System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4048, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4048 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4048 - **State**: PUBLISHED - **Published Date**: July 30, 2007 at 16:00 UTC - **Last Updated**: August 07, 2024 at 14:37 UTC - **Reserved Date**: July 30, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in index.php in phpSysInfo 2.5.4-dev and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070725 PHPSysInfo Index.php Cross Site Scripting](http://www.securityfocus.com/archive/1/474756/100/0/threaded) 2. [](http://sourceforge.net/project/shownotes.php?release_id=532143) 3. [](http://download.phpgroupware.org/) 4. [25090](http://www.securityfocus.com/bid/25090) 5. [26473](http://secunia.com/advisories/26473) 6. [26248](http://secunia.com/advisories/26248) 7. [2952](http://securityreason.com/securityalert/2952) 8. [36601](http://osvdb.org/36601)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0567 - **State**: PUBLISHED - **Published Date**: January 19, 2025 at 07:31 UTC - **Last Updated**: January 21, 2025 at 15:06 UTC - **Reserved Date**: January 18, 2025 at 08:51 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as problematic was found in Epic Games Launcher up to 17.2.1. This vulnerability affects unknown code in the library profapi.dll of the component Installer. The manipulation leads to untrusted search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult. ### CVSS Metrics - **CVSS Base Score**: 4.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-426: Security Weakness ### Affected Products **Epic Games - Launcher** Affected versions: - 17.2.0 (Status: affected) - 17.2.1 (Status: affected) ### References 1. [VDB-292528 | Epic Games Launcher Installer profapi.dll untrusted search path](https://vuldb.com/?id.292528) 2. [VDB-292528 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.292528) 3. [Submit #481104 | Epic Games Epic Games Launcher 17.2.1 OS Command Injection](https://vuldb.com/?submit.481104) ### Credits - Havook (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16307 - **State**: PUBLISHED - **Published Date**: September 14, 2019 at 16:19 UTC - **Last Updated**: August 05, 2024 at 01:10 UTC - **Reserved Date**: September 14, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKey parameter (deleteWebExMeetingCheck.jsp). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gist.github.com/izadgot/3efc75f62f9c9567c8f11bad74165425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54427 - **State**: PUBLISHED - **Published Date**: December 16, 2024 at 14:13 UTC - **Last Updated**: December 16, 2024 at 20:02 UTC - **Reserved Date**: December 02, 2024 at 12:06 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Linda MacPhee-Cobb Category of Posts allows Stored XSS.This issue affects Category of Posts: from n/a through 1.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Linda MacPhee-Cobb - Category of Posts** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/list-one-category-of-posts/vulnerability/wordpress-category-of-posts-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16294, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16294 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16294 - **State**: PUBLISHED - **Published Date**: August 13, 2020 at 02:08 UTC - **Last Updated**: August 04, 2024 at 13:37 UTC - **Reserved Date**: August 03, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.ghostscript.com/show_bug.cgi?id=701794) 2. [](https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=89f58f1aa95b3482cadf6977da49457194ee5358) 3. [[debian-lts-announce] 20200820 [SECURITY] [DLA 2335-1] ghostscript security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html) 4. [DSA-4748](https://www.debian.org/security/2020/dsa-4748) 5. [GLSA-202008-20](https://security.gentoo.org/glsa/202008-20) 6. [USN-4469-1](https://usn.ubuntu.com/4469-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27930 - **State**: PUBLISHED - **Published Date**: December 08, 2020 at 20:17 UTC - **Last Updated**: January 29, 2025 at 17:35 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution. ### Affected Products **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT211931) 2. [](https://support.apple.com/en-us/HT211928) 3. [](https://support.apple.com/en-us/HT211929) 4. [](https://support.apple.com/en-us/HT211940) 5. [](https://support.apple.com/en-us/HT211944) 6. [](https://support.apple.com/en-us/HT211945) 7. [](https://support.apple.com/en-us/HT211946) 8. [](https://support.apple.com/en-us/HT211947) 9. [20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1](http://seclists.org/fulldisclosure/2020/Dec/32) 10. [](http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29117, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29117 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29117 - **State**: PUBLISHED - **Published Date**: March 19, 2024 at 14:52 UTC - **Last Updated**: August 02, 2024 at 01:03 UTC - **Reserved Date**: March 15, 2024 at 14:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.7.