System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46850
- **State**: PUBLISHED
- **Published Date**: November 11, 2023 at 00:15 UTC
- **Last Updated**: February 13, 2025 at 17:14 UTC
- **Reserved Date**: October 27, 2023 at 13:38 UTC
- **Assigned By**: OpenVPN
### Vulnerability Description
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**OpenVPN - OpenVPN 2 (Community)**
Affected versions:
- 2.6.0 (Status: affected)
**OpenVPN - Access Server**
Affected versions:
- 2.11.0 (Status: affected)
- 2.12.0 (Status: affected)
### References
1. [](https://community.openvpn.net/openvpn/wiki/CVE-2023-46850)
2. [](https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/)
3. [](https://www.debian.org/security/2023/dsa-5555)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2182
- **State**: PUBLISHED
- **Published Date**: July 10, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: July 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grandstream BudgeTone (BT) 100 Voice over IP (VoIP) phones do not properly check the Call-ID, branch, and tag values in a NOTIFY message to verify a subscription, which allows remote attackers to spoof messages such as the "Messages waiting" message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050706 VoIP-Phones: Weakness in proccessing SIP-Notify-Messages](http://marc.info/?l=bugtraq&m=112067698624686&w=2)
2. [1014407](http://www.securitytracker.com/alerts/2005/Jul/1014407.html)
3. [](http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt)
4. [sip-notify-message-spoof(21260)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21260) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47821
- **State**: PUBLISHED
- **Published Date**: October 25, 2024 at 22:48 UTC
- **Last Updated**: October 28, 2024 at 19:41 UTC
- **Reserved Date**: October 03, 2024 at 14:06 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote code execution can be achieved in versions prior to 0.5.0b3.dev87. A file can be downloaded to such a folder by changing the download folder to a folder in `/scripts` path and using the `/flashgot` API to download the file. This vulnerability allows an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. Version 0.5.0b3.dev87 fixes this issue.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**pyload - pyload**
Affected versions:
- < 0.5.0b3.dev87 (Status: affected)
### References
1. [https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g](https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42011
- **State**: PUBLISHED
- **Published Date**: October 09, 2022 at 00:00 UTC
- **Last Updated**: June 09, 2025 at 15:05 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.freedesktop.org/dbus/dbus/-/issues/413)
2. [](https://www.openwall.com/lists/oss-security/2022/10/06/1)
3. [FEDORA-2022-076544c8aa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/)
4. [FEDORA-2022-7a963a79d1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/)
5. [FEDORA-2022-b0c2f2ab74](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/)
6. [GLSA-202305-08](https://security.gentoo.org/glsa/202305-08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2317
- **State**: PUBLISHED
- **Published Date**: January 18, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the EnterpriseOne Tools component in Oracle JD Edwards 8.98 SP 24 allows remote authenticated users to affect integrity, related to Enterprise Infrastucture SEC (JDNET).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5612
- **State**: PUBLISHED
- **Published Date**: October 31, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: October 30, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in aide.php3 (aka aide.php) in GestArt beta 1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the aide parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1795](http://securityreason.com/securityalert/1795)
2. [20061026 GestArt <= vbeta 1 Remote File Include Vulnerabilities](http://www.securityfocus.com/archive/1/449887/100/0/threaded)
3. [gestart-aide-file-include(29853)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29853)
4. [ADV-2007-0943](http://www.vupen.com/english/advisories/2007/0943)
5. [3467](https://www.exploit-db.com/exploits/3467)
6. [20750](http://www.securityfocus.com/bid/20750) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0772
- **State**: PUBLISHED
- **Published Date**: February 20, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 12:34 UTC
- **Reserved Date**: February 06, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Linux kernel 2.6.13 and other versions before 2.6.20.1 allows remote attackers to cause a denial of service (oops) via a crafted NFSACL 2 ACCESS request that triggers a free of an incorrect pointer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24201](http://secunia.com/advisories/24201)
2. [24400](http://secunia.com/advisories/24400)
3. [kernel-nfsaclsvc-dos(32578)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32578)
4. [MDKSA-2007:078](http://www.mandriva.com/security/advisories?name=MDKSA-2007:078)
5. [ADV-2007-0660](http://www.vupen.com/english/advisories/2007/0660)
6. [USN-451-1](http://www.ubuntu.com/usn/usn-451-1)
7. [](https://issues.rpath.com/browse/RPL-1063)
8. [24777](http://secunia.com/advisories/24777)
9. [SUSE-SA:2007:021](http://www.novell.com/linux/security/advisories/2007_21_kernel.html)
10. [FEDORA-2007-277](http://fedoranews.org/cms/node/2739)
11. [33022](http://osvdb.org/33022)
12. [FEDORA-2007-291](http://fedoranews.org/cms/node/2740)
13. [20070615 rPSA-2007-0124-1 kernel xen](http://www.securityfocus.com/archive/1/471457)
14. [24482](http://secunia.com/advisories/24482)
15. [SUSE-SA:2007:018](http://www.novell.com/linux/security/advisories/2007_18_kernel.html)
16. [22625](http://www.securityfocus.com/bid/22625)
17. [24752](http://secunia.com/advisories/24752)
18. [24547](http://secunia.com/advisories/24547)
19. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.1)
20. [24215](http://secunia.com/advisories/24215)
21. [25691](http://secunia.com/advisories/25691)
22. [MDKSA-2007:060](http://www.mandriva.com/security/advisories?name=MDKSA-2007:060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32921
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 21:02 UTC
- **Last Updated**: August 20, 2024 at 17:06 UTC
- **Reserved Date**: April 19, 2024 at 15:12 UTC
- **Assigned By**: Google_Devices
### Vulnerability Description
In lwis_initialize_transaction_fences of lwis_fence.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2024-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5487, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5487 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5487
- **State**: PUBLISHED
- **Published Date**: September 30, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt)
2. [[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix](http://www.openwall.com/lists/oss-security/2012/11/10/1)
3. [](https://plone.org/products/plone/security/advisories/20121106/03)
4. [](https://plone.org/products/plone-hotfix/releases/20121106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25676, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25676 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25676
- **State**: PUBLISHED
- **Published Date**: March 15, 2021 at 17:03 UTC
- **Last Updated**: August 03, 2024 at 20:11 UTC
- **Reserved Date**: January 21, 2021 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically.
