System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37928
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 15:21 UTC
- **Last Updated**: May 26, 2025 at 05:23 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
dm-bufio: don't schedule in atomic context
A BUG was reported as below when CONFIG_DEBUG_ATOMIC_SLEEP and
try_verify_in_tasklet are enabled.
[ 129.444685][ T934] BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2421
[ 129.444723][ T934] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 934, name: kworker/1:4
[ 129.444740][ T934] preempt_count: 201, expected: 0
[ 129.444756][ T934] RCU nest depth: 0, expected: 0
[ 129.444781][ T934] Preemption disabled at:
[ 129.444789][ T934] [<ffffffd816231900>] shrink_work+0x21c/0x248
[ 129.445167][ T934] kernel BUG at kernel/sched/walt/walt_debug.c:16!
[ 129.445183][ T934] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[ 129.445204][ T934] Skip md ftrace buffer dump for: 0x1609e0
[ 129.447348][ T934] CPU: 1 PID: 934 Comm: kworker/1:4 Tainted: G W OE 6.6.56-android15-8-o-g6f82312b30b9-debug #1 1400000003000000474e5500b3187743670464e8
[ 129.447362][ T934] Hardware name: Qualcomm Technologies, Inc. Parrot QRD, Alpha-M (DT)
[ 129.447373][ T934] Workqueue: dm_bufio_cache shrink_work
[ 129.447394][ T934] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 129.447406][ T934] pc : android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug]
[ 129.447435][ T934] lr : __traceiter_android_rvh_schedule_bug+0x44/0x6c
[ 129.447451][ T934] sp : ffffffc0843dbc90
[ 129.447459][ T934] x29: ffffffc0843dbc90 x28: ffffffffffffffff x27: 0000000000000c8b
[ 129.447479][ T934] x26: 0000000000000040 x25: ffffff804b3d6260 x24: ffffffd816232b68
[ 129.447497][ T934] x23: ffffff805171c5b4 x22: 0000000000000000 x21: ffffffd816231900
[ 129.447517][ T934] x20: ffffff80306ba898 x19: 0000000000000000 x18: ffffffc084159030
[ 129.447535][ T934] x17: 00000000d2b5dd1f x16: 00000000d2b5dd1f x15: ffffffd816720358
[ 129.447554][ T934] x14: 0000000000000004 x13: ffffff89ef978000 x12: 0000000000000003
[ 129.447572][ T934] x11: ffffffd817a823c4 x10: 0000000000000202 x9 : 7e779c5735de9400
[ 129.447591][ T934] x8 : ffffffd81560d004 x7 : 205b5d3938373434 x6 : ffffffd8167397c8
[ 129.447610][ T934] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffffffc0843db9e0
[ 129.447629][ T934] x2 : 0000000000002f15 x1 : 0000000000000000 x0 : 0000000000000000
[ 129.447647][ T934] Call trace:
[ 129.447655][ T934] android_rvh_schedule_bug+0x0/0x8 [sched_walt_debug 1400000003000000474e550080cce8a8a78606b6]
[ 129.447681][ T934] __might_resched+0x190/0x1a8
[ 129.447694][ T934] shrink_work+0x180/0x248
[ 129.447706][ T934] process_one_work+0x260/0x624
[ 129.447718][ T934] worker_thread+0x28c/0x454
[ 129.447729][ T934] kthread+0x118/0x158
[ 129.447742][ T934] ret_from_fork+0x10/0x20
[ 129.447761][ T934] Code: ???????? ???????? ???????? d2b5dd1f (d4210000)
[ 129.447772][ T934] ---[ end trace 0000000000000000 ]---
dm_bufio_lock will call spin_lock_bh when try_verify_in_tasklet
is enabled, and __scan will be called in atomic context.
### Affected Products
**Linux - Linux**
Affected versions:
- 7cd326747f46ffe1c7bff5682e97dfbcb98990ec (Status: affected)
- 7cd326747f46ffe1c7bff5682e97dfbcb98990ec (Status: affected)
- 7cd326747f46ffe1c7bff5682e97dfbcb98990ec (Status: affected)
- 7cd326747f46ffe1c7bff5682e97dfbcb98990ec (Status: affected)
- 7cd326747f46ffe1c7bff5682e97dfbcb98990ec (Status: affected)
**Linux - Linux**
Affected versions:
- 4.9 (Status: affected)
- 0 (Status: unaffected)
- 6.1.138 (Status: unaffected)
- 6.6.90 (Status: unaffected)
- 6.12.28 (Status: unaffected)
- 6.14.6 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a99f5bf4f7197009859dbce14c12f8e2ce5a5a69)
2. [](https://git.kernel.org/stable/c/c8c83052283bcf2fdd467a33d1d2bd5ba36e935a)
3. [](https://git.kernel.org/stable/c/f45108257280e0a1cc951ce254853721b40c0812)
4. [](https://git.kernel.org/stable/c/69a37b3ba85088fc6b903b8e1db7f0a1d4d0b52d)
5. [](https://git.kernel.org/stable/c/a3d8f0a7f5e8b193db509c7191fefeed3533fc44) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17434
- **State**: PUBLISHED
- **Published Date**: September 24, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 10:47 UTC
- **Reserved Date**: September 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SIGFPE signal is raised in the function apply_filters() of h5repack_filters.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln4#divided-by-zero---poc_apply_filters_h5repack_filters)
2. [[debian-lts-announce] 20230809 [SECURITY] [DLA 3522-1] hdf5 security update](https://lists.debian.org/debian-lts-announce/2023/08/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34964, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34964 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34964
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 14:52 UTC
- **Last Updated**: August 03, 2024 at 09:22 UTC
- **Reserved Date**: July 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the SitePages module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.opensource-socialnetwork.org/)
2. [](https://github.com/opensource-socialnetwork/opensource-socialnetwork/releases/tag/6.3)
3. [](https://www.openteknik.com/contact?channel=ossn)
4. [](https://grimthereaperteam.medium.com/ossn-6-3-lts-stored-xss-vulnerability-at-sitepages-ba91bbeccf1c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0083
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
### Affected Products
**Microsoft Corporation - Windows Uniscribe**
Affected versions:
- Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0083)
2. [1037992](http://www.securitytracker.com/id/1037992)
3. [96608](http://www.securityfocus.com/bid/96608)
4. [41655](https://www.exploit-db.com/exploits/41655/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32118, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32118 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32118
- **State**: PUBLISHED
- **Published Date**: June 12, 2023 at 14:56 UTC
- **Last Updated**: October 10, 2024 at 17:28 UTC
- **Reserved Date**: May 03, 2023 at 15:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPoperation SALERT – Fake Sales Notification WooCommerce plugin <= 1.2.1 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPoperation - SALERT – Fake Sales Notification WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/salert/wordpress-salert-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Jonas Höbenreich (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39564
- **State**: PUBLISHED
- **Published Date**: February 05, 2025 at 15:31 UTC
- **Last Updated**: February 26, 2025 at 18:16 UTC
- **Reserved Date**: June 25, 2024 at 15:12 UTC
- **Assigned By**: juniper
### Vulnerability Description
This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.
A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).
This issue affects:
Junos OS: * from 22.4 before 22.4R3-S4.
Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-415: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 22.4 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 22.4 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA83011)
### Credits
- Juniper SIRT would like to acknowledge and thank Craig Dods (cdods@meta.com) from Meta for responsibly reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23258
- **State**: PUBLISHED
- **Published Date**: January 25, 2022 at 21:23 UTC
- **Last Updated**: January 02, 2025 at 18:23 UTC
- **Reserved Date**: January 15, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge for Android Spoofing Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Edge for Android**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Edge for Android Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12634
- **State**: PUBLISHED
- **Published Date**: March 07, 2025 at 11:12 UTC
- **Last Updated**: March 07, 2025 at 14:35 UTC
- **Reserved Date**: December 13, 2024 at 21:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Related Posts, Inline Related Posts, Contextual Related Posts, Related Content By PickPlugins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including 2.0.59. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**pickplugins - Related Posts, Inline Related Posts, Contextual Related Posts, Related Content By PickPlugins**
Affected versions:
- 2.0.59 (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/29d22612-8e0d-4275-b370-9729352c951e?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/related-post/tags/2.0.58b/includes/menu/settings.php#L129)
3. [](https://wordpress.org/plugins/related-post/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3251482/)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9269
- **State**: PUBLISHED
- **Published Date**: February 18, 2020 at 17:22 UTC
- **Last Updated**: August 04, 2024 at 10:26 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SOPlanning 1.45 is vulnerable to authenticated SQL Injection that leads to command execution via the users parameter, as demonstrated by export_ical.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/J3rryBl4nks/SOPlanning/blob/master/InjectionIcalShell.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44054, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44054 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44054
- **State**: PUBLISHED
- **Published Date**: September 15, 2024 at 08:19 UTC
- **Last Updated**: September 15, 2024 at 19:50 UTC
- **Reserved Date**: August 18, 2024 at 21:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Fluida allows Stored XSS.This issue affects Fluida: from n/a through 1.8.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CryoutCreations - Fluida**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/fluida/wordpress-fluida-theme-1-8-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3631
- **State**: PUBLISHED
- **Published Date**: November 23, 2023 at 09:13 UTC
- **Last Updated**: August 02, 2024 at 07:01 UTC
- **Reserved Date**: July 12, 2023 at 07:28 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Medart Health Services - Medart Notification Panel**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://https://www.usom.gov.tr/bildirim/tr-23-0656)
### Credits
- Resul Melih MACİT |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20214
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 17:34 UTC
- **Last Updated**: May 07, 2025 at 19:45 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data.