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cimatti Consulting - Contact Forms by Cimatti** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/contact-forms/wordpress-contact-forms-by-cimatti-plugin-1-7-0-unauthenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34947, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34947 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34947 - **State**: PUBLISHED - **Published Date**: August 02, 2022 at 02:54 UTC - **Last Updated**: August 03, 2024 at 09:22 UTC - **Reserved Date**: July 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at editcategory.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.yuque.com/jiryu/yz4rcd/tcug0q)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-4182, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-4182 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-4182 - **State**: PUBLISHED - **Published Date**: June 03, 2020 at 14:30 UTC - **Last Updated**: September 16, 2024 at 22:36 UTC - **Reserved Date**: December 30, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Guardium 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174738. ### Affected Products **IBM - Security Guardium** Affected versions: - 11.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6218964) 2. [ibm-guardium-cve20204182-xss (174738)](https://exchange.xforce.ibmcloud.com/vulnerabilities/174738)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5758 - **State**: REJECTED - **Published Date**: June 11, 2021 at 21:00 UTC - **Last Updated**: June 11, 2021 at 21:00 UTC - **Reserved Date**: February 01, 2017 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4666 - **State**: PUBLISHED - **Published Date**: October 22, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 10:24 UTC - **Reserved Date**: October 21, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in webboard.php in Ultimate Webboard 3.00 allows remote attackers to execute arbitrary SQL commands via the Category parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4467](http://securityreason.com/securityalert/4467) 2. [31424](http://www.securityfocus.com/bid/31424) 3. [6576](https://www.exploit-db.com/exploits/6576) 4. [ultimatewebboard-webboard-sql-injection(45469)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45469)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0638, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0638 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0638 - **State**: PUBLISHED - **Published Date**: April 21, 2016 at 10:00 UTC - **Last Updated**: October 15, 2024 at 19:17 UTC - **Reserved Date**: December 09, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, 12.1.3, and 12.2.1 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Messaging Service. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2016-09) 2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html) 3. [1035615](http://www.securitytracker.com/id/1035615)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0235, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0235 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0235 - **State**: PUBLISHED - **Published Date**: May 07, 2003 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:43 UTC - **Reserved Date**: May 01, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Format string vulnerability in POP3 client for Mirabilis ICQ Pro 2003a allows remote malicious servers to execute arbitrary code via format strings in the response to a UIDL command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030505 CORE-2003-0303: Multiple Vulnerabilities in Mirabilis ICQ client](http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html) 2. [7461](http://www.securityfocus.com/bid/7461) 3. [](http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10) 4. [20030505 CORE-2003-0303: Multiple Vulnerabilities in Mirabilis ICQ client](http://marc.info/?l=bugtraq&m=105216842131995&w=2) 5. [icq-pop3-format-string(11938)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11938)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1706, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1706 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1706 - **State**: PUBLISHED - **Published Date**: June 10, 2009 at 17:37 UTC - **Last Updated**: August 07, 2024 at 05:20 UTC - **Reserved Date**: May 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Private Browsing feature in Apple Safari before 4.0 on Windows does not remove cookies from the alternate cookie store in unspecified circumstances upon (1) disabling of the feature or (2) exit of the application, which makes it easier for remote web servers to track users via a cookie. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2009-06-08-1](http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html) 2. [35260](http://www.securityfocus.com/bid/35260) 3. [ADV-2009-1522](http://www.vupen.com/english/advisories/2009/1522) 4. [54997](http://osvdb.org/54997) 5. [35379](http://secunia.com/advisories/35379) 6. [35346](http://www.securityfocus.com/bid/35346) 7. [](http://support.apple.com/kb/HT3613)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31177, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31177 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31177 - **State**: PUBLISHED - **Published Date**: September 18, 2024 at 13:56 UTC - **Last Updated**: September 18, 2024 at 17:18 UTC - **Reserved Date**: March 29, 2024 at 08:24 UTC - **Assigned By**: Nozomi ### Vulnerability Description Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg modules). This vulnerability is associated with program routines fluid_msg::of13::TableFeaturePropActions::unpack. This issue affects libfluid: 0.1.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Open Networking Foundation (ONF) - libfluid** Affected versions: - 0.1.0 (Status: affected) ### References 1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-25037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-25037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-25037 - **State**: PUBLISHED - **Published Date**: April 27, 2021 at 05:17 UTC - **Last Updated**: November 19, 2024 at 14:58 UTC - **Reserved Date**: April 27, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/) 2. [[debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update](https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html) 3. [](https://security.netapp.com/advisory/ntap-20210507-0007/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7765 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 16:12 UTC - **Reserved Date**: April 12, 2017 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [99057](http://www.securityfocus.com/bid/99057) 2. [](https://www.mozilla.org/security/advisories/mfsa2017-15/) 3. [1038689](http://www.securitytracker.com/id/1038689) 4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1273265) 5. [](https://www.mozilla.org/security/advisories/mfsa2017-17/) 6. [](https://www.mozilla.org/security/advisories/mfsa2017-16/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3647, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3647 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3647 - **State**: PUBLISHED - **Published Date**: September 08, 2020 at 09:31 UTC - **Last Updated**: August 04, 2024 at 07:37 UTC - **Reserved Date**: December 17, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description u'Potential buffer overflow when accessing npu debugfs node "off"/"log" with large buffer size' in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, QCS405, SC8180X, SDX55, SM6150, SM7150, SM8150 ### Affected Products **Qualcomm, Inc. - Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music** Affected versions: - MDM9607, QCS405, SC8180X, SDX55, SM6150, SM7150, SM8150 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2605, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2605 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2605 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: February 26, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27199 - **State**: PUBLISHED - **Published Date**: December 17, 2020 at 04:07 UTC - **Last Updated**: August 04, 2024 at 16:11 UTC - **Reserved Date**: October 18, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correct password to gain access to the mobile application as that victim user. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/magic-home-pro-mobile-application-authentication-bypass-cve-2020-27199/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46421, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46421 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46421 - **State**: PUBLISHED - **Published Date**: April 27, 2022 at 10:45 UTC - **Last Updated**: August 04, 2024 at 05:02 UTC - **Reserved Date**: January 24, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Franklin Fueling Systems FFS T5 Series 1.8.7.7299 is affected by an unauthenticated directory traversal vulnerability, which allows an attacker to obtain sensitive information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/file/d/17y764rRfgab2EhYMEqCIYh__5sOTigqe/view?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29676, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29676 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29676 - **State**: PUBLISHED - **Published Date**: May 26, 2022 at 13:27 UTC - **Last Updated**: August 03, 2024 at 06:26 UTC - **Reserved Date**: April 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/lists/zhuan. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/chshcms/cscms/issues/24#issue-1207646618)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18635, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18635 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18635 - **State**: PUBLISHED - **Published Date**: September 25, 2019 at 22:59 UTC - **Last Updated**: August 05, 2024 at 21:28 UTC - **Reserved Date**: September 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/novnc/noVNC/issues/748) 2. [](https://github.com/novnc/noVNC/releases/tag/v0.6.2) 3. [](https://bugs.launchpad.net/horizon/+bug/1656435) 4. [](https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534) 5. [[debian-lts-announce] 20191005 [SECURITY] [DLA 1946-1] novnc security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html) 