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**Siemens - RUGGEDCOM RM1224**
Affected versions:
- V6.3 (Status: affected)
**Siemens - SCALANCE M-800**
Affected versions:
- V6.3 (Status: affected)
**Siemens - SCALANCE S615**
Affected versions:
- V6.3 (Status: affected)
**Siemens - SCALANCE SC-600**
Affected versions:
- All Versions >= V2.1 and < V2.1.3 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-068-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37111
- **State**: PUBLISHED
- **Published Date**: August 23, 2022 at 15:20 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BlueCMS 1.6 has SQL injection in line 132 of admin/article.php
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/seizer-zyx/Vulnerability/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6996
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:50 UTC
- **Reserved Date**: August 23, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html)
3. [93496](http://www.securityfocus.com/bid/93496) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10400
- **State**: PUBLISHED
- **Published Date**: September 12, 2019 at 13:55 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts.
### Affected Products
**Jenkins project - Jenkins Script Security Plugin**
Affected versions:
- 1.62 and earlier (Status: affected)
### References
1. [[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/09/12/2)
2. [](https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6189
- **State**: PUBLISHED
- **Published Date**: February 16, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
F-Secure Radar (on-premises) before 2018-02-15 has XSS via vectors involving the Tags parameter in the JSON request body in an outbound request for the /api/latest/vulnerabilityscans/tags/batch resource, aka a "suggested metadata tags for assets" issue.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [103100](http://www.securityfocus.com/bid/103100)
2. [](http://oscarhjelm.com/blag/2018/02/f-secure-radar-persistent-cross-site-scripting-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3598
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 05:22 UTC
- **Last Updated**: April 18, 2025 at 12:00 UTC
- **Reserved Date**: April 14, 2025 at 15:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Coupon Affiliates – Affiliate Plugin for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the commission_summary parameter in all versions up to, and including, .6.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**elliotvs - Coupon Affiliates – Affiliate Plugin for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2d6cf33c-ac40-4892-9345-64ebe61e6be6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/woo-coupon-usage/tags/6.2.2/inc/functions/functions-all-time.php#L245)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33950
- **State**: PUBLISHED
- **Published Date**: May 24, 2023 at 16:10 UTC
- **Last Updated**: October 22, 2024 at 15:51 UTC
- **Reserved Date**: May 24, 2023 at 02:36 UTC
- **Assigned By**: Liferay
### Vulnerability Description
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**Liferay - Portal**
Affected versions:
- 7.4.3.48 (Status: affected)
**Liferay - DXP**
Affected versions:
- 7.4.13.u48 (Status: affected)
### References
1. [](https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52320
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 17:21 UTC
- **Last Updated**: December 06, 2024 at 20:44 UTC
- **Reserved Date**: December 02, 2024 at 15:48 UTC
- **Assigned By**: icscert
### Vulnerability Description
The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Planet Technology - Planet WGS-804HPT**
Affected versions:
- v1.305b210531 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-340-02)
2. [](https://www.planet.com.tw/en/support/downloads?method=keyword&keyword=v1.305b241111)
### Credits
- Tomer Goldschmidt of Claroty Research - Team82 reported this vulnerability to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10593
- **State**: PUBLISHED
- **Published Date**: March 23, 2020 at 12:22 UTC
- **Last Updated**: August 04, 2024 at 11:06 UTC
- **Reserved Date**: March 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://trac.torproject.org/projects/tor/ticket/33619)
2. [GLSA-202003-50](https://security.gentoo.org/glsa/202003-50)
3. [openSUSE-SU-2020:0406](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html)
4. [openSUSE-SU-2020:0428](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0889
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:05 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Android TV , there is a possible silent pairing due to lack of rate limiting in the pairing flow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-8.1 Android-9Android ID: A-180745296
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38947
- **State**: PUBLISHED
- **Published Date**: December 13, 2021 at 17:55 UTC
- **Last Updated**: September 16, 2024 at 18:35 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Copy Data Management 2.2.13 and earlier uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 211242.
### Affected Products
**IBM - Spectrum Copy Data Management**
Affected versions:
- 2.2.13 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6525554)
2. [ibm-spectrum-cve202138947-info-disc (211242)](https://exchange.xforce.ibmcloud.com/vulnerabilities/211242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7222
- **State**: PUBLISHED
- **Published Date**: January 02, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: December 28, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
config/initializers/secret_token.rb in Fat Free CRM before 0.12.1 has a fixed FatFreeCRM::Application.config.secret_token value, which makes it easier for remote attackers to spoof signed cookies by referring to the key in the source code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fatfreecrm/fat_free_crm/commit/93c182dd4c6f3620b721d2a15ba6a6ecab5669df)
2. [20131224 Happy Holidays / Xmas Advisory](http://seclists.org/fulldisclosure/2013/Dec/199)
3. [[oss-security] 20131228 Re: CVE request: Fat Free CRM multiple vulnerabilities](http://openwall.com/lists/oss-security/2013/12/28/2)
4. [](http://www.phenoelit.org/stuff/ffcrm.txt)
5. [](https://github.com/fatfreecrm/fat_free_crm/issues/300)
6. [](https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3300
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 15:19 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 04, 2024 at 09:52 UTC
- **Assigned By**: 3DS
### Vulnerability Description
An unsafe .NET object deserialization vulnerability in DELMIA Apriso Release 2019 through Release 2024 could lead to pre-authentication remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Dassault Systèmes - DELMIA Apriso**
Affected versions:
- Release 2019 Golden (Status: affected)
- Release 2020 Golden (Status: affected)
- Release 2021 Golden (Status: affected)
- Release 2022 Golden (Status: affected)
- Release 2023 Golden (Status: affected)
- Release 2024 Golden (Status: affected)
### References
1. [](https://www.3ds.com/vulnerability/advisories)
### Credits
- Mehdi Elyassa of Synacktiv |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2342
- **State**: REJECTED
- **Published Date**: May 21, 2012 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:39 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3671
- **State**: PUBLISHED
- **Published Date**: August 01, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 03:49 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Escalation of privilege in Intel Saffron admin application before 11.4 allows an authenticated user to access unauthorized information.