This vulnerability exists because a subtle change in inner API call behavior causes results to be filtered incorrectly. An attacker could exploit this vulnerability by using either NETCONF, RESTCONF, or gRPC Network Management Interface (gNMI) protocols and query data on paths that may have been denied by the NACM configuration. A successful exploit could allow the attacker to access data that should have been restricted according to the NACM configuration.
Note: This vulnerability requires that the attacker obtain the credentials from a valid user with privileges lower than 15, and that NACM was configured to provide restricted read access for that user.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- 17.11.1 (Status: affected)
- 17.11.1a (Status: affected)
- 17.12.1 (Status: affected)
- 17.12.1w (Status: affected)
- 17.12.1a (Status: affected)
- 17.12.1x (Status: affected)
- 17.12.2 (Status: affected)
- 17.12.2a (Status: affected)
- 17.12.1y (Status: affected)
- 17.12.1z (Status: affected)
- 17.12.1z1 (Status: affected)
- 17.13.1 (Status: affected)
- 17.13.1a (Status: affected)
- 17.11.99SW (Status: affected)
### References
1. [cisco-sa-netconf-nacm-bypass-TGZV9pmQ](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-netconf-nacm-bypass-TGZV9pmQ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7713
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Skin&Ink Magazine (aka com.triactivemedia.skinandink) application @7F08017A for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#609337](http://www.kb.cert.org/vuls/id/609337) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19878
- **State**: PUBLISHED
- **Published Date**: November 27, 2020 at 16:24 UTC
- **Last Updated**: August 05, 2024 at 02:32 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to historical data from AprolSqlServer by bypassing authentication, a different vulnerability than CVE-2019-16358.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.br-automation.com/downloads_br_productcatalogue/BRP44400000000000000585952/APROL_R42_A1_ReleaseNotes_001.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2673
- **State**: PUBLISHED
- **Published Date**: October 06, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 23, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ec_ajax_update_option and ec_ajax_clear_all_taxrates functions in inc/admin/admin_ajax_functions.php in the WP EasyCart plugin 1.1.30 through 3.0.20 for WordPress allow remote attackers to gain administrator privileges and execute arbitrary code via the option_name and option_value parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.rastating.com/wp-easycart-privilege-escalation-information-disclosure/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43791
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 14:39 UTC
- **Last Updated**: August 23, 2024 at 18:10 UTC
- **Reserved Date**: August 16, 2024 at 14:20 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
RequestStore provides per-request global storage for Rack. The files published as part of request_store 1.3.2 have 0666 permissions, meaning that they are world-writable, which allows local users to execute arbitrary code. This version was published in 2017, and most production environments do not allow access for local users, so the chances of this being exploited are very low, given that the vast majority of users will have upgraded, and those that have not, if any, are not likely to be exposed.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**steveklabnik - request_store**
Affected versions:
- = 1.3.2 (Status: affected)
### References
1. [https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m](https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45025
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 16:05 UTC
- **Last Updated**: August 02, 2024 at 20:14 UTC
- **Reserved Date**: October 03, 2023 at 08:58 UTC
- **Assigned By**: qnap
### Vulnerability Description
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QTS 4.5.4.2627 build 20231225 and later
QuTS hero h5.1.4.2596 build 20231128 and later
QuTS hero h4.5.4.2626 build 20231225 and later
QuTScloud c5.1.5.2651 and later
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
- CWE-78: OS Command Injection
### Affected Products
**QNAP Systems Inc. - QTS**
Affected versions:
- 5.1.x (Status: affected)
- 4.5.x (Status: affected)
**QNAP Systems Inc. - QuTS hero**
Affected versions:
- h5.1.x (Status: affected)
- h4.5.x (Status: affected)
**QNAP Systems Inc. - QuTScloud**
Affected versions:
- c5.x.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-23-47)
### Credits
- chumen77 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-54321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-54321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-54321
- **State**: REJECTED
- **Published Date**: January 13, 2015 at 11:00 UTC
- **Last Updated**: April 26, 2016 at 12:57 UTC
- **Reserved Date**: January 13, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10226
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 17:07 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Fleet Management System Suite). The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Cruise Fleet Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality Cruise Fleet Management**
Affected versions:
- 9.0 (Status: affected)
### References
1. [1038941](http://www.securitytracker.com/id/1038941)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
3. [99646](http://www.securityfocus.com/bid/99646) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0243
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: April 12, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AnalogX SimpleServer:WWW HTTP server 1.03 allows remote attackers to cause a denial of service via a short GET request to cgi-bin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.analogx.com/contents/download/network/sswww.htm)
2. [1265](http://www.osvdb.org/1265)
3. [simpleserver-exception-dos(4189)](https://exchange.xforce.ibmcloud.com/vulnerabilities/4189)
4. [20000324 AnalogX SimpleServer 1.03 Remote Crash" at:](http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555%40post2.rnci.com)
5. [1076](http://www.securityfocus.com/bid/1076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38515
- **State**: PUBLISHED
- **Published Date**: November 13, 2023 at 02:32 UTC
- **Last Updated**: August 28, 2024 at 18:05 UTC
- **Reserved Date**: July 18, 2023 at 17:33 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Andy Moyle - Church Admin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-56-server-side-request-forgery-ssrf-vulnerability?_s_id=cve)
### Credits
- Yuchen Ji (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43859
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 20:41 UTC
- **Last Updated**: April 15, 2025 at 14:30 UTC
- **Reserved Date**: October 26, 2022 at 15:46 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information for an object they are authorized to but not while using this interface. By performing a UNION based SQL injection an attacker could see file permissions through this interface. IBM X-Force ID: 239304.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**IBM - Navigator for i**
Affected versions:
- 7.3, 7.4, 7.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6850801)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/239304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1094
- **State**: PUBLISHED
- **Published Date**: April 25, 2022 at 15:51 UTC
- **Last Updated**: May 05, 2025 at 16:43 UTC
- **Reserved Date**: March 25, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The amr users WordPress plugin before 4.59.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - amr users**
Affected versions:
- 4.59.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329)
### Credits
- Ankur Bakre |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21265
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 11:22 UTC
- **Last Updated**: September 24, 2024 at 20:29 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.27 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2022.html)
2. [](https://security.netapp.com/advisory/ntap-20220121-0008/)
3. [FEDORA-2022-43217f0ba7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/)
4. [FEDORA-2022-be015e0331](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10609
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 01:00 UTC
- **Last Updated**: November 01, 2024 at 15:17 UTC
- **Reserved Date**: October 31, 2024 at 15:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System Project 1.0. This affects an unknown part of the file typeadd.php. The manipulation of the argument sex leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**itsourcecode - Tailoring Management System Project**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-282621 | itsourcecode Tailoring Management System Project typeadd.php sql injection](https://vuldb.com/?id.282621)
2. [VDB-282621 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282621)
3. [Submit #434841 | Itsourcecode Tailoring Management System Project 1.0 SQL Injection](https://vuldb.com/?submit.434841)
4. [](https://github.com/Lanxiy7th/lx_CVE_report-/issues/17)
5. [](https://itsourcecode.com/)
### Credits
- cdeter (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33502
- **State**: PUBLISHED
- **Published Date**: May 24, 2021 at 15:42 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1)
2. [](https://security.netapp.com/advisory/ntap-20210706-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58077
- **State**: PUBLISHED
- **Published Date**: March 06, 2025 at 16:13 UTC
- **Last Updated**: May 04, 2025 at 10:09 UTC
- **Reserved Date**: March 06, 2025 at 15:52 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port"
log severity") ignores -EINVAL error message on common soc_pcm_ret().