6. [](https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/) 7. [](https://github.com/ShielderSec/cve-2017-18635) 8. [RHSA-2020:0754](https://access.redhat.com/errata/RHSA-2020:0754) 9. [USN-4522-1](https://usn.ubuntu.com/4522-1/) 10. [[debian-lts-announce] 20211228 [SECURITY] [DLA 2854-1] novnc security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1981, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1981 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1981 - **State**: PUBLISHED - **Published Date**: April 21, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 17:35 UTC - **Reserved Date**: April 21, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Java InputMethods on Mac OS X 10.4.5 may cause InputMethods to send input events for secure fields to the wrong text field, which might reveal the password to others who can view the screen. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [macosx-java-inputmethods-info-disclosure(26167)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26167) 2. [ADV-2006-1398](http://www.vupen.com/english/advisories/2006/1398) 3. [](http://docs.info.apple.com/article.html?artnum=303658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30106, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30106 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30106 - **State**: PUBLISHED - **Published Date**: April 25, 2023 at 00:00 UTC - **Last Updated**: February 03, 2025 at 17:28 UTC - **Reserved Date**: April 07, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Sourcecodester Medicine Tracker System in PHP 1.0.0 is vulnerable to Cross Site Scripting (XSS) via page=about. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.sourcecodester.com) 2. [](https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip) 3. [](https://github.com/Rajeshwar40/CVE/blob/main/2023-30106)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-22661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-22661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-22661 - **State**: PUBLISHED - **Published Date**: January 20, 2023 at 00:00 UTC - **Last Updated**: April 03, 2025 at 17:54 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.ruckuswireless.com/security_bulletins/302) 2. [](https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5566 - **State**: PUBLISHED - **Published Date**: November 08, 2013 at 02:00 UTC - **Last Updated**: September 16, 2024 at 17:14 UTC - **Reserved Date**: August 22, 2013 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco NX-OS 5.0 and earlier on MDS 9000 devices allows remote attackers to cause a denial of service (supervisor CPU consumption) via Authentication Header (AH) authentication in a Virtual Router Redundancy Protocol (VRRP) frame, aka Bug ID CSCte27874. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20131106 Cisco MDS Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5566) 2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=31663)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4055, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4055 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4055 - **State**: PUBLISHED - **Published Date**: April 19, 2019 at 16:20 UTC - **Last Updated**: September 17, 2024 at 04:14 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, and 9.1.0.0 through 9.1.1 is vulnerable to a denial of service attack within the TLS key renegotiation function. IBM X-Force ID: 156564. ### Affected Products **IBM - MQ** Affected versions: - 9.0.0.1 (Status: affected) - 8.0.0.1 (Status: affected) - 8.0.0.2 (Status: affected) - 8.0.0.3 (Status: affected) - 8.0.0.4 (Status: affected) - 8.0.0.5 (Status: affected) - 8.0.0.6 (Status: affected) - 8.0.0.7 (Status: affected) - 9.0.0.2 (Status: affected) - 8.0.0.8 (Status: affected) - 8.0.0.9 (Status: affected) - 9.0.0.3 (Status: affected) - 8.0.0.0 (Status: affected) - 8.0.0.10 (Status: affected) - 9.0.0.0 (Status: affected) - 9.0.0.4 (Status: affected) - 9.0.0.5 (Status: affected) - 9.1.0.0 (Status: affected) - 9.1.0.1 (Status: affected) - 9.1.1 (Status: affected) ### References 1. [](https://www.ibm.com/support/docview.wss?uid=ibm10870484) 2. [ibm-websphere-cve20194055-dos (156564)](https://exchange.xforce.ibmcloud.com/vulnerabilities/156564) 3. [108027](http://www.securityfocus.com/bid/108027)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28964, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28964 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28964 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 01:13 UTC - **Last Updated**: August 03, 2024 at 06:10 UTC - **Reserved Date**: April 11, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/netero1010/Vulnerability-Disclosure/tree/main/CVE-2022-AVAST1) 2. [](https://forum.avast.com/index.php?topic=317641.