### Affected Products
**Intel Corporation - Saffron MemoryBase**
Affected versions:
- before version 11.4 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4787
- **State**: PUBLISHED
- **Published Date**: April 21, 2010 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: April 21, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Pligg before 1.0.3 allow remote attackers to hijack the authentication of administrators for requests that create user accounts or have unspecified other impact.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://holisticinfosec.org/content/view/130/45/)
2. [](http://www.pligg.com/blog/775/pligg-cms-1-0-3-release/)
3. [37349](http://secunia.com/advisories/37349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20125, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20125 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20125
- **State**: PUBLISHED
- **Published Date**: September 28, 2021 at 22:05 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cnblogs.com/feizianquan/p/11910530.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26959
- **State**: REJECTED
- **Published Date**: February 09, 2021 at 22:06 UTC
- **Last Updated**: February 12, 2021 at 15:25 UTC
- **Reserved Date**: February 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32642
- **State**: PUBLISHED
- **Published Date**: February 14, 2024 at 13:37 UTC
- **Last Updated**: August 16, 2024 at 19:46 UTC
- **Reserved Date**: June 17, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-1076: Security Weakness
### Affected Products
**n/a - Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software**
Affected versions:
- before version 22.240 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44365
- **State**: PUBLISHED
- **Published Date**: January 28, 2022 at 21:42 UTC
- **Last Updated**: April 15, 2025 at 19:19 UTC
- **Reserved Date**: November 29, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetDevName param is not object. An attacker can send an HTTP request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2963
- **State**: PUBLISHED
- **Published Date**: July 18, 2018 at 13:00 UTC
- **Last Updated**: October 02, 2024 at 20:13 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 8.4, 15.x and 16.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Primavera P6 Enterprise Project Portfolio Management**
Affected versions:
- 8.4 (Status: affected)
- 15.x (Status: affected)
- 16.x (Status: affected)
### References
1. [104826](http://www.securityfocus.com/bid/104826)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7803
- **State**: PUBLISHED
- **Published Date**: May 22, 2019 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html)
2. [108326](http://www.securityfocus.com/bid/108326)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-19-493/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5021
- **State**: PUBLISHED
- **Published Date**: February 17, 2017 at 07:45 UTC
- **Last Updated**: August 05, 2024 at 14:47 UTC
- **Reserved Date**: January 02, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
### Affected Products
**n/a - Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android**
Affected versions:
- Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android (Status: affected)
### References
1. [](https://crbug.com/663726)
2. [95792](http://www.securityfocus.com/bid/95792)
3. [](https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html)
4. [GLSA-201701-66](https://security.gentoo.org/glsa/201701-66)
5. [RHSA-2017:0206](http://rhn.redhat.com/errata/RHSA-2017-0206.html)
6. [1037718](http://www.securitytracker.com/id/1037718)
7. [DSA-3776](http://www.debian.org/security/2017/dsa-3776) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39655
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:06 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
Product: AndroidVersions: Android kernelAndroid ID: A-192641593References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1103
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 22:53 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).When users are simultaneously logged in to Microsoft SharePoint Server and visit a malicious web page, the attacker can, through standard browser functionality, induce the browser to invoke search queries as the logged in user, aka 'Microsoft SharePoint Information Disclosure Vulnerability'.
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server**
Affected versions:
- 2016 (Status: affected)
**Microsoft - Microsoft SharePoint Server**
Affected versions:
- 2019 (Status: affected)
**Microsoft - Microsoft SharePoint Foundation**
Affected versions:
- 2013 Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0141
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Visual Basic macros in Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 export a certificate-store private key during a document-save operation, which allows attackers to obtain sensitive information via unspecified vectors, aka "Microsoft Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92903](http://www.securityfocus.com/bid/92903)
2. [1036785](http://www.securitytracker.com/id/1036785)
3. [MS16-107](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-107) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4063
- **State**: PUBLISHED
- **Published Date**: December 23, 2021 at 00:45 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 03, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1273176)
3. [FEDORA-2021-6a292e2cf4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/)
4. [DSA-5046](https://www.debian.org/security/2022/dsa-5046)
5. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33633
- **State**: PUBLISHED
- **Published Date**: April 29, 2024 at 05:06 UTC
- **Last Updated**: August 02, 2024 at 02:36 UTC
- **Reserved Date**: April 25, 2024 at 08:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Reflected XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Piotnet - Piotnet Addons For Elementor Pro**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1860, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1860 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1860
- **State**: PUBLISHED
- **Published Date**: May 25, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 04, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1312](http://www.debian.org/security/2007/dsa-1312)
2. [ADV-2007-2732](http://www.vupen.com/english/advisories/2007/2732)
3. [oval:org.mitre.oval:def:6002](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6002)
4. [25701](http://secunia.com/advisories/25701)
5. [29242](http://secunia.com/advisories/29242)
6. [24147](http://www.securityfocus.com/bid/24147)
7. [25383](http://secunia.com/advisories/25383)
8. [APPLE-SA-2007-07-31](http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html)
9. [SUSE-SR:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html)
10. [34877](http://www.osvdb.org/34877)
11. [ADV-2007-1941](http://www.vupen.com/english/advisories/2007/1941)
12. [GLSA-200708-15](http://security.gentoo.org/glsa/glsa-200708-15.xml)
13. [RHSA-2007:0379](http://www.redhat.com/support/errata/RHSA-2007-0379.html)
14. [ADV-2007-3386](http://www.vupen.com/english/advisories/2007/3386)
15. [1018138](http://www.securitytracker.com/id?1018138)
16. [27037](http://secunia.com/advisories/27037)
17. [](http://docs.info.apple.com/article.html?artnum=306172)
18. [26512](http://secunia.com/advisories/26512)
19. [SSRT071447](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
20. [](http://tomcat.apache.org/connectors-doc/news/20070301.html#20070518.1)
21. [HPSBUX02262](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
22. [](http://tomcat.apache.org/security-jk.html)
23. [25159](http://www.securityfocus.com/bid/25159)
24. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
25. [tomcat-jkconnector-security-bypass(34496)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34496)
26. [26235](http://secunia.com/advisories/26235)
27. [[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E)
28. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E)
29. [[tomcat-dev] 20190325 svn commit: r1856174 [25/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E)
30. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E)
31. [[tomcat-dev] 20190413 svn commit: r1857494 [18/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E)
32. [[tomcat-dev] 20190415 svn commit: r1857582 [20/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E)
33. [[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E)
34. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)
35. [[tomcat-dev] 20200213 svn commit: r1873980 [30/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35187
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 14:24 UTC
- **Last Updated**: September 13, 2024 at 15:35 UTC
- **Reserved Date**: June 14, 2023 at 20:03 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability allows an unauthenticated user to achieve the Remote Code Execution.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**SolarWinds - Access Rights Manager**
Affected versions:
- previous versions (Status: affected)
### References
1. [](https://https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35187)
2. [](https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm)
### Credits
- Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4900
- **State**: PUBLISHED
- **Published Date**: September 22, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt)
2. [](http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9)
3. [1016910](http://securitytracker.com/id?1016910)
4. [](http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617)
5. [22023](http://secunia.com/advisories/22023)
6. [29010](http://www.osvdb.org/29010)
7. [ca-etrust-esmpauditservlet-dir-traversal(29104)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29104)
8. [20139](http://www.securityfocus.com/bid/20139)
9. [20060922 RE: Computer Associates eTrust Security Command Center Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/446716/100/0/threaded)
10. [20060921 [CAID 34616, 34617, 34618]: CA eSCC and eTrust Audit vulnerabilities](http://www.securityfocus.com/archive/1/446611/100/0/threaded)
11. [ADV-2006-3738](http://www.vupen.com/english/advisories/2006/3738) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6122
- **State**: PUBLISHED
- **Published Date**: February 11, 2009 at 17:25 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web management interface in Netgear WGR614v9 allows remote attackers to cause a denial of service (crash) via a request that contains a question mark ("?").