It is used from many functions, ignoring -EINVAL is over-kill.
The reason why -EINVAL was ignored was it really should only be used
upon invalid parameters coming from userspace and in that case we don't
want to log an error since we do not want to give userspace a way to do
a denial-of-service attack on the syslog / diskspace.
So don't use soc_pcm_ret() on .prepare callback is better idea.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.1.129 (Status: unaffected)
- 6.6.78 (Status: unaffected)
- 6.12.14 (Status: unaffected)
- 6.13.3 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/b65ba768302adc7ddc70811116cef80ca089af59)
2. [](https://git.kernel.org/stable/c/79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9ee)
3. [](https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f)
4. [](https://git.kernel.org/stable/c/8ec4e8c8e142933eaa8e1ed87168831069250e4e)
5. [](https://git.kernel.org/stable/c/301c26a018acb94dd537a4418cefa0f654500c6f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2040
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary web script or HTML via the (1) LAN_407 parameter to clock_menu.php, (2) "email article to a friend" field, (3) "submit news" field, or (4) avmsg parameter to usersettings.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6529](http://www.osvdb.org/6529)
2. [](http://www.waraxe.us/index.php?modname=sa&id=31)
3. [10436](http://www.securityfocus.com/bid/10436)
4. [6527](http://www.osvdb.org/6527)
5. [6528](http://www.osvdb.org/6528)
6. [e107-clock-menu-xss(16279)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16279)
7. [e107-email-friend-xss(16280)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16280)
8. [11740](http://secunia.com/advisories/11740)
9. [e107-user-setting-xss(16281)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16281)
10. [6526](http://www.osvdb.org/6526)
11. [20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]](http://marc.info/?l=bugtraq&m=108588043007224&w=2)
12. [20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]](http://marc.info/?l=full-disclosure&m=108586723116427&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9057
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 02:06 UTC
- **Last Updated**: October 10, 2024 at 13:12 UTC
- **Reserved Date**: September 20, 2024 at 20:06 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Curator.io: Show all your social media posts in a beautiful feed. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘feed_id’ attribute in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**curatorio - Curator.io: Show all your social media posts in a beautiful feed.**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/953d64f2-a514-48e9-9ab3-f9a793ad953a?source=cve)
2. [](https://wordpress.org/plugins/curatorio/#developers)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9526
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In device configuration data, there is an improperly configured setting. This could lead to remote disclosure of device location. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112159033
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-9 (Status: affected)
### References
1. [105847](http://www.securityfocus.com/bid/105847)
2. [](https://source.android.com/security/bulletin/pixel/2018-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24536
- **State**: PUBLISHED
- **Published Date**: April 06, 2023 at 15:50 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: January 25, 2023 at 21:19 UTC
- **Assigned By**: Go
### Vulnerability Description
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.
### Affected Products
**Go standard library - mime/multipart**
Affected versions:
- 0 (Status: affected)
- 1.20.0-0 (Status: affected)
**Go standard library - net/textproto**
Affected versions:
- 0 (Status: affected)
- 1.20.0-0 (Status: affected)
### References
1. [](https://go.dev/issue/59153)
2. [](https://go.dev/cl/482076)
3. [](https://go.dev/cl/482075)
4. [](https://go.dev/cl/482077)
5. [](https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8)
6. [](https://pkg.go.dev/vuln/GO-2023-1705)
7. [](https://security.netapp.com/advisory/ntap-20230526-0007/)
8. [](https://security.gentoo.org/glsa/202311-09)
### Credits
- Jakob Ackermann (@das7pad) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22282
- **State**: PUBLISHED
- **Published Date**: January 31, 2024 at 17:54 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 08, 2024 at 20:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Torbert SimpleMap Store Locator allows Reflected XSS.This issue affects SimpleMap Store Locator: from n/a through 2.6.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Michael Torbert - SimpleMap Store Locator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/simplemap/wordpress-simplemap-store-locator-plugin-2-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13926
- **State**: PUBLISHED
- **Published Date**: April 19, 2025 at 06:00 UTC
- **Last Updated**: April 21, 2025 at 02:38 UTC
- **Reserved Date**: March 13, 2025 at 12:47 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP-Syntax WordPress plugin through 1.2 does not properly handle input, allowing an attacker to create a post containing a large number of tags, thereby exploiting a catastrophic backtracking issue in the regular expression processing to cause a DoS.
### Weakness Classification (CWE)
- CWE-400 Uncontrolled Resource Consumption: Security Weakness
### Affected Products
**Unknown - WP-Syntax**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/b5f0092e-7cd5-412f-a8ea-7bd4a8bf86d2/)
### Credits
- Pierre Rudloff
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36251
- **State**: PUBLISHED
- **Published Date**: February 19, 2021 at 07:00 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ownCloud Server before 10.3.0 allows an attacker, who has received non-administrative access to a group share, to remove everyone else's access to that share.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:N/C:N/I:L/PR:L/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owncloud.com/security-advisories/deleting-received-group-share-for-whole-group/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3961
- **State**: PUBLISHED
- **Published Date**: August 04, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:04 UTC
- **Reserved Date**: May 12, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The web-server component in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches allows remote authenticated users to cause a denial of service (memory corruption and reboot) via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [75228](http://www.securityfocus.com/bid/75228)
2. [](http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6801
- **State**: PUBLISHED
- **Published Date**: September 29, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The frank matano (aka com.frank.matano) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#106329](http://www.kb.cert.org/vuls/id/106329)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2923
- **State**: PUBLISHED
- **Published Date**: May 27, 2023 at 07:31 UTC
- **Last Updated**: August 02, 2024 at 06:41 UTC
- **Reserved Date**: May 27, 2023 at 07:05 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - AC6**
Affected versions:
- US_AC6V1.0BR_V15.03.05.19 (Status: affected)
### References
1. [](https://vuldb.com/?id.230077)
2. [](https://vuldb.com/?ctiid.230077)
3. [](https://github.com/GleamingEyes/vul/blob/main/1.md)
### Credits
- tianwenqi (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0470
- **State**: PUBLISHED
- **Published Date**: January 14, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 14, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle extensions notification, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:14366](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14366)
2. [](http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html)
3. [45788](http://www.securityfocus.com/bid/45788)
4. [70453](http://osvdb.org/70453)
5. [](http://www.srware.net/forum/viewtopic.php?f=18&t=2054)
6. [unspecified(64661)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64661)
7. [](http://code.google.com/p/chromium/issues/detail?id=58053)
8. [42951](http://secunia.com/advisories/42951) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20745
- **State**: PUBLISHED
- **Published Date**: March 18, 2024 at 14:59 UTC
- **Last Updated**: August 01, 2024 at 21:59 UTC
- **Reserved Date**: December 04, 2023 at 16:52 UTC
- **Assigned By**: adobe
### Vulnerability Description
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Premiere Pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2322
- **State**: PUBLISHED
- **Published Date**: July 19, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: July 19, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Class-1 Forum 0.24.4 and 0.23.2, and Clever Copy with forums installed, allows remote attackers to inject arbitrary web script or HTML via the (1) viewuser_id or (2) group parameter to users.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16078](http://secunia.com/advisories/16078)
2. [1014485](http://securitytracker.com/id?1014485)
3. [14261](http://www.securityfocus.com/bid/14261)
4. [1014486](http://securitytracker.com/id?1014486)
5. [](http://lostmon.blogspot.com/2005/07/class-1-forum-software-cross-site.html)
6. [17920](http://www.osvdb.org/17920) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0919
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [motorola-cable-crash(2004)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2004)
2. [19980510 Security Vulnerability in Motorola CableRouters](http://www.netspace.org/cgi-bin/wa?A2=ind9805B&L=bugtraq&P=R1621) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47549
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 00:00 UTC
- **Last Updated**: April 17, 2025 at 14:02 UTC
- **Reserved Date**: December 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6g)
2. [](https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9644
- **State**: PUBLISHED
- **Published Date**: March 12, 2019 at 06:00 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An XSSI (cross-site inclusion) vulnerability in Jupyter Notebook before 5.7.6 allows inclusion of resources on malicious pages when visited by users who are authenticated with a Jupyter server. Access to the content of resources has been demonstrated with Internet Explorer through capturing of error messages, though not reproduced with other browsers. This occurs because Internet Explorer's error messages can include the content of any invalid JavaScript that was encountered.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jupyter/notebook/compare/f3f00df...05aa4b2)
2. [FEDORA-2019-a6e1287e76](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UP5RLEES2JBBNSNLBR65XM6PCD4EMF7D/)
3. [FEDORA-2019-9e67979b2a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMDPJBVXOVO6LYGAT46VZNHH6JKSCURO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23709
- **State**: PUBLISHED
- **Published Date**: May 16, 2023 at 09:42 UTC
- **Last Updated**: January 09, 2025 at 15:14 UTC
- **Reserved Date**: January 17, 2023 at 15:49 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Denis WPJAM Basic plugin <= 6.2.1 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Denis - WPJAM Basic**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wpjam-basic/wordpress-wpjam-basic-plugin-6-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Lana Codes (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46538
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:09 UTC
- **Last Updated**: April 24, 2025 at 18:24 UTC
- **Reserved Date**: April 24, 2025 at 14:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webplanetsoft Inline Text Popup allows DOM-Based XSS. This issue affects Inline Text Popup: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**webplanetsoft - Inline Text Popup**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/inline-text-popup/vulnerability/wordpress-inline-text-popup-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18290
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 19:08 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, and CVE-2019-18307. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Siemens - SPPA-T3000 MS3000 Migration Server**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf)
2. [](http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0587
- **State**: PUBLISHED
- **Published Date**: June 23, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: June 21, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1010057](http://securitytracker.com/id?1010057)
2. [RHSA-2004:413](http://www.redhat.com/support/errata/RHSA-2004-413.html)
3. [RHSA-2004:418](http://www.redhat.com/support/errata/RHSA-2004-418.html)
4. [oval:org.mitre.oval:def:9398](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9398)
5. [SuSE-SA:2004:010](http://www.novell.com/linux/security/advisories/2004_10_kernel.html)
6. [FEDORA-2004-186](http://lwn.net/Articles/91155/)
7. [suse-hbaapinode-dos(16062)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16062)
8. [10279](http://www.securityfocus.com/bid/10279)
9. [MDKSA-2004:066](http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066)
10. [20040804-01-U](ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27080
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 13:05 UTC
- **Last Updated**: May 04, 2025 at 12:55 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix race when detecting delalloc ranges during fiemap
For fiemap we recently stopped locking the target extent range for the
whole duration of the fiemap call, in order to avoid a deadlock in a
scenario where the fiemap buffer happens to be a memory mapped range of
the same file. This use case is very unlikely to be useful in practice but
it may be triggered by fuzz testing (syzbot, etc).