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1444, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1444 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1444 - **State**: REJECTED - **Last Updated**: February 16, 2024 at 16:57 UTC - **Reserved Date**: February 12, 2024 at 14:24 UTC - **Assigned By**: Wordfence ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0406 - **State**: PUBLISHED - **Published Date**: April 20, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 18:23 UTC - **Reserved Date**: January 09, 2012 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description The DPA_Utilities.cProcessAuthenticationData function in EMC Data Protection Advisor (DPA) 5.5 through 5.8 SP1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an AUTHENTICATECONNECTION command that (1) lacks a password field or (2) has an empty password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20120418 ESA-2012-018: EMC Data Protection Advisor Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/522408/30/0/threaded) 2. [18688](http://www.exploit-db.com/exploits/18688/) 3. [1026956](http://www.securitytracker.com/id?1026956) 4. [](http://aluigi.altervista.org/adv/dpa_1-adv.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1135, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1135 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1135 - **State**: PUBLISHED - **Published Date**: May 25, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 03:51 UTC - **Reserved Date**: December 04, 2017 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An issue was discovered in Moodle 3.x. Students who posted on forums and exported the posts to portfolios can download any stored Moodle file by changing the download URL. ### Affected Products **n/a - Moodle 3.x unknown** Affected versions: - Moodle 3.x unknown (Status: affected) ### References 1. [](https://moodle.org/mod/forum/discuss.php?d=371201) 2. [104307](http://www.securityfocus.com/bid/104307)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-49314, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-49314 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-49314 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 12:53 UTC - **Last Updated**: June 06, 2025 at 19:23 UTC - **Reserved Date**: June 04, 2025 at 09:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ovatheme BRW allows Stored XSS. This issue affects BRW: from n/a through 1.8.6. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ovatheme - BRW** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ova-brw/vulnerability/wordpress-brw-1-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Phat RiO - BlueRock (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4524 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 06:39 UTC - **Last Updated**: May 21, 2025 at 10:15 UTC - **Reserved Date**: May 10, 2025 at 00:09 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Madara – Responsive and modern WordPress theme for manga sites theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.2 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **WPStylish - Madara – Responsive and modern WordPress theme for manga sites** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a3ee01da-218a-421d-8f9c-1dc6c056ef74?source=cve) 2. [](https://mangabooth.com/product/wp-manga-theme-madara/) ### Credits - Kyle Bouchard
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2829, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2829 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2829 - **State**: PUBLISHED - **Published Date**: November 10, 2009 at 19:00 UTC - **Last Updated**: August 07, 2024 at 06:07 UTC - **Reserved Date**: August 17, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Event Monitor in Apple Mac OS X 10.5.8 does not properly handle crafted authentication data sent to an SSH daemon, which allows remote attackers to cause a denial of service via vectors involving processing of XML log documents by other services, related to a "log injection" issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36956](http://www.securityfocus.com/bid/36956) 2. [ADV-2009-3184](http://www.vupen.com/english/advisories/2009/3184) 3. [APPLE-SA-2009-11-09-1](http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html) 4. [](http://support.apple.com/kb/HT3937)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20764 - **State**: PUBLISHED - **Published Date**: February 08, 2019 at 17:00 UTC - **Last Updated**: August 05, 2024 at 12:12 UTC - **Reserved Date**: February 08, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow exists in HelpSystems tcpcrypt on Linux, used for BoKS encrypted telnet through BoKS version 6.7.1. Since tcpcrypt is setuid, exploitation leads to privilege escalation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3917, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3917 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3917 - **State**: PUBLISHED - **Published Date**: October 10, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 00:10 UTC - **Reserved Date**: March 30, 2016 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description The fingerprint login feature in Android 6.0.1 before 2016-10-01 and 7.0 before 2016-10-01 does not track the user account during the authentication process, which allows physically proximate attackers to authenticate as an arbitrary user by leveraging lockscreen access, aka internal bug 30744668. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [93298](http://www.securityfocus.com/bid/93298) 2. [](http://source.android.com/security/bulletin/2016-10-01.html) 3. [](https://android.googlesource.com/platform/frameworks/base/+/f5334952131afa835dd3f08601fb3bced7b781cd)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2955 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 13:29 UTC - **Last Updated**: September 27, 2024 at 18:46 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle FLEXCUBE Core Banking product of Oracle Financial Services Applications (component: Transaction Processing). The supported version that is affected is 4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Core Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Core Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Core Banking. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). ### Affected Products **Oracle Corporation - FLEXCUBE Core Banking** Affected versions: - 4.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-32190, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-32190 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-32190 - **State**: PUBLISHED - **Published Date**: September 13, 2022 at 17:08 UTC - **Last Updated**: August 03, 2024 at 07:32 UTC - **Reserved Date**: May 31, 2022 at 00:00 UTC - **Assigned By**: Go ### Vulnerability Description JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result. ### Affected Products **Go standard library - net/url** Affected versions: - 1.19.0-0 (Status: affected) ### References 1. [](https://groups.google.com/g/golang-announce/c/x49AQzIVX-s) 2. [](https://go.dev/issue/54385) 3. [](https://go.dev/cl/423514) 4. [](https://pkg.go.dev/vuln/GO-2022-0988) ### Credits - @q0jt
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6877 - **State**: PUBLISHED - **Published Date**: March 14, 2017 at 09:02 UTC - **Last Updated**: August 05, 2024 at 15:41 UTC - **Reserved Date**: March 14, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in SVG file handling in Lutim 0.7.1 and earlier allows remote attackers to inject arbitrary web script. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://framagit.org/luc/lutim/issues/38) 2. [](https://framagit.org/luc/lutim/commit/4c0df8f8b10122339b908dcd9b1117348b49dcab) 3. [96855](http://www.securityfocus.com/bid/96855)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-23973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-23973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-23973 - **State**: PUBLISHED - **Published Date**: August 27, 2020 at 13:21 UTC - **Last Updated**: August 04, 2024 at 15:05 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description KandNconcepts Club CMS 1.1 and 1.2 has SQL Injection via the 'team.php,player.php,club.php' id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50464 - **State**: PUBLISHED - **Published Date**: October 28, 2024 at 17:46 UTC - **Last Updated**: October 28, 2024 at 19:44 UTC - **Reserved Date**: October 24, 2024 at 07:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Pierre Lebedel - Kodex Posts likes** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/kodex-posts-likes/wordpress-kodex-posts-likes-plugin-2-5-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve) ### Credits - theviper17 (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0693, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0693 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0693 - **State**: PUBLISHED - **Published Date**: February 15, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:41 UTC - **Reserved Date**: February 15, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in rb_auth.php in Roberto Butti CALimba 0.99.2 beta and earlier allow remote attackers to execute arbitrary SQL commands and bypass login authentication via the (1) login and (2) password parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [16632](http://www.securityfocus.com/bid/16632) 2. [calimba-rbauth-sql-injection(24578)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24578) 3. [](http://www.evuln.com/vulns/68/summary.html) 4. [20060217 [eVuln] CALimba Authentication Bypass Vulnerability](http://www.securityfocus.com/archive/1/425364/100/0/threaded) 5. [ADV-2006-0523](http://www.vupen.com/english/advisories/2006/0523) 6. [453](http://securityreason.com/securityalert/453) 7. [18856](http://secunia.com/advisories/18856)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35655, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35655 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35655 - **State**: PUBLISHED - **Published Date**: August 22, 2022 at 14:47 UTC - **Last Updated**: August 03, 2024 at 09:36 UTC - **Reserved Date**: July 12, 2022 at 00:00 UTC - **Assigned By**: Pega ### Vulnerability Description Pega Platform from 7.3 to 8.7.3 is affected by an XSS issue due to a misconfiguration of a datapage setting. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Pegasystems - Pega Infinity** Affected versions: - 7.3 (Status: affected) - unspecified (Status: affected) ### References 1. [](https://support.pega.com/support-doc/pega-security-advisory-d22-e22-f22-vulnerabilities-%E2%80%93-hotfix-matrix) ### Credits - Kane Gamble from Blackfoot UK