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20081113 Netgear WGR614v9 DoS to Admin Interface (internal and external)](http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065619.html)
2. [32290](http://www.securityfocus.com/bid/32290)
3. [ADV-2008-3174](http://www.vupen.com/english/advisories/2008/3174)
4. [wgr614-interface-dos(46602)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46602)
5. [32716](http://secunia.com/advisories/32716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3042
- **State**: PUBLISHED
- **Published Date**: September 01, 2009 at 18:04 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in machine.php in Open Computer and Software (OCS) Inventory NG 1.02.1 allows remote attackers to execute arbitrary SQL commands via the systemid parameter, a different vector than CVE-2009-3040.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9416](http://www.exploit-db.com/exploits/9416)
2. [20090811 Sql injection in OCS Inventory NG Server 1.2.1](http://seclists.org/fulldisclosure/2009/Aug/0143.html)
3. [20090811 Sql injection in OCS Inventory NG Server 1.2.1](http://www.securityfocus.com/archive/1/505675/100/0/threaded)
4. [](http://www.ocsinventory-ng.org/index.php?mact=News%2Ccntnt01%2Cdetail%2C0&cntnt01articleid=147&cntnt01returnid=15)
5. [35311](http://secunia.com/advisories/35311) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7684
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15353, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15353 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15353
- **State**: PUBLISHED
- **Published Date**: August 17, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 09:54 UTC
- **Reserved Date**: August 15, 2018 at 00:00 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution in Kraftway 24F2XG Router firmware 3.5.30.1118.
### Affected Products
**Kaspersky Lab - Kraftway**
Affected versions:
- Kraftway 24F2XG Router firmware 3.5.30.1118 (Status: affected)
### References
1. [](https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/08/17/klcert-18-009-kraftway-24f2xg-router-possible-remote-code-execution/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24964
- **State**: PUBLISHED
- **Published Date**: January 03, 2022 at 12:49 UTC
- **Last Updated**: May 22, 2025 at 18:39 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - LiteSpeed Cache**
Affected versions:
- 4.4.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc)
### Credits
- Emil Kylander |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8524
- **State**: PUBLISHED
- **Published Date**: February 29, 2016 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Process Portal in IBM Business Process Manager 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035126](http://www.securitytracker.com/id/1035126)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21974472)
3. [JR54981](http://www-01.ibm.com/support/docview.wss?uid=swg1JR54981) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37440
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 18:10 UTC
- **Last Updated**: October 29, 2024 at 19:17 UTC
- **Reserved Date**: July 05, 2023 at 17:36 UTC
- **Assigned By**: hpe
### Vulnerability Description
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to conduct a server-side request forgery (SSRF) attack. A successful exploit allows an attacker to enumerate information about the internal
structure of the EdgeConnect SD-WAN Orchestrator host leading to potential disclosure of sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**Hewlett Packard Enterprise (HPE) - EdgeConnect SD-WAN Orchestrator**
Affected versions:
- Orchestrator 9.3.x (Status: affected)
- Orchestrator 9.2.x (Status: affected)
- Orchestrator 9.1.x (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt)
### Credits
- Daniel Jensen (@dozernz) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14910
- **State**: PUBLISHED
- **Published Date**: December 05, 2019 at 14:16 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 10, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
- CWE-305: Security Weakness
- CWE-592: Security Weakness
### Affected Products
**n/a - Keycloak**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14910) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50984
- **State**: PUBLISHED
- **Published Date**: December 20, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the ip parameter in the spdtstConfigAndStart function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tenda.com)
2. [](https://github.com/ef4tless/vuln/blob/master/iot/i29/spdtstConfigAndStart.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14883, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14883
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 18:43 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 10.3.6.0.0 (Status: affected)
- 12.1.3.0.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
2. [](http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1585
- **State**: PUBLISHED
- **Published Date**: May 07, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 07, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in TemaTres 1.031, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id_correo_electronico and (2) id_password parameters to login.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54244](http://osvdb.org/54244)
2. [34983](http://secunia.com/advisories/34983) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5343
- **State**: PUBLISHED
- **Published Date**: October 10, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 01:00 UTC
- **Reserved Date**: June 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write request, as demonstrated by a voice_svc_send_req buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93330](http://www.securityfocus.com/bid/93330)
2. [](https://www.codeaurora.org/multiple-memory-corruption-issues-write-operation-qdsp6v2-voice-service-driver-cve-2016-5343)
3. [](http://source.android.com/security/bulletin/2016-10-01.html)
4. [](https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6927e2e0af4dcac357be86ba563c9ae12354bb08) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1261
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 19:57 UTC
- **Last Updated**: November 12, 2024 at 20:22 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco SD-WAN Solution**
Affected versions:
- n/a (Status: affected)
### References
1. [20210120 Cisco SD-WAN Command Injection Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0223
- **State**: PUBLISHED
- **Published Date**: May 15, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Chakra Core in the way JavaScript engines render when handling objects in memory. aka "Scripting Engine Memory Corruption Vulnerability". This vulnerability is unique from CVE-2017-0252.
