017-03-02. A SEGV can occur in pbc_rmessage_message in rmessage.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/cloudwu/pbc/issues/122#issuecomment-407309546)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31214 - **State**: PUBLISHED - **Published Date**: December 09, 2024 at 11:30 UTC - **Last Updated**: December 09, 2024 at 13:49 UTC - **Reserved Date**: April 25, 2023 at 12:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Arul Prasad J WP Quick Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Quick Post Duplicator: from n/a through 2.0. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Arul Prasad J - WP Quick Post Duplicator** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wp-quick-post-duplicator/vulnerability/wordpress-wp-quick-post-duplicator-plugin-1-0-broken-access-control-vulnerability?_s_id=cve) ### Credits - TaeEun Lee (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33282 - **State**: PUBLISHED - **Published Date**: April 04, 2023 at 04:46 UTC - **Last Updated**: February 11, 2025 at 14:22 UTC - **Reserved Date**: June 14, 2022 at 10:44 UTC - **Assigned By**: qualcomm ### Vulnerability Description Memory corruption in Automotive Multimedia due to integer overflow to buffer overflow during IOCTL calls in video playback. ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-680: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - MSM8996AU (Status: affected) - QAM8295P (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595 (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - SA6145P (Status: affected) - SA6150P (Status: affected) - SA6155 (Status: affected) - SA6155P (Status: affected) - SA8145P (Status: affected) - SA8150P (Status: affected) - SA8155 (Status: affected) - SA8155P (Status: affected) - SA8195P (Status: affected) - SA8295P (Status: affected) - SA8540P (Status: affected) - SA9000P (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1319, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1319 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1319 - **State**: PUBLISHED - **Published Date**: March 19, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 06, 2007 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description Unspecified vulnerability in the IOPCServer::RemoveGroup function in the OPCDA interface in Takebishi Electric DeviceXPlorer OLE for Process Control (OPC) Server before 3.12 Build3 allows remote attackers to execute arbitrary code via unspecified vectors involving access to arbitrary memory. NOTE: this issue affects the (1) HIDIC, (2) MELSEC, (3) FA-M3, (4) MODBUS, and (5) SYSMAC OPC Servers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070322 [NB07-10] Multiple vulnerabilities in Takebishi Electric DeviceXplorer MODBUS OPC server](http://www.securityfocus.com/archive/1/463559/100/0/threaded) 2. [](http://www.neutralbit.com/advisories/NB07-07.txt) 3. [20070322 [NB07-08] Multiple vulnerabilities in Takebishi Electric DeviceXplorer MELSEC OPC server](http://www.securityfocus.com/archive/1/463550/100/0/threaded) 4. [VU#926551](http://www.kb.cert.org/vuls/id/926551) 5. [](http://www.neutralbit.com/advisories/NB07-17.txt) 6. [](http://www.faweb.net/us/opc/1231207.html) 7. [](http://www.neutralbit.com/advisories/NB07-08.txt) 8. [](http://www.neutralbit.com/advisories/NB07-09.txt) 9. [ADV-2007-1029](http://www.vupen.com/english/advisories/2007/1029) 10. [20070322 [NB07-09] Multiple vulnerabilities in Takebishi Electric DeviceXplorer FA-M3 OPC server](http://www.securityfocus.com/archive/1/463556/100/0/threaded) 11. [](http://www.neutralbit.com/advisories/NB07-10.txt) 12. [23037](http://www.securityfocus.com/bid/23037) 13. [24570](http://secunia.com/advisories/24570) 14. [20070322 [NB07-17] Multiple vulnerabilities in Takebishi Electric DeviceXplorer SYSMAC OPC server](http://www.securityfocus.com/archive/1/463537/100/0/threaded) 15. [20070322 [NB07-07] Multiple vulnerabilities in Takebishi Electric DeviceXplorer HIDIC OPC server](http://www.securityfocus.com/archive/1/463546/100/0/threaded) 16. [1017793](http://www.securitytracker.com/id?1017793)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5636, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5636 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5636 - **State**: PUBLISHED - **Published Date**: June 05, 2025 at 04:31 UTC - **Last Updated**: June 05, 2025 at 14:08 UTC - **Reserved Date**: June 04, 2025 at 11:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component SET Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-119: Security Weakness ### Affected Products **PCMan - FTP Server** Affected versions: - 2.0.7 (Status: affected) ### References 1. [VDB-311123 | PCMan FTP Server SET Command buffer overflow](https://vuldb.com/?id.311123) 2. [VDB-311123 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311123) 3. [Submit #587059 | PCMan FTP Server 2.0.7 Buffer Overflow](https://vuldb.com/?submit.587059) 4. [](https://fitoxs.com/exploit/exploit-76d51400a1f23f1d67c2eb8f6793d6b8109cf44230294b16380f676b7bcad8c695.txt) ### Credits - Fernando Mengali (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1714 - **State**: PUBLISHED - **Published Date**: December 21, 2012 at 02:00 UTC - **Last Updated**: September 17, 2024 at 03:13 UTC - **Reserved Date**: March 16, 2012 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in a TList 6 ActiveX control in Oracle Hyperion Financial Management 11.1.1.4 and 11.1.2.1.104 allows remote attackers to execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blogs.oracle.com/sunsecurity/entry/cve_2012_1714_tlist_6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0227 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 20:00 UTC - **Last Updated**: November 29, 2024 at 15:19 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Secure Sockets Layer (SSL) Virtual Private Network (VPN) Client Certificate Authentication feature for Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to establish an SSL VPN connection and bypass certain SSL certificate verification steps. The vulnerability is due to incorrect verification of the SSL Client Certificate. An attacker could exploit this vulnerability by connecting to the ASA VPN without a proper private key and certificate pair. A successful exploit could allow the attacker to establish an SSL VPN connection to the ASA when the connection should have been rejected. This vulnerability affects Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliances (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliances (ASAv), Firepower 4110 Security Appliances, Firepower 9300 ASA Security Modules. Cisco Bug IDs: CSCvg40155. ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **n/a - Cisco Adaptive Security Appliance** Affected versions: - Cisco Adaptive Security Appliance (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa1) 2. [1040723](http://www.securitytracker.com/id/1040723) 3. [104018](http://www.securityfocus.com/bid/104018) 4. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4279, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4279 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4279 - **State**: PUBLISHED - **Published Date**: August 21, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in topic_post.php in XennoBB 2.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the icon_topic parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.surfionline.com/security_advisories/20060819_xennobb_icon_topic_sql.txt) 2. [ADV-2006-3343](http://www.vupen.com/english/advisories/2006/3343) 3. [20060819 XennoBB <= 2.2.1 "icon_topic" SQL Injection](http://www.securityfocus.com/archive/1/443765/100/0/threaded) 4. [28090](http://www.osvdb.org/28090) 5. [21575](http://secunia.com/advisories/21575) 6. [1434](http://securityreason.com/securityalert/1434) 7. [19606](http://www.securityfocus.com/bid/19606) 8. [xennobb-topicpost-sql-injection(28456)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28456)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0756, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0756 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0756 - **State**: PUBLISHED - **Published Date**: June 04, 2024 at 14:28 UTC - **Last Updated**: March 13, 2025 at 18:10 UTC - **Reserved Date**: January 19, 2024 at 17:21 UTC - **Assigned By**: WPScan ### Vulnerability Description The Insert or Embed Articulate Content into WordPress plugin through 4.3000000023 lacks validation of URLs when adding iframes, allowing attackers to inject an iFrame in the page and thus load arbitrary content from any page. ### Weakness Classification (CWE) - CWE-345 Insufficient Verification of Data Authenticity: Security Weakness ### Affected Products **Unknown - Insert or Embed Articulate Content into WordPress** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/9130a42d-fca3-4f9c-ab97-d5e0a7a5cef2/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4674, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4674 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4674 - **State**: PUBLISHED - **Published Date**: July 31, 2013 at 10:00 UTC - **Last Updated**: August 06, 2024 at 16:52 UTC - **Reserved Date**: June 24, 2013 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Web Email Protection component in Symantec Encryption Management Server (formerly Symantec PGP Universal Server) before 3.3.0 MP2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted encrypted e-mail attachment. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [61290](http://www.securityfocus.com/bid/61290) 2. [symantec-encryption-cve20134674-xss(85902)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85902) 3. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00) 4. [54214](http://secunia.com/advisories/54214) 5. [95581](http://osvdb.org/95581) 6. [1028820](http://www.securitytracker.com/id/1028820)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5347, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5347 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5347 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:16 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote authentication bypass vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1581, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1581 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1581 - **State**: PUBLISHED - **Published Date**: April 02, 2006 at 21:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in index.php in Blank'N'Berg 0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the _path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [blanknberg-index-directory-traversal(25617)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25617) 2. [](http://www.silitix.com/bnb.php) 3. [1015854](http://securitytracker.com/id?1015854) 4. [17345](http://www.securityfocus.com/bid/17345) 5. [19520](http://secunia.com/advisories/19520) 6. [24373](http://www.osvdb.org/24373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51776, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51776 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51776 - **State**: PUBLISHED - **Published Date**: November 09, 2024 at 09:25 UTC - **Last Updated**: November 09, 2024 at 15:19 UTC - **Reserved Date**: November 04, 2024 at 09:57 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in samhotchkiss Daily Image allows Reflected XSS.This issue affects Daily Image: from n/a through 1.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **samhotchkiss - Daily Image** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/daily-image/wordpress-daily-image-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13056, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13056 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13056 - **State**: PUBLISHED - **Published Date**: July 02, 2019 at 15:18 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: June 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in CyberPanel through 1.8.4. On the user edit page, an attacker can edit the administrator's e-mail and password because of the lack of CSRF protection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cyberpanel.net/category/news/) 2. [](http://packetstormsecurity.com/files/153492/CyberPanel-1.8.4-Cross-Site-Request-Forgery.html)