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10379, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10379 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10379 - **State**: PUBLISHED - **Published Date**: August 07, 2019 at 14:20 UTC - **Last Updated**: August 04, 2024 at 22:17 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Google Cloud Messaging Notification Plugin 1.0 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. ### Affected Products **Jenkins project - Jenkins Google Cloud Messaging Notification Plugin** Affected versions: - 1.0 and earlier (Status: affected) ### References 1. [[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/08/07/1) 2. [](https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48365 - **State**: PUBLISHED - **Published Date**: March 12, 2023 at 00:00 UTC - **Last Updated**: March 04, 2025 at 20:44 UTC - **Reserved Date**: March 12, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in eZ Platform Ibexa Kernel before 1.3.26. The Company admin role gives excessive privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ezsystems/ezpublish-kernel/commit/957e67a08af2b3265753f9763943e8225ed779ab) 2. [](https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphql-role-assignment-ct-editing-and-drafts-tooltips) 3. [](https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-99r3-xmmq-7q7g) 4. [](https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-8h83-chh2-fchp)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27132 - **State**: PUBLISHED - **Published Date**: February 27, 2021 at 05:01 UTC - **Last Updated**: August 03, 2024 at 20:40 UTC - **Reserved Date**: February 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://sercomm.com) 2. [](https://cybertuz.com/blog/post/crlf-injection-CVE-2021-27132)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-29915, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-29915 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-29915 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 19:51 UTC - **Last Updated**: April 10, 2025 at 20:05 UTC - **Reserved Date**: March 12, 2025 at 13:42 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The AF_PACKET defrag option is enabled by default and allows AF_PACKET to re-assemble fragmented packets before reaching Suricata. However the default packet size in Suricata is based on the network interface MTU which leads to Suricata seeing truncated packets. Upgrade to Suricata 7.0.9, which uses better defaults and adds warnings for user configurations that may lead to issues. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-347: Security Weakness ### Affected Products **OISF - suricata** Affected versions: - < 7.0.9 (Status: affected) ### References 1. [https://github.com/OISF/suricata/security/advisories/GHSA-7m5c-cqx4-x8mp](https://github.com/OISF/suricata/security/advisories/GHSA-7m5c-cqx4-x8mp) 2. [https://github.com/OISF/suricata/commit/d78f2c9a4e2b59f44daeddff098915084493d08d](https://github.com/OISF/suricata/commit/d78f2c9a4e2b59f44daeddff098915084493d08d) 3. [https://redmine.openinfosecfoundation.org/issues/5373](https://redmine.openinfosecfoundation.org/issues/5373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52459 - **State**: PUBLISHED - **Published Date**: December 02, 2024 at 13:49 UTC - **Last Updated**: April 30, 2025 at 16:28 UTC - **Reserved Date**: November 11, 2024 at 06:40 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chameleoni.Com Chameleoni Jobs chameleon-jobs allows Reflected XSS.This issue affects Chameleoni Jobs: from n/a through 2.5.4. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Chameleoni.com - Chameleoni Jobs** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/chameleon-jobs/vulnerability/wordpress-chameleoni-jobs-plugin-2-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3790 - **State**: PUBLISHED - **Published Date**: June 06, 2019 at 19:16 UTC - **Last Updated**: September 16, 2024 at 22:20 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources. ### Weakness Classification (CWE) - CWE-324: Security Weakness ### Affected Products **Pivotal - Pivotal Ops Manager** Affected versions: - 2.3 (Status: affected) - 2.4 (Status: affected) - 2.2 (Status: affected) - 2.5 (Status: affected) ### References 1. [108512](http://www.securityfocus.com/bid/108512) 2. [](https://pivotal.io/security/cve-2019-3790)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-6381, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-6381 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-6381 - **State**: PUBLISHED - **Published Date**: July 02, 2024 at 17:14 UTC - **Last Updated**: August 01, 2024 at 21:41 UTC - **Reserved Date**: June 27, 2024 at 08:03 UTC - **Assigned By**: mongodb ### Vulnerability Description The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2 ### CVSS Metrics - **CVSS Base Score**: 4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-680: Security Weakness ### Affected Products **MongoDB Inc - libbson** Affected versions: - 0 (Status: affected) ### References 1. [](https://jira.mongodb.org/browse/CDRIVER-5622)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-51415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-51415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-51415 - **State**: PUBLISHED - **Published Date**: February 10, 2024 at 08:39 UTC - **Last Updated**: August 02, 2024 at 22:32 UTC - **Reserved Date**: December 18, 2023 at 22:41 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform allows Stored XSS.This issue affects GiveWP – Donation Plugin and Fundraising Platform: from n/a through 3.2.