### Affected Products
**Microsoft Corporation - Chakra Core**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Microsoft/ChakraCore/pull/2959)
2. [1038425](http://www.securitytracker.com/id/1038425) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4301
- **State**: PUBLISHED
- **Published Date**: September 01, 2022 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 00:06 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 176609.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.2.0 (Status: affected)
- 11.1.7 (Status: affected)
- 11.2.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6615285)
2. [ibm-cognos-cve20204301-csrf (176609)](https://exchange.xforce.ibmcloud.com/vulnerabilities/176609)
3. [](https://security.netapp.com/advisory/ntap-20221014-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17694
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the display property of a button. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7138.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PhantomPDF**
Affected versions:
- 9.2.0.9297 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1224/)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41167
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 18:25 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. The problem has been patched in 1.0.4. There is no workaround.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**nicolas-van - modern-async**
Affected versions:
- < 1.0.4 (Status: affected)
### References
1. [](https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2)
2. [](https://github.com/nicolas-van/modern-async/issues/5)
3. [](https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3320
- **State**: PUBLISHED
- **Published Date**: July 25, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: July 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
admin/index.php in Maian Guestbook 3.2 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary gbook_cookie cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6061](https://www.exploit-db.com/exploits/6061)
2. [31070](http://secunia.com/advisories/31070)
3. [30203](http://www.securityfocus.com/bid/30203)
4. [](http://www.maianscriptworld.co.uk/free-php-scripts/maian-guestbook/development/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1997, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1997 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1997
- **State**: PUBLISHED
- **Published Date**: March 11, 2013 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 02:53 UTC
- **Reserved Date**: April 02, 2012 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1998.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBMU02769](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151)
2. [SSRT100846](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8646
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 06, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10151
- **State**: REJECTED
- **Published Date**: December 06, 2018 at 14:00 UTC
- **Last Updated**: December 06, 2018 at 13:57 UTC
- **Reserved Date**: April 16, 2018 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2486
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
mp3dec/SoftMP3.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate the relationship between allocated memory and the frame size, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27793371.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5)
2. [](http://source.android.com/security/bulletin/2016-06-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5570, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5570 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5570
- **State**: PUBLISHED
- **Published Date**: October 18, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cisco Firewall Services Module (FWSM) 3.2(1), and 3.1(5) and earlier, allows remote attackers to cause a denial of service (device reload) via a crafted HTTPS request, aka CSCsi77844.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26109](http://www.securityfocus.com/bid/26109)
2. [20071017 Multiple Vulnerabilities in Firewall Services Module](http://www.cisco.com/en/US/products/products_security_advisory09186a00808dda61.shtml)
3. [1018825](http://www.securitytracker.com/id?1018825)
4. [ADV-2007-3530](http://www.vupen.com/english/advisories/2007/3530)
5. [27236](http://secunia.com/advisories/27236)
6. [cisco-fwsm-http-request-dos(37251)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37251) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0410
- **State**: PUBLISHED
- **Published Date**: January 25, 2006 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ADOdb before 4.71, when using PostgreSQL, allows remote attackers to execute arbitrary SQL commands via unspecified attack vectors involving binary strings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19590](http://secunia.com/advisories/19590)
2. [19555](http://secunia.com/advisories/19555)
3. [DSA-1029](http://www.debian.org/security/2006/dsa-1029)
4. [ADV-2006-0448](http://www.vupen.com/english/advisories/2006/0448)
5. [DSA-1030](http://www.debian.org/security/2006/dsa-1030)
6. [ADV-2006-0315](http://www.vupen.com/english/advisories/2006/0315)
7. [](http://sourceforge.net/project/shownotes.php?release_id=387862&group_id=42718)
8. [18575](http://secunia.com/advisories/18575)
9. [19591](http://secunia.com/advisories/19591)
10. [18745](http://secunia.com/advisories/18745)
11. [adodb-postgresql-sql-injection(24314)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24314)
12. [19691](http://secunia.com/advisories/19691)
13. [DSA-1031](http://www.debian.org/security/2006/dsa-1031)
14. [22705](http://www.osvdb.org/22705)
15. [GLSA-200604-07](http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml)
16. [16364](http://www.securityfocus.com/bid/16364)
17. [18732](http://secunia.com/advisories/18732)
18. [GLSA-200602-02](http://www.gentoo.org/security/en/glsa/glsa-200602-02.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12054
- **State**: PUBLISHED
- **Published Date**: April 23, 2020 at 12:39 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Catch Breadcrumb plugin before 1.5.4 for WordPress allows Reflected XSS via the s parameter (a search query). Also affected are 16 themes (if the plugin is enabled) by the same author: Alchemist and Alchemist PRO, Izabel and Izabel PRO, Chique and Chique PRO, Clean Enterprise and Clean Enterprise PRO, Bold Photography PRO, Intuitive PRO, Devotepress PRO, Clean Blocks PRO, Foodoholic PRO, Catch Mag PRO, Catch Wedding PRO, and Higher Education PRO.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/10184)
2. [](https://cxsecurity.com/issue/WLB-2020040144) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20474
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 16:30 UTC
- **Last Updated**: September 17, 2024 at 02:28 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Guardium Data Encryption (GDE) 3.0.0.2 and 4.0.0.4 does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
### Affected Products
**IBM - Guardium Data Encryption**
Affected versions:
- 3.0.0.2 (Status: affected)
- 4.0.0.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6469407)
2. [ibm-gde-cve202120474-missing-auth (196945)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196945) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9954
- **State**: PUBLISHED
- **Published Date**: April 04, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 19:19 UTC
- **Reserved Date**: March 28, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36388559.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-06-01)
2. [98874](http://www.securityfocus.com/bid/98874)
3. [1038623](http://www.securitytracker.com/id/1038623) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0685, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0685 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0685
- **State**: PUBLISHED
- **Published Date**: May 09, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 01:51 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in XnViewer (aka XnView) before 1.98.5 allows remote attackers to execute arbitrary code via a crafted file containing PSD record types, a different vulnerability than CVE-2012-0684.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://technet.microsoft.com/en-us/security/msvr/msvr12-001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0288
- **State**: PUBLISHED
- **Published Date**: January 17, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Oracle Application Server 10.1.4.0 has unknown impact and attack vectors related to Oracle Internet Directory, aka OID01.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23794](http://secunia.com/advisories/23794)
2. [22083](http://www.securityfocus.com/bid/22083)
3. [32903](http://osvdb.org/32903)
4. [](http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html)
5. [TA07-017A](http://www.us-cert.gov/cas/techalerts/TA07-017A.html)
6. [oracle-cpu-jan2007(31541)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31541)
7. [1017522](http://securitytracker.com/id?1017522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15791
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 18:13 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 15, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSAP) insufficiently protects the transmitted password. This could allow an attacker that is able to intercept the network traffic to obtain valid PLC credentials.
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Siemens - SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU family (incl. SIPLUS variants)**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC WinAC RTX (F) 2010**
Affected versions:
- All versions (Status: affected)
**Siemens - SINUMERIK 840D sl**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-381684.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22449, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22449
- **State**: PUBLISHED
- **Published Date**: August 23, 2021 at 19:32 UTC
- **Last Updated**: August 03, 2024 at 18:44 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is a logic vulnerability in Elf-G10HN 1.0.0.608. An unauthenticated attacker could perform specific operations to exploit this vulnerability. Due to insufficient security design, successful exploit could allow an attacker to add users to be friends without prompting in the target device.