This however introduced a race that makes us miss delalloc ranges for
file regions that are currently holes, so the caller of fiemap will not
be aware that there's data for some file regions. This can be quite
serious for some use cases - for example in coreutils versions before 9.0,
the cp program used fiemap to detect holes and data in the source file,
copying only regions with data (extents or delalloc) from the source file
to the destination file in order to preserve holes (see the documentation
for its --sparse command line option). This means that if cp was used
with a source file that had delalloc in a hole, the destination file could
end up without that data, which is effectively a data loss issue, if it
happened to hit the race described below.
The race happens like this:
1) Fiemap is called, without the FIEMAP_FLAG_SYNC flag, for a file that
has delalloc in the file range [64M, 65M[, which is currently a hole;
2) Fiemap locks the inode in shared mode, then starts iterating the
inode's subvolume tree searching for file extent items, without having
the whole fiemap target range locked in the inode's io tree - the
change introduced recently by commit b0ad381fa769 ("btrfs: fix
deadlock with fiemap and extent locking"). It only locks ranges in
the io tree when it finds a hole or prealloc extent since that
commit;
3) Note that fiemap clones each leaf before using it, and this is to
avoid deadlocks when locking a file range in the inode's io tree and
the fiemap buffer is memory mapped to some file, because writing
to the page with btrfs_page_mkwrite() will wait on any ordered extent
for the page's range and the ordered extent needs to lock the range
and may need to modify the same leaf, therefore leading to a deadlock
on the leaf;
4) While iterating the file extent items in the cloned leaf before
finding the hole in the range [64M, 65M[, the delalloc in that range
is flushed and its ordered extent completes - meaning the corresponding
file extent item is in the inode's subvolume tree, but not present in
the cloned leaf that fiemap is iterating over;
5) When fiemap finds the hole in the [64M, 65M[ range by seeing the gap in
the cloned leaf (or a file extent item with disk_bytenr == 0 in case
the NO_HOLES feature is not enabled), it will lock that file range in
the inode's io tree and then search for delalloc by checking for the
EXTENT_DELALLOC bit in the io tree for that range and ordered extents
(with btrfs_find_delalloc_in_range()). But it finds nothing since the
delalloc in that range was already flushed and the ordered extent
completed and is gone - as a result fiemap will not report that there's
delalloc or an extent for the range [64M, 65M[, so user space will be
mislead into thinking that there's a hole in that range.
This could actually be sporadically triggered with test case generic/094
from fstests, which reports a missing extent/delalloc range like this:
generic/094 2s ... - output mismatch (see /home/fdmanana/git/hub/xfstests/results//generic/094.out.bad)
--- tests/generic/094.out 2020-06-10 19:29:03.830519425 +0100
+++ /home/fdmanana/git/hub/xfstests/results//generic/094.out.bad 2024-02-28 11:00:00.381071525 +0000
@@ -1,3 +1,9 @@
QA output created by 094
fiemap run with sync
fiemap run without sync
+ERROR: couldn't find extent at 7
+map is 'HHDDHPPDPHPH'
+logical: [ 5.. 6] phys:
---truncated---
### Affected Products
**Linux - Linux**
Affected versions:
- ded566b4637f1b6b4c9ba74e7d0b8493e93f19cf (Status: affected)
- b0ad381fa7690244802aed119b478b4bdafc31dd (Status: affected)
- b0ad381fa7690244802aed119b478b4bdafc31dd (Status: affected)
- 89bca7fe6382d61e88c67a0b0e7bce315986fb8b (Status: affected)
**Linux - Linux**
Affected versions:
- 6.8 (Status: affected)
- 0 (Status: unaffected)
- 6.6.26 (Status: unaffected)
- 6.8.2 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/49d640d2946c35a17b051d54171a032dd95b0f50)
2. [](https://git.kernel.org/stable/c/ced63fffd63072c0ca55d5a451010d71bf08c0b3)
3. [](https://git.kernel.org/stable/c/978b63f7464abcfd364a6c95f734282c50f3decf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21734
- **State**: PUBLISHED
- **Published Date**: January 10, 2023 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 21:15 UTC
- **Reserved Date**: December 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Microsoft Office Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21734) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10777
- **State**: PUBLISHED
- **Published Date**: August 06, 2019 at 12:49 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 60.0.25 allows self XSS in WHM Tweak Settings for autodiscover_host (SEC-177).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/60+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22778
- **State**: PUBLISHED
- **Published Date**: February 21, 2024 at 00:00 UTC
- **Last Updated**: November 06, 2024 at 16:23 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HackMD CodiMD <2.5.2 is vulnerable to Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/hackmdio/codimd/issues/1846) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38044
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 03:55 UTC
- **Reserved Date**: August 08, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows CD-ROM File System Driver Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
### References
1. [Windows CD-ROM File System Driver Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8881
- **State**: PUBLISHED
- **Published Date**: March 20, 2020 at 18:40 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 11, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9774.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Studio Photo**
Affected versions:
- 3.6.6.916 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-304/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0712
- **State**: PUBLISHED
- **Published Date**: February 26, 2010 at 17:03 UTC
- **Last Updated**: August 07, 2024 at 00:59 UTC
- **Reserved Date**: February 26, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in zport/dmd/Events/getJSONEventsInfo in Zenoss 2.3.3, and other versions before 2.5, allow remote authenticated users to execute arbitrary SQL commands via the (1) severity, (2) state, (3) filter, (4) offset, and (5) count parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dev.zenoss.org/trac/changeset/15257)
2. [](http://www.ngenuity.org/wordpress/2010/01/14/ngenuity-2010-001-zenoss-getjsoneventsinfo-sql-injection/)
3. [61804](http://osvdb.org/61804)
4. [37802](http://www.securityfocus.com/bid/37802)
5. [](http://www.zenoss.com/news/SQL-Injection-and-Cross-Site-Forgery-in-Zenoss-Core-Corrected.html)
6. [zenoss-getjsoneventsinfo-sql-injection(55670)](https://exchange.xforce.ibmcloud.com/vulnerabilities/55670)
7. [38195](http://secunia.com/advisories/38195) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20826
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 02:27 UTC
- **Last Updated**: October 28, 2024 at 01:34 UTC
- **Reserved Date**: October 28, 2022 at 02:03 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In cta, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: ALPS07978550; Issue ID: ALPS07978550.
### Affected Products
**MediaTek, Inc. - MT6580, MT6761, MT6765, MT6779, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6895, MT6983, MT6985, MT8168, MT8175, MT8188, MT8195, MT8365, MT8673**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/September-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8149
- **State**: PUBLISHED
- **Published Date**: November 22, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:36 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The boot loaders of P10 and P10 Plus Huawei mobile phones with software the versions before Victoria-L09AC605B162, the versions before Victoria-L29AC605B162, the versions before Vicky-L29AC605B162 have an out-of-bounds memory access vulnerability due to the lack of parameter validation. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. the APP can modify specific data to cause buffer overflow in the next system reboot, causing out-of-bounds memory read which can continuous system reboot.
### Affected Products
**Huawei Technologies Co., Ltd. - P10, P10 Plus**
Affected versions:
- The versions before Victoria-L09AC605B162, The versions before Victoria-L29AC605B162, The versions before Vicky-L29AC605B162 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170816-01-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41256, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41256 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41256
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 17:59 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2389
- **State**: PUBLISHED
- **Published Date**: July 14, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 05:10 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1733 and CVE-2015-2411.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032894](http://www.securitytracker.com/id/1032894)
2. [MS15-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3553
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:27 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in X.org Server. This affects an unknown part of the file hw/xquartz/X11Controller.m of the component xquartz. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier VDB-211053 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**X.org - Server**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cgit.freedesktop.org/xorg/xserver/commit/?id=dfd057996b26420309c324ec844a5ba6dd07eda3)
2. [](https://vuldb.com/?id.211053)
3. [GLSA-202305-30](https://security.gentoo.org/glsa/202305-30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7471
- **State**: PUBLISHED
- **Published Date**: March 15, 2018 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 07:51 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management (CLM) 3.0.1 before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Quality Manager (RQM) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Team Concert (RTC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Requirements Composer (RRC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1 and 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, and 4.0.7 before iFix10, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; and Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4 allows remote authenticated users with project administrator privileges to inject arbitrary web script or HTML via a crafted project. IBM X-Force ID: 108429.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21982747)
2. [ibm-rtc-cve20157471-html-injection(108429)](https://exchange.xforce.ibmcloud.com/vulnerabilities/108429) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6433, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6433 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6433
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 13:55 UTC
- **Last Updated**: November 21, 2024 at 19:36 UTC
- **Reserved Date**: November 30, 2023 at 10:46 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/suppliers_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**BigProf - Online Inventory Manager**
Affected versions:
- 3.2 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25016
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 13:09 UTC
- **Last Updated**: May 06, 2025 at 18:39 UTC
- **Reserved Date**: January 31, 2025 at 15:28 UTC
- **Assigned By**: elastic
### Vulnerability Description
Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Elastic - Kibana**
Affected versions:
- 7.17.0 (Status: affected)
- 8.0.0 (Status: affected)
### References
1. [](https://discuss.elastic.co/t/kibana-7-17-19-and-8-13-0-security-update-esa-2024-47/377711) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2511
- **State**: PUBLISHED
- **Published Date**: August 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 14, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69272](http://www.securityfocus.com/bid/69272)
2. [emc-cve20142511-xss(95366)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95366)
3. [20140818 ESA-2014-059: EMC Documentum Multiple Cross-Site Scripting Vulnerabilities](http://www.securityfocus.com/archive/1/533160/30/0/threaded)
4. [60561](http://secunia.com/advisories/60561)
5. [1030741](http://www.securitytracker.com/id/1030741) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1800
- **State**: PUBLISHED
- **Published Date**: August 25, 2010 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 04:05 UTC
- **Reserved Date**: May 06, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
CFNetwork in Apple Mac OS X 10.6.3 and 10.6.4 supports anonymous SSL and TLS connections, which allows man-in-the-middle attackers to redirect a connection and obtain sensitive information via crafted responses.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024359](http://securitytracker.com/id?1024359)
2. [APPLE-SA-2010-08-24-1](http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html)
3. [](http://support.apple.com/kb/HT4312) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9793
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:03 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A remote attacker may be able to cause arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211170)
2. [](https://support.apple.com/HT211168)
3. [](https://support.apple.com/HT211171)
4. [](https://support.apple.com/HT211175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4960
- **State**: PUBLISHED
- **Published Date**: September 17, 2012 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:52 UTC
- **Reserved Date**: December 23, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
SQL injection vulnerability in the Folder::findOrMake method in SilverStripe 2.3.x before 2.3.12 and 2.4.x before 2.4.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/silverstripe/sapphire/commit/fef7c32)
2. [[oss-security] 20120430 CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/1)
3. [[oss-security] 20120430 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/3)
4. [](http://doc.silverstripe.org/framework/en/trunk/changelogs/2.3.12)
5. [](http://doc.silverstripe.org/framework/en/trunk/changelogs/2.4.6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35884
- **State**: PUBLISHED
- **Published Date**: December 31, 2020 at 08:25 UTC
- **Last Updated**: August 04, 2024 at 17:16 UTC
- **Reserved Date**: December 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0031.html)
2. [FEDORA-2021-571e3ed33c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL/)
3. [FEDORA-2021-c824326120](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0121
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 06, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageCast Control Center 4.1.0 allows remote attackers to cause a denial of service (resource exhaustion or system crash) via a long string to port 12002.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010108 def-2001-01: ImageCast IC3 Control Center DoS](http://archives.neohapsis.com/archives/bugtraq/2001-01/0071.html)
2. [storagesoft-imagecast-dos(5901)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5901)
3. [2174](http://www.securityfocus.com/bid/2174) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15024
- **State**: PUBLISHED
- **Published Date**: October 04, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 19:42 UTC
- **Reserved Date**: October 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
find_abstract_instance_name in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22187)
3. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46593
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 00:00 UTC
- **Last Updated**: March 17, 2025 at 17:33 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the trapcomm parameter at cgiswm.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ink-desk-28f.notion.site/Draytek-vigor-3910-Analysis-Report-b3b23e150c4f4bab822c3c47fd7b9de9#f85d41a6875a4853be9a3c457bc81a33) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21857, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21857 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21857
- **State**: PUBLISHED
- **Published Date**: August 14, 2024 at 13:45 UTC
- **Last Updated**: August 14, 2024 at 18:05 UTC
- **Reserved Date**: January 02, 2024 at 16:55 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncontrolled search path for some Intel(R) oneAPI Compiler software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**n/a - Intel(R) oneAPI Compiler software**
Affected versions:
- before version 2024.1 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8956
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 18:39 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 20, 2019 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
### Affected Products
**UNKNOWN - Linux Kernel**
Affected versions:
- 4.20.x prior to 4.20.8 (Status: affected)
- 4.19.x prior to 4.19.21 (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21)
2. [](https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8)
3. [](https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/)
4. [](https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0)
5. [USN-3930-1](https://usn.ubuntu.com/3930-1/)
6. [USN-3930-2](https://usn.ubuntu.com/3930-2/)
7. [](https://support.f5.com/csp/article/K12671141) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24067
- **State**: REJECTED