### Affected Products
**n/a - Elf-G10HN**
Affected versions:
- 1.0.0.608 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-logic-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51696
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 04:39 UTC
- **Last Updated**: April 22, 2025 at 15:53 UTC
- **Reserved Date**: December 21, 2023 at 18:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in СleanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**СleanTalk - Anti-Spam Protection - Spam protection, Anti-Spam, FireWall by CleanTalk**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/cleantalk-spam-protect/wordpress-spam-protection-antispam-firewall-by-cleantalk-anti-spam-plugin-6-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15602
- **State**: PUBLISHED
- **Published Date**: January 06, 2020 at 16:32 UTC
- **Last Updated**: August 05, 2024 at 00:49 UTC
- **Reserved Date**: August 26, 2019 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
The fileview package v0.1.6 has inadequate output encoding and escaping, which leads to a stored Cross-Site Scripting (XSS) vulnerability in files it serves.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - fileview**
Affected versions:
- Not fixed (Status: affected)
### References
1. [](https://hackerone.com/reports/507159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6473
- **State**: PUBLISHED
- **Published Date**: January 31, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: January 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402080) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3062
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 01, 2025 at 17:35 UTC
- **Reserved Date**: March 31, 2025 at 22:20 UTC
- **Assigned By**: drupal
### Vulnerability Description
Vulnerability in Drupal Drupal Admin LTE theme.This issue affects Drupal Admin LTE theme: *.*.
### Affected Products
**Drupal - Drupal Admin LTE theme**
Affected versions:
- *.* (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2025-010) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2020
- **State**: PUBLISHED
- **Published Date**: May 13, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [53150](http://secunia.com/advisories/53150)
2. [FEDORA-2013-10853](http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html)
3. [FEDORA-2013-8047](http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html)
4. [SUSE-SU-2014:1571](http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html)
5. [openSUSE-SU-2013:0881](http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html)
6. [](http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html)
7. [](http://support.apple.com/kb/HT5892)
8. [](https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375)
9. [USN-1816-1](http://www.ubuntu.com/usn/USN-1816-1)
10. [openSUSE-SU-2013:0883](http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html)
11. [53182](http://secunia.com/advisories/53182)
12. [APPLE-SA-2013-09-12-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html)
13. [[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?](http://www.openwall.com/lists/oss-security/2013/04/29/20)
14. [APPLE-SA-2013-09-17-1](http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html)
15. [59434](http://www.securityfocus.com/bid/59434)
16. [[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?](http://www.openwall.com/lists/oss-security/2013/04/25/2)
17. [MDVSA-2013:159](http://www.mandriva.com/security/advisories?name=MDVSA-2013:159)
18. [FEDORA-2013-10953](http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html)
19. [](https://bugzilla.clamav.net/show_bug.cgi?id=7055)
20. [FEDORA-2013-10980](http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html)
21. [](http://support.apple.com/kb/HT5880) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6102
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 23:49 UTC
- **Last Updated**: February 13, 2025 at 17:54 UTC
- **Reserved Date**: June 17, 2024 at 22:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds memory access in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 126.0.6478.114 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html)
2. [](https://issues.chromium.org/issues/339169163)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16986
- **State**: PUBLISHED
- **Published Date**: November 06, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Texas Instruments BLE-STACK v2.2.1 for SimpleLink CC2640 and CC2650 devices allows remote attackers to execute arbitrary code via a malformed packet that triggers a buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://armis.com/bleedingbit/)
2. [](http://e2e.ti.com/support/wireless-connectivity/bluetooth/f/538/t/742827)
3. [1042018](http://www.securitytracker.com/id/1042018)
4. [VU#317277](https://www.kb.cert.org/vuls/id/317277)
5. [105812](http://www.securityfocus.com/bid/105812)
6. [20181101 Texas Instruments Bluetooth Low Energy Denial of Service and Remote Code Execution Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181101-ap) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10069
- **State**: PUBLISHED
- **Published Date**: May 24, 2021 at 21:40 UTC
- **Last Updated**: September 16, 2024 at 16:27 UTC
- **Reserved Date**: March 04, 2020 at 00:00 UTC
- **Assigned By**: zephyr
### Vulnerability Description
Zephyr Bluetooth unchecked packet data results in denial of service. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Parameters (CWE-233). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-233: Security Weakness
### Affected Products
**zephyrproject-rtos - zephyr**
Affected versions:
- v1.14.2 (Status: affected)
- v2.2.0 (Status: affected)
### References
1. [](http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0048
- **State**: PUBLISHED
- **Published Date**: March 12, 2010 at 20:00 UTC
- **Last Updated**: October 15, 2024 at 20:47 UTC
- **Reserved Date**: December 15, 2009 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [APPLE-SA-2010-03-11-1](http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html)
3. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
4. [43068](http://secunia.com/advisories/43068)
5. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
6. [1023708](http://www.securitytracker.com/id?1023708)
7. [41856](http://secunia.com/advisories/41856)
8. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
9. [](http://support.apple.com/kb/HT4225)
10. [FEDORA-2010-8360](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html)
11. [](http://support.apple.com/kb/HT4070)
12. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
13. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
14. [FEDORA-2010-8379](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html)
15. [oval:org.mitre.oval:def:7135](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7135)
16. [APPLE-SA-2010-06-21-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html)
17. [38671](http://www.securityfocus.com/bid/38671)
18. [FEDORA-2010-8423](http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0445
- **State**: PUBLISHED
- **Published Date**: February 15, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 15, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Open WebMail 2.x allows remote attackers to inject arbitrary HTML or web script via the domain name parameter (logindomain) in the login page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14253](http://secunia.com/advisories/14253)
2. [12547](http://www.securityfocus.com/bid/12547)
3. [](http://turtle.ee.ncku.edu.tw/openwebmail/download/cert/patches/SA-05:01/2.5x.patch)
4. [open-webmail-logindomain-xss(19335)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19335)
5. [](http://turtle.ee.ncku.edu.tw/openwebmail/doc/changes.txt)
6. [1013172](http://securitytracker.com/id?1013172) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5128
- **State**: PUBLISHED
- **Published Date**: August 29, 2012 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 16:59 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Adminimize plugin before 1.7.22 for WordPress allow remote attackers to inject arbitrary web script or HTML via the page parameter to (1) inc-options/deinstall_options.php, (2) inc-options/theme_options.php, or (3) inc-options/im_export_options.php, or the (4) post or (5) post_ID parameters to adminimize.php, different vectors than CVE-2011-4926.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wordpress.org/extend/plugins/adminimize/changelog/)
2. [](http://plugins.trac.wordpress.org/changeset?reponame=&new=467338%40adminimize&old=466900%40adminimize#file5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24796
- **State**: PUBLISHED
- **Published Date**: April 26, 2023 at 00:00 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/yinfei6/3664387cb5b66b68c7eff4bfdb51b2d6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22022
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 00:53 UTC
- **Last Updated**: June 03, 2025 at 18:40 UTC
- **Reserved Date**: January 04, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Vulnerability CVE-2024-22022 allows a Veeam Recovery Orchestrator user that has been assigned a low-privileged role to access the NTLM hash of the service account used by the Veeam Orchestrator Server Service.