- **Last Updated**: May 28, 2025 at 16:31 UTC
- **Reserved Date**: February 18, 2022 at 21:23 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4296
- **State**: PUBLISHED
- **Published Date**: December 06, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 13:08 UTC
- **Reserved Date**: December 06, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in TP-Link TL-WR740N. Affected is an unknown function of the component ARP Handler. The manipulation leads to resource consumption. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214812.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**TP-Link - TL-WR740N**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=D--fb-cesmA)
2. [](https://vuldb.com/?id.214812) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54957
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: March 03, 2025 at 15:54 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI 2024R1.2.2 is vulnerable to an open redirect flaw on the Tools page, exploitable by users with read-only permissions. This vulnerability allows an attacker to craft a malicious link that redirects users to an arbitrary external URL without their consent.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/products/security/)
2. [](https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33493, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33493
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 10:02 UTC
- **Last Updated**: August 02, 2024 at 02:36 UTC
- **Reserved Date**: April 23, 2024 at 09:42 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Solid Edge**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-589937.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6382
- **State**: PUBLISHED
- **Published Date**: March 02, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 11:27 UTC
- **Reserved Date**: March 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ASP Portal 3.2.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request to ASPPortal.mdb.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32889](http://secunia.com/advisories/32889)
2. [50372](http://osvdb.org/50372)
3. [7316](https://www.exploit-db.com/exploits/7316) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48617
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: October 07, 2024 at 13:51 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6466, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6466
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 03:46 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1074706)
3. [GLSA-202006-02](https://security.gentoo.org/glsa/202006-02)
4. [openSUSE-SU-2020:0823](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html)
5. [openSUSE-SU-2020:0832](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html)
6. [FEDORA-2020-08561721ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/)
7. [DSA-4714](https://www.debian.org/security/2020/dsa-4714)
8. [FEDORA-2020-77f89ab772](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2149
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 21:17 UTC
- **Last Updated**: September 16, 2024 at 22:25 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Lucent Access Point 300, 600, and 1500 Service Routers allows remote attackers to cause a denial of service (reboot) via a long HTTP request to the administrative interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020727 Phenoelit Advisory 0815 ++ // Xedia](http://online.securityfocus.com/archive/1/284649)
2. [5333](http://www.securityfocus.com/bid/5333)
3. [lucent-ap-get-dos(9705)](http://www.iss.net/security_center/static/9705.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2544
- **State**: PUBLISHED
- **Published Date**: May 22, 2017 at 04:54 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1038487](http://www.securitytracker.com/id/1038487)
2. [98474](http://www.securityfocus.com/bid/98474)
3. [](https://support.apple.com/HT207804)
4. [GLSA-201706-15](https://security.gentoo.org/glsa/201706-15)
5. [](https://support.apple.com/HT207798) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3506
- **State**: PUBLISHED
- **Published Date**: April 19, 2021 at 21:11 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: April 19, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.12.0-rc4 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1944298)
2. [](https://www.openwall.com/lists/oss-security/2021/03/28/2)
3. [](https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2520013.html)
4. [[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug](http://www.openwall.com/lists/oss-security/2021/05/08/1)
5. [](https://security.netapp.com/advisory/ntap-20210611-0007/)
6. [[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7424
- **State**: PUBLISHED
- **Published Date**: October 07, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The put_no_rnd_pixels8_xy2_mmx function in x86/rnd_template.c in libav 11.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted MP3 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=136f55207521f0b03194ef5b55ba70f1635d6aee)
2. [DSA-3685](http://www.debian.org/security/2016/dsa-3685)
3. [93038](http://www.securityfocus.com/bid/93038)
4. [[oss-security] 20160917 libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)](http://www.openwall.com/lists/oss-security/2016/09/16/17)
5. [[oss-security] 20160916 Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)](http://www.openwall.com/lists/oss-security/2016/09/17/1)
6. [[oss-security] 20160917 Re: Re: libav: NULL pointer dereference in put_no_rnd_pixels8_xy2_mmx (rnd_template.c)](http://www.openwall.com/lists/oss-security/2016/09/17/4)
7. [](https://bugzilla.libav.org/show_bug.cgi?id=962)
8. [](https://blogs.gentoo.org/ago/2016/09/17/libav-null-pointer-dereference-in-put_no_rnd_pixels8_xy2_mmx-rnd_template-c/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4935
- **State**: PUBLISHED
- **Published Date**: November 18, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 17, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the web interface in Pattern Insight 2.3 allows remote attackers to hijack the authentication of arbitrary users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [pattern-insight-csrf(79783)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79783)
2. [VU#802596](http://www.kb.cert.org/vuls/id/802596)
3. [56381](http://www.securityfocus.com/bid/56381)
4. [51203](http://secunia.com/advisories/51203) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8784
- **State**: PUBLISHED
- **Published Date**: April 13, 2016 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: January 24, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image, as demonstrated by libtiff5.tif.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html)
2. [RHSA-2016:1547](http://rhn.redhat.com/errata/RHSA-2016-1547.html)
3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html)
4. [[oss-security] 20160124 CVE Request: tiff: potential out-of-bound write in NeXTDecode()](http://www.openwall.com/lists/oss-security/2016/01/24/4)
5. [](https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c)
6. [USN-2939-1](http://www.ubuntu.com/usn/USN-2939-1)
7. [GLSA-201701-16](https://security.gentoo.org/glsa/201701-16)
8. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
9. [](http://bugzilla.maptools.org/show_bug.cgi?id=2508)
10. [RHSA-2016:1546](http://rhn.redhat.com/errata/RHSA-2016-1546.html)
11. [81696](http://www.securityfocus.com/bid/81696)
12. [[oss-security] 20160124 Re: CVE Request: tiff: potential out-of-bound write in NeXTDecode()](http://www.openwall.com/lists/oss-security/2016/01/24/8)
13. [DSA-3467](http://www.debian.org/security/2016/dsa-3467) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0817
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 11:10 UTC
- **Last Updated**: February 18, 2025 at 14:20 UTC
- **Reserved Date**: January 28, 2025 at 21:03 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The FormCraft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.9.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**FormCraft - FormCraft**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae0710a-8c9b-41b0-860f-ae79b7ed1ee4?source=cve)
2. [](https://codecanyon.net/item/formcraft-premium-wordpress-form-builder/5335056)
3. [](https://formcraft-wp.com/changelog/)
### Credits
- Khayal Farzaliyev |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1855
- **State**: PUBLISHED
- **Published Date**: March 19, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 15:20 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2013-10-22-5](http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html)
2. [[rubyonrails-security] 20130318 [CVE-2013-1855] XSS vulnerability in sanitize_css in Action Pack](https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain)
3. [openSUSE-SU-2014:0019](http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html)
4. [openSUSE-SU-2013:0662](http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html)
5. [](http://support.apple.com/kb/HT5784)
6. [RHSA-2013:0698](http://rhn.redhat.com/errata/RHSA-2013-0698.html)
7. [APPLE-SA-2013-06-04-1](http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html)
8. [openSUSE-SU-2013:0661](http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html)
9. [RHSA-2014:1863](http://rhn.redhat.com/errata/RHSA-2014-1863.html)
10. [](http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5977
- **State**: PUBLISHED
- **Published Date**: July 19, 2024 at 11:01 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 13, 2024 at 17:25 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.13.0 via the 'handleRequest' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to delete and update arbitrary posts.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**webdevmattcrom - GiveWP – Donation Plugin and Fundraising Platform**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2dca6c29-9f05-4d82-90e3-834f1dd8005a?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/give/trunk/src/DonationForms/V2/Endpoints/FormActions.php#L96)
3. [](https://plugins.trac.wordpress.org/changeset/3120745/)
### Credits
- Thanh Nam Tran |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0174
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: April 11, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
nsd on SGI IRIX before 6.5.11 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the nsd.dump file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4655](http://www.securityfocus.com/bid/4655)
2. [irix-nsd-symlink(8981)](http://www.iss.net/security_center/static/8981.php)
3. [20020501-01-I](ftp://patches.sgi.com/support/free/security/advisories/20020501-01-I) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1447
- **State**: PUBLISHED
- **Published Date**: July 08, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 21, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1020438](http://www.securitytracker.com/id?1020438)
2. [FEDORA-2008-6256](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html)
3. [SUSE-SR:2008:017](http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html)
4. [VU#800113](http://www.kb.cert.org/vuls/id/800113)
5. [31137](http://secunia.com/advisories/31137)
6. [31430](http://secunia.com/advisories/31430)
7. [](http://www.kb.cert.org/vuls/id/MIMG-7DWR4J)
8. [31169](http://secunia.com/advisories/31169)
9. [](http://www.phys.uu.nl/~rombouts/pdnsd.html)
10. [1020702](http://www.securitytracker.com/id?1020702)
11. [GLSA-201209-25](http://security.gentoo.org/glsa/glsa-201209-25.xml)
12. [ADV-2008-2052](http://www.vupen.com/english/advisories/2008/2052/references)
13. [1020561](http://www.securitytracker.com/id?1020561)
14. [](http://www.vmware.com/security/advisories/VMSA-2008-0014.html)
15. [HPSBOV03226](http://marc.info/?l=bugtraq&m=141879471518471&w=2)
16. [1020578](http://www.securitytracker.com/id?1020578)
17. [FreeBSD-SA-08:06](http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc)
18. [oval:org.mitre.oval:def:9627](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627)
19. [1020802](http://www.securitytracker.com/id?1020802)
20. [HPSBMP02404](http://marc.info/?l=bugtraq&m=123324863916385&w=2)
21. [30131](http://www.securityfocus.com/bid/30131)
22. [[4.2] 013: SECURITY FIX: July 23, 2008](http://www.openbsd.org/errata42.html#013_bind)
23. [31236](http://secunia.com/advisories/31236)
24. [APPLE-SA-2008-09-15](http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html)
25. [1020651](http://www.securitytracker.com/id?1020651)
26. [1020437](http://www.securitytracker.com/id?1020437)
27. [31209](http://secunia.com/advisories/31209)
28. [31012](http://secunia.com/advisories/31012)
29. [31151](http://secunia.com/advisories/31151)
30. [ADV-2008-2050](http://www.vupen.com/english/advisories/2008/2050/references)
31. [](http://support.citrix.com/article/CTX117991)
32. [SSRT101004](http://marc.info/?l=bugtraq&m=141879471518471&w=2)
33. [31237](http://secunia.com/advisories/31237)
34. [](http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog)
35. [APPLE-SA-2008-07-31](http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html)
36. [win-dns-client-server-spoofing(43334)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43334)
37. [31495](http://secunia.com/advisories/31495)
38. [6130](https://www.exploit-db.com/exploits/6130)
39. [20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks](http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml)
40. [1020579](http://www.securitytracker.com/id?1020579)
41. [](http://www.nominum.com/asset_upload_file741_2661.pdf)
42. [1020653](http://www.securitytracker.com/id?1020653)
43. [30998](http://secunia.com/advisories/30998)
44. [DSA-1603](http://www.debian.org/security/2008/dsa-1603)
45. [ADV-2008-2525](http://www.vupen.com/english/advisories/2008/2525)
46. [SUSE-SA:2008:033](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html)
47. [31094](http://secunia.com/advisories/31094)
48. [IZ26668](http://www.ibm.com/support/docview.wss?uid=isg1IZ26668)
49. [31687](http://secunia.com/advisories/31687)
50. [ADV-2008-2025](http://www.vupen.com/english/advisories/2008/2025/references)
51. [239392](http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1)
52. [TA08-260A](http://www.us-cert.gov/cas/techalerts/TA08-260A.html)
53. [31588](http://secunia.com/advisories/31588)
54. [31019](http://secunia.com/advisories/31019)
55. [ADV-2008-2029](http://www.vupen.com/english/advisories/2008/2029/references)
56. [SSRT080058](http://marc.info/?l=bugtraq&m=121630706004256&w=2)
57. [6123](https://www.exploit-db.com/exploits/6123)
58. [IZ26671](http://www.ibm.com/support/docview.wss?uid=isg1IZ26671)
59. [FEDORA-2008-6281](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html)
60. [ADV-2008-2268](http://www.vupen.com/english/advisories/2008/2268)
61. [ADV-2009-0297](http://www.vupen.com/english/advisories/2009/0297)
62. [HPSBUX02351](http://marc.info/?l=bugtraq&m=121630706004256&w=2)
63. [31207](http://secunia.com/advisories/31207)
64. [31031](http://secunia.com/advisories/31031)
65. [ADV-2008-2584](http://www.vupen.com/english/advisories/2008/2584)
66. [31451](http://secunia.com/advisories/31451)
67. [ADV-2008-2051](http://www.vupen.com/english/advisories/2008/2051/references)
68. [30977](http://secunia.com/advisories/30977)
69. [RHSA-2008:0789](http://www.redhat.com/support/errata/RHSA-2008-0789.html)
70. [ADV-2008-2377](http://www.vupen.com/english/advisories/2008/2377)
71. [HPSBNS02405](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368)
72. [1020558](http://www.securitytracker.com/id?1020558)
73. [31221](http://secunia.com/advisories/31221)
74. [RHSA-2008:0533](http://rhn.redhat.com/errata/RHSA-2008-0533.html)
75. [[4.3] 004: SECURITY FIX: July 23, 2008](http://www.openbsd.org/errata43.html#004_bind)
76. [1020804](http://www.securitytracker.com/id?1020804)
77. [31143](http://secunia.com/advisories/31143)
78. [20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability](http://www.securityfocus.com/archive/1/495289/100/0/threaded)
79. [ADV-2008-2195](http://www.vupen.com/english/advisories/2008/2195/references)
80. [ADV-2008-2196](http://www.vupen.com/english/advisories/2008/2196/references)
81. [33714](http://secunia.com/advisories/33714)
82. [HPSBTU02358](http://marc.info/?l=bugtraq&m=121866517322103&w=2)
83. [33786](http://secunia.com/advisories/33786)
84. [1020448](http://www.securitytracker.com/id?1020448)
85. [31882](http://secunia.com/advisories/31882)
86. [ADV-2008-2384](http://www.vupen.com/english/advisories/2008/2384)
87. [IZ26669](http://www.ibm.com/support/docview.wss?uid=isg1IZ26669)
88. [](http://up2date.astaro.com/2008/08/up2date_7202_released.html)
89. [ADV-2008-2123](http://www.vupen.com/english/advisories/2008/2123/references)
90. [](http://support.apple.com/kb/HT3026)
91. [31014](http://secunia.com/advisories/31014)
92. [30979](http://secunia.com/advisories/30979)
93. [1020575](http://www.securitytracker.com/id?1020575)
94. [](http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/)
95. [ADV-2008-2482](http://www.vupen.com/english/advisories/2008/2482)
96. [IZ26672](http://www.ibm.com/support/docview.wss?uid=isg1IZ26672)
97. [](http://support.apple.com/kb/HT3129)
98. [DSA-1619](http://www.debian.org/security/2008/dsa-1619)
99. [ADV-2008-2166](http://www.vupen.com/english/advisories/2008/2166/references)
100. [31072](http://secunia.com/advisories/31072)
101. [ADV-2008-2139](http://www.vupen.com/english/advisories/2008/2139/references)
102. [oval:org.mitre.oval:def:5761](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761)
103. [ADV-2008-2092](http://www.vupen.com/english/advisories/2008/2092/references)
104. [31482](http://secunia.com/advisories/31482)
105. [IZ26670](http://www.ibm.com/support/docview.wss?uid=isg1IZ26670)
106. [MDVSA-2008:139](http://www.mandriva.com/security/advisories?name=MDVSA-2008:139)
107. [oval:org.mitre.oval:def:5917](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917)
108. [30989](http://secunia.com/advisories/30989)
109. [ADV-2008-2055](http://www.vupen.com/english/advisories/2008/2055/references)
110. [SSRT071449](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368)
111. [](http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152)
112. [](http://www.ipcop.org/index.php?name=News&file=article&sid=40)
113. [31065](http://secunia.com/advisories/31065)
114. [31254](http://secunia.com/advisories/31254)
115. [20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.](http://www.securityfocus.com/archive/1/495869/100/0/threaded)
116. [](http://www.doxpara.com/?p=1176)
117. [NetBSD-SA2008-009](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc)
118. [USN-627-1](http://www.ubuntu.com/usn/usn-627-1)
119. [ADV-2010-0622](http://www.vupen.com/english/advisories/2010/0622)
120. [1020576](http://www.securitytracker.com/id?1020576)
121. [](http://www.isc.org/index.pl?/sw/bind/bind-security.php)
122. [HPSBOV02357](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520)
123. [31153](http://secunia.com/advisories/31153)
124. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231)
125. [ADV-2008-2549](http://www.vupen.com/english/advisories/2008/2549)
126. [IZ26667](http://www.ibm.com/support/docview.wss?uid=isg1IZ26667)
127. [](http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html)
128. [31213](http://secunia.com/advisories/31213)
129. [31030](http://secunia.com/advisories/31030)
130. [USN-622-1](http://www.ubuntu.com/usn/usn-622-1)
131. [31033](http://secunia.com/advisories/31033)
132. [](http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html)
133. [1020440](http://www.securitytracker.com/id?1020440)
134. [APPLE-SA-2008-09-12](http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html)
135. [](http://www.doxpara.com/DMK_BO2K8.ppt)
136. [20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.](http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html)
137. [DSA-1604](http://www.debian.org/security/2008/dsa-1604)
138. [31823](http://secunia.com/advisories/31823)
139. [31326](http://secunia.com/advisories/31326)
140. [ADV-2008-2558](http://www.vupen.com/english/advisories/2008/2558)
141. [6122](https://www.exploit-db.com/exploits/6122)
142. [oval:org.mitre.oval:def:5725](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725)
143. [](http://www.caughq.org/exploits/CAU-EX-2008-0003.txt)
144. [cisco-multiple-dns-cache-poisoning(43637)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43637)
145. [ADV-2008-2383](http://www.vupen.com/english/advisories/2008/2383)
146. [1020560](http://www.securitytracker.com/id?1020560)
147. [31900](http://secunia.com/advisories/31900)
148. [](http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q)