### Affected Products
**Veeam - Recovery Orchestrator**
Affected versions:
- 6 (Status: affected)
- 5 (Status: affected)
- 7 (Status: unaffected)
**Veeam - Availability Orchestrator**
Affected versions:
- 4 (Status: affected)
### References
1. [](https://veeam.com/kb4541) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16851
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zoho ManageEngine Applications Manager 13 before build 13530 allows SQL injection via the /MyPage.do widgetid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2017-16851.html)
2. [](http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27812
- **State**: PUBLISHED
- **Published Date**: August 24, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 05:32 UTC
- **Reserved Date**: March 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://advisories.stormshield.eu/2022-009/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46262
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 17:06 UTC
- **Last Updated**: May 20, 2025 at 13:12 UTC
- **Reserved Date**: April 22, 2025 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zack Katz Mad Mimi for WordPress allows Stored XSS.This issue affects Mad Mimi for WordPress: from n/a through 1.5.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Zack Katz - Mad Mimi for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/mad-mimi/vulnerability/wordpress-mad-mimi-for-wordpress-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0x1ceKing (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9901, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9901 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9901
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:24 UTC
- **Reserved Date**: June 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .fpx file, related to "Data from Faulting Address controls subsequent Write Address starting at Xfpx!gffGetFormatInfo+0x000000000002bfd5."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9901) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2075
- **State**: PUBLISHED
- **Published Date**: June 15, 2010 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 25, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt)
2. [ADV-2010-1437](http://www.vupen.com/english/advisories/2010/1437)
3. [GLSA-201006-21](http://security.gentoo.org/glsa/glsa-201006-21.xml)
4. [65445](http://osvdb.org/65445)
5. [[oss-security] 20100614 Re: CVE request: UnrealIRCd 3.2.8.1 source code contained a backdoor allowing for remote command execution](http://www.openwall.com/lists/oss-security/2010/06/14/11)
6. [13853](http://www.exploit-db.com/exploits/13853)
7. [40169](http://secunia.com/advisories/40169)
8. [20100612 Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site](http://seclists.org/fulldisclosure/2010/Jun/277)
9. [40820](http://www.securityfocus.com/bid/40820)
10. [20100612 Re: Fw: [irc-security] UnrealIRCd 3.2.8.1 backdoored on official ftp and site](http://seclists.org/fulldisclosure/2010/Jun/284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2478
- **State**: PUBLISHED
- **Published Date**: August 05, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 05, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in SilverNews 2.0.3 allows remote attackers to execute arbitrary SQL commands via the user field on the login page in the Admin control panel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16315](http://secunia.com/advisories/16315)
2. [](http://www.rgod.altervista.org/silvernews.html)
3. [14466](http://www.securityfocus.com/bid/14466)
4. [18517](http://www.osvdb.org/18517)
5. [1014622](http://securitytracker.com/id?1014622)
6. [silvernews-username-sql-injection(21688)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21688)
7. [20050803 Silvernews 2.0.3 (possibly previous versions ) SQL Injection / Login Bypass / Remote commands execution / cross site scripting](http://marc.info/?l=bugtraq&m=112309780321088&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47213
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 21:37 UTC
- **Reserved Date**: December 12, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Graphics Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Microsoft Office Graphics Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-47213) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45285
- **State**: PUBLISHED
- **Published Date**: December 06, 2023 at 16:27 UTC
- **Last Updated**: February 13, 2025 at 17:14 UTC
- **Reserved Date**: October 06, 2023 at 17:06 UTC
- **Assigned By**: Go
### Vulnerability Description
Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
### Affected Products
**Go toolchain - cmd/go**
Affected versions:
- 0 (Status: affected)
- 1.21.0-0 (Status: affected)
### References
1. [](https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ)
2. [](https://go.dev/issue/63845)
3. [](https://go.dev/cl/540257)
4. [](https://pkg.go.dev/vuln/GO-2023-2383)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/)
### Credits
- David Leadbeater |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10086
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 19:05 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Java**
Affected versions:
- Java SE: 7u141 (Status: affected)
- 8u131 (Status: affected)
### References
1. [99662](http://www.securityfocus.com/bid/99662)
2. [RHSA-2017:1791](https://access.redhat.com/errata/RHSA-2017:1791)
3. [RHSA-2017:1790](https://access.redhat.com/errata/RHSA-2017:1790)
4. [](https://security.netapp.com/advisory/ntap-20170720-0001/)
5. [DSA-4005](http://www.debian.org/security/2017/dsa-4005)
6. [1038931](http://www.securitytracker.com/id/1038931)
7. [GLSA-201709-22](https://security.gentoo.org/glsa/201709-22)
8. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22089
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 14:12 UTC
- **Last Updated**: May 26, 2025 at 05:18 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Don't expose hw_counters outside of init net namespace
Commit 467f432a521a ("RDMA/core: Split port and device counter sysfs
attributes") accidentally almost exposed hw counters to non-init net
namespaces. It didn't expose them fully, as an attempt to read any of
those counters leads to a crash like this one:
[42021.807566] BUG: kernel NULL pointer dereference, address: 0000000000000028
[42021.814463] #PF: supervisor read access in kernel mode
[42021.819549] #PF: error_code(0x0000) - not-present page
[42021.824636] PGD 0 P4D 0
[42021.827145] Oops: 0000 [#1] SMP PTI
[42021.830598] CPU: 82 PID: 2843922 Comm: switchto-defaul Kdump: loaded Tainted: G S W I XXX
[42021.841697] Hardware name: XXX
[42021.849619] RIP: 0010:hw_stat_device_show+0x1e/0x40 [ib_core]
[42021.855362] Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 49 89 d0 4c 8b 5e 20 48 8b 8f b8 04 00 00 48 81 c7 f0 fa ff ff <48> 8b 41 28 48 29 ce 48 83 c6 d0 48 c1 ee 04 69 d6 ab aa aa aa 48
[42021.873931] RSP: 0018:ffff97fe90f03da0 EFLAGS: 00010287
[42021.879108] RAX: ffff9406988a8c60 RBX: ffff940e1072d438 RCX: 0000000000000000