149. [](http://support.citrix.com/article/CTX118183)
150. [30925](http://secunia.com/advisories/30925)
151. [ADV-2009-0311](http://www.vupen.com/english/advisories/2009/0311)
152. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018)
153. [DSA-1623](http://www.debian.org/security/2008/dsa-1623)
154. [ADV-2008-2582](http://www.vupen.com/english/advisories/2008/2582)
155. [](http://www.caughq.org/exploits/CAU-EX-2008-0002.txt)
156. [DSA-1605](http://www.debian.org/security/2008/dsa-1605)
157. [](http://www.novell.com/support/viewContent.do?externalId=7000912)
158. [](http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning)
159. [ADV-2008-2342](http://www.vupen.com/english/advisories/2008/2342)
160. [ADV-2008-2114](http://www.vupen.com/english/advisories/2008/2114/references)
161. [30973](http://secunia.com/advisories/30973)
162. [31204](http://secunia.com/advisories/31204)
163. [31354](http://secunia.com/advisories/31354)
164. [GLSA-200812-17](http://security.gentoo.org/glsa/glsa-200812-17.xml)
165. [oval:org.mitre.oval:def:12117](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117)
166. [33178](http://secunia.com/advisories/33178)
167. [30988](http://secunia.com/advisories/30988)
168. [APPLE-SA-2008-09-09](http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html)
169. [31011](http://secunia.com/advisories/31011)
170. [](http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html)
171. [ADV-2008-2334](http://www.vupen.com/english/advisories/2008/2334)
172. [1020577](http://www.securitytracker.com/id?1020577)
173. [31422](http://secunia.com/advisories/31422)
174. [31197](http://secunia.com/advisories/31197)
175. [1020548](http://www.securitytracker.com/id?1020548)
176. [ADV-2008-2467](http://www.vupen.com/english/advisories/2008/2467)
177. [240048](http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1)
178. [TA08-190B](http://www.us-cert.gov/cas/techalerts/TA08-190B.html)
179. [TA08-190A](http://www.us-cert.gov/cas/techalerts/TA08-190A.html)
180. [GLSA-200807-08](http://security.gentoo.org/glsa/glsa-200807-08.xml)
181. [31022](http://secunia.com/advisories/31022)
182. [SSA:2008-191](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239)
183. [1020449](http://www.securitytracker.com/id?1020449)
184. [31093](http://secunia.com/advisories/31093)
185. [31052](http://secunia.com/advisories/31052)
186. [30980](http://secunia.com/advisories/30980)
187. [SSA:2008-205-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680)
188. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401)
189. [31199](http://secunia.com/advisories/31199)
190. [ADV-2008-2030](http://www.vupen.com/english/advisories/2008/2030/references)
191. [ADV-2008-2291](http://www.vupen.com/english/advisories/2008/2291)
192. [ADV-2008-2023](http://www.vupen.com/english/advisories/2008/2023/references)
193. [SSRT090014](http://marc.info/?l=bugtraq&m=123324863916385&w=2)
194. [ADV-2008-2466](http://www.vupen.com/english/advisories/2008/2466)
195. [MS08-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037)
196. [31212](http://secunia.com/advisories/31212)
197. [ADV-2008-2113](http://www.vupen.com/english/advisories/2008/2113/references)
198. [31152](http://secunia.com/advisories/31152)
199. [ADV-2008-2019](http://www.vupen.com/english/advisories/2008/2019/references)
200. [ADV-2008-2197](http://www.vupen.com/english/advisories/2008/2197/references) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11821
- **State**: PUBLISHED
- **Published Date**: April 27, 2020 at 14:19 UTC
- **Last Updated**: August 04, 2024 at 11:42 UTC
- **Reserved Date**: April 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://fatihhcelik.blogspot.com/2020/01/rukovoditel-password-hash-in-cookie-url.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0579
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34125463. References: QC-CR#1115406.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-04-01)
2. [97339](http://www.securityfocus.com/bid/97339)
3. [1038201](http://www.securitytracker.com/id/1038201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49666
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 13:40 UTC
- **Last Updated**: January 21, 2025 at 14:34 UTC
- **Reserved Date**: October 17, 2024 at 09:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound ARPrice allows SQL Injection. This issue affects ARPrice: from n/a through 4.0.3.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**NotFound - ARPrice**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/arprice/vulnerability/wordpress-arprice-plugin-4-0-3-sql-injection-vulnerability?_s_id=cve)
### Credits
- Bonds (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4527
- **State**: PUBLISHED
- **Published Date**: December 31, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: December 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Shibboleth authentication module 5.x before 5.x-3.4 and 6.x before 6.x-3.2, a module for Drupal, does not properly remove statically granted privileges after a logout or other session change, which allows physically proximate attackers to gain privileges by using an unattended web browser.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36684](http://www.securityfocus.com/bid/36684)
2. [37057](http://secunia.com/advisories/37057)
3. [shibboleth-saml2-priv-escalation(53779)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53779)
4. [](http://drupal.org/node/604488)
5. [ADV-2009-2919](http://www.vupen.com/english/advisories/2009/2919) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5419
- **State**: PUBLISHED
- **Published Date**: August 10, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 01:01 UTC
- **Reserved Date**: June 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:2575](http://rhn.redhat.com/errata/RHSA-2016-2575.html)
2. [92319](http://www.securityfocus.com/bid/92319)
3. [92292](http://www.securityfocus.com/bid/92292)
4. [](https://curl.haxx.se/docs/adv_20160803A.html)
5. [RHSA-2018:3558](https://access.redhat.com/errata/RHSA-2018:3558)
6. [](https://source.android.com/security/bulletin/2016-12-01.html)
7. [1038341](http://www.securitytracker.com/id/1038341)
8. [SSA:2016-219-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059)
9. [DSA-3638](http://www.debian.org/security/2016/dsa-3638)
10. [1036538](http://www.securitytracker.com/id/1036538)
11. [openSUSE-SU-2016:2227](http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html)
12. [](https://www.tenable.com/security/tns-2016-18)
13. [openSUSE-SU-2016:2379](http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html)
14. [FEDORA-2016-24316f1f56](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/)
15. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
16. [FEDORA-2016-8354baae0f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/)
17. [RHSA-2016:2957](http://rhn.redhat.com/errata/RHSA-2016-2957.html)
18. [GLSA-201701-47](https://security.gentoo.org/glsa/201701-47)
19. [USN-3048-1](http://www.ubuntu.com/usn/USN-3048-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34356
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 14:05 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 02, 2024 at 06:36 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TYPO3 is an enterprise content management system. Starting in version 9.0.0 and prior to versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, and 13.1.1, the form manager backend module is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to the form module. TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, and 13.1.1 fix the problem described.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**TYPO3 - typo3**
Affected versions:
- >= 9.0.0, < 9.5.48 (Status: affected)
- >= 10.0.0, < 10.4.45 (Status: affected)
- >= 11.0.0, < 11.5.37 (Status: affected)
- >= 12.0.0, < 12.4.15 (Status: affected)
- >= 13.0.0, < 13.1.1 (Status: affected)
### References
1. [https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3](https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3)
2. [https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156](https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156)
3. [https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5](https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5)
4. [https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64](https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64)
5. [https://typo3.org/security/advisory/typo3-core-sa-2024-008](https://typo3.org/security/advisory/typo3-core-sa-2024-008) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3868, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3868
- **State**: PUBLISHED
- **Published Date**: September 11, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Active Directory Lightweight Directory Service (AD LDS) on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 8 and Active Directory Services on Windows Server 2008 SP2 and R2 SP1 and Server 2012 allow remote attackers to cause a denial of service (LDAP directory-service outage) via a crafted LDAP query, aka "Remote Anonymous DoS Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS13-079](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-079)
2. [TA13-253A](http://www.us-cert.gov/ncas/alerts/TA13-253A) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20216
- **State**: PUBLISHED
- **Published Date**: January 29, 2020 at 02:28 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because REMOTE_PORT is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147)
2. [](https://medium.com/%40s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae)
3. [](https://medium.com/%40s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12636
- **State**: PUBLISHED
- **Published Date**: June 22, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The iThemes Security (better-wp-security) plugin before 7.0.3 for WordPress allows SQL Injection (by attackers with Admin privileges) via the logs page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [44943](https://www.exploit-db.com/exploits/44943/)
2. [](https://wordpress.org/plugins/better-wp-security/#developers)
3. [[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list](https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2377
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: May 15, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.