[42021.886169] RDX: ffff94085f1aa000 RSI: ffff93c6cbbdbcb0 RDI: ffff940c7517aef0
[42021.893230] RBP: ffff97fe90f03e70 R08: ffff94085f1aa000 R09: 0000000000000000
[42021.900294] R10: ffff94085f1aa000 R11: ffffffffc0775680 R12: ffffffff87ca2530
[42021.907355] R13: ffff940651602840 R14: ffff93c6cbbdbcb0 R15: ffff94085f1aa000
[42021.914418] FS: 00007fda1a3b9700(0000) GS:ffff94453fb80000(0000) knlGS:0000000000000000
[42021.922423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[42021.928130] CR2: 0000000000000028 CR3: 00000042dcfb8003 CR4: 00000000003726f0
[42021.935194] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[42021.942257] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[42021.949324] Call Trace:
[42021.951756] <TASK>
[42021.953842] [<ffffffff86c58674>] ? show_regs+0x64/0x70
[42021.959030] [<ffffffff86c58468>] ? __die+0x78/0xc0
[42021.963874] [<ffffffff86c9ef75>] ? page_fault_oops+0x2b5/0x3b0
[42021.969749] [<ffffffff87674b92>] ? exc_page_fault+0x1a2/0x3c0
[42021.975549] [<ffffffff87801326>] ? asm_exc_page_fault+0x26/0x30
[42021.981517] [<ffffffffc0775680>] ? __pfx_show_hw_stats+0x10/0x10 [ib_core]
[42021.988482] [<ffffffffc077564e>] ? hw_stat_device_show+0x1e/0x40 [ib_core]
[42021.995438] [<ffffffff86ac7f8e>] dev_attr_show+0x1e/0x50
[42022.000803] [<ffffffff86a3eeb1>] sysfs_kf_seq_show+0x81/0xe0
[42022.006508] [<ffffffff86a11134>] seq_read_iter+0xf4/0x410
[42022.011954] [<ffffffff869f4b2e>] vfs_read+0x16e/0x2f0
[42022.017058] [<ffffffff869f50ee>] ksys_read+0x6e/0xe0
[42022.022073] [<ffffffff8766f1ca>] do_syscall_64+0x6a/0xa0
[42022.027441] [<ffffffff8780013b>] entry_SYSCALL_64_after_hwframe+0x78/0xe2
The problem can be reproduced using the following steps:
ip netns add foo
ip netns exec foo bash
cat /sys/class/infiniband/mlx4_0/hw_counters/*
The panic occurs because of casting the device pointer into an
ib_device pointer using container_of() in hw_stat_device_show() is
wrong and leads to a memory corruption.
However the real problem is that hw counters should never been exposed
outside of the non-init net namespace.
Fix this by saving the index of the corresponding attribute group
(it might be 1 or 2 depending on the presence of driver-specific
attributes) and zeroing the pointer to hw_counters group for compat
devices during the initialization.
With this fix applied hw_counters are not available in a non-init
net namespace:
find /sys/class/infiniband/mlx4_0/ -name hw_counters
/sys/class/infiniband/mlx4_0/ports/1/hw_counters
/sys/class/infiniband/mlx4_0/ports/2/hw_counters
/sys/class/infiniband/mlx4_0/hw_counters
ip netns add foo
ip netns exec foo bash
find /sys/class/infiniband/mlx4_0/ -name hw_counters
### Affected Products
**Linux - Linux**
Affected versions:
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
- 467f432a521a284c418e3d521ee51840a5e23424 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.180 (Status: unaffected)
- 6.1.134 (Status: unaffected)
- 6.6.87 (Status: unaffected)
- 6.12.23 (Status: unaffected)
- 6.13.11 (Status: unaffected)
- 6.14.2 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9a5b7f8842a90a5e6eeff37f9f6d814e61ea3529)
2. [](https://git.kernel.org/stable/c/d5212b99649c5740154f307e9e3d7fee9bf62773)
3. [](https://git.kernel.org/stable/c/0cf80f924aecb5b2bebd4f4ad11b2efc676a0b78)
4. [](https://git.kernel.org/stable/c/df45ae2a4f1cdfda00c032839e12092e1f32c05e)
5. [](https://git.kernel.org/stable/c/c14d9704f5d77a7c7fa46e2114b64a4f75b64e17)
6. [](https://git.kernel.org/stable/c/6682da5d8fd578a5068531d01633c9d2e4c8f12b)
7. [](https://git.kernel.org/stable/c/a1ecb30f90856b0be4168ad51b8875148e285c1f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0276
- **State**: PUBLISHED
- **Published Date**: February 12, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-010](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-010)
2. [103175](http://osvdb.org/103175)
3. [ms-ie-cve20140276-code-exec(90766)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90766)
4. [1029741](http://www.securitytracker.com/id/1029741)
5. [56796](http://secunia.com/advisories/56796)
6. [65375](http://www.securityfocus.com/bid/65375) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1151
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Compaq/Microcom 6000 Access Integrator does not cause a session timeout after prompting for a username or password, which allows remote attackers to cause a denial of service by connecting to the integrator without providing a username or password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19980603 Compaq/Microcom 6000 DoS + more](http://marc.info/?l=bugtraq&m=90296493106214&w=2)
2. [microcom-dos(2089)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2089) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4354
- **State**: PUBLISHED
- **Published Date**: August 15, 2023 at 17:07 UTC
- **Last Updated**: May 05, 2025 at 15:53 UTC
- **Reserved Date**: August 15, 2023 at 00:03 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 116.0.5845.96 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html)
2. [](https://crbug.com/1464215)
3. [](https://www.debian.org/security/2023/dsa-5479)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/)
6. [](http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html)
7. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5316, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5316 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5316
- **State**: PUBLISHED
- **Published Date**: February 21, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2808-1](http://www.ubuntu.com/usn/USN-2808-1)
2. [DSA-3397](https://www.debian.org/security/2015/dsa-3397)
3. [[oss-security] 20151110 wpa_supplicant: EAP-pwd peer error path failure on unexpected Confirm message](http://www.openwall.com/lists/oss-security/2015/11/10/11)
4. [77538](http://www.securityfocus.com/bid/77538)
5. [](http://w1.fi/security/2015-8/eap-pwd-unexpected-confirm.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1234, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1234
- **State**: PUBLISHED
- **Published Date**: April 06, 2022 at 03:10 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior to 3.97. This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**livehelperchat - livehelperchat/livehelperchat**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/0d235252-0882-4053-85c1-b41b94c814d4)
2. [](https://github.com/livehelperchat/livehelperchat/commit/a09aa0d793818dc4cae78ac4bcfb557d4fd2a30d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8894
- **State**: PUBLISHED
- **Published Date**: March 22, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 07:10 UTC
- **Reserved Date**: March 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In 2345 Security Guard 3.6, the driver file (2345BdPcSafe.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222108.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/D0neMkj/POC_BSOD/tree/master/2345%20security%20guard/0x00222108) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.