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **GiveWP - GiveWP – Donation Plugin and Fundraising Platform** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3479, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3479 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3479 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 14:10 UTC - **Last Updated**: August 01, 2024 at 20:12 UTC - **Reserved Date**: April 08, 2024 at 18:34 UTC - **Assigned By**: lenovo ### Vulnerability Description An improper export vulnerability was reported in the Motorola Enterprise MotoDpms Provider (com.motorola.server.enterprise.MotoDpmsProvider) that could allow a local attacker to read local data. ### CVSS Metrics - **CVSS Base Score**: 2.8/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-926: Security Weakness ### Affected Products **Motorola - Phones** Affected versions: - (Status: affected) ### References 1. [](https://en-us.support.motorola.com/app/answers/detail/a_id/178947) ### Credits - Sergey Toshin and Illia Khorolskyi of Oversecured (ovesecured.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-7156, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-7156 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-7156 - **State**: PUBLISHED - **Published Date**: March 07, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 20:57 UTC - **Reserved Date**: March 07, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in addon_keywords.php in Keyword Replacer (keyword_replacer) 1.0 and earlier, a module for miniBB, allows remote attackers to execute arbitrary PHP code via a URL in the pathToFiles parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [22401](http://secunia.com/advisories/22401) 2. [2528](https://www.exploit-db.com/exploits/2528) 3. [20070303 Keyword Replacer plugin RFI seems to be fixed](http://www.attrition.org/pipermail/vim/2007-March/001411.html) 4. [ADV-2006-4026](http://www.vupen.com/english/advisories/2006/4026) 5. [29709](http://www.osvdb.org/29709) 6. [20492](http://www.securityfocus.com/bid/20492)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3108 - **State**: PUBLISHED - **Published Date**: August 02, 2018 at 12:00 UTC - **Last Updated**: October 02, 2024 at 19:47 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Fusion Middleware component of Oracle Fusion Middleware (subcomponent: Oracle Notification Service). Supported versions that are affected are 12.2.1.2 and 12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Fusion Middleware accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). ### Affected Products **Oracle Corporation - Fusion Middleware** Affected versions: - 12.2.1.2 (Status: affected) - 12.2.1.3 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html) 2. [104819](http://www.securityfocus.com/bid/104819) 3. [1041310](http://www.securitytracker.com/id/1041310)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15481 - **State**: PUBLISHED - **Published Date**: August 23, 2019 at 12:25 UTC - **Last Updated**: August 05, 2024 at 00:49 UTC - **Reserved Date**: August 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Kimai v2 before 1.1 has XSS via a timesheet description. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kevinpapst/kimai2/releases/tag/1.1) 2. [](https://github.com/kevinpapst/kimai2/pull/962)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2036, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2036 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2036 - **State**: PUBLISHED - **Published Date**: April 16, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 13:23 UTC - **Reserved Date**: April 16, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-1368](http://www.vupen.com/english/advisories/2007/1368) 2. [20070412 Multiple Vulnerabilities in the Cisco Wireless LAN Controller and Cisco Lightweight Access Points](http://www.cisco.com/warp/public/707/cisco-sa-20070412-wlc.shtml) 3. [cisco-wlc-default-snmp(33604)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33604) 4. [34134](http://www.osvdb.org/34134) 5. [1017908](http://securitytracker.com/id?1017908) 6. [23461](http://www.securityfocus.com/bid/23461)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0814, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0814 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0814 - **State**: PUBLISHED - **Published Date**: March 05, 2009 at 02:00 UTC - **Last Updated**: August 07, 2024 at 04:48 UTC - **Reserved Date**: March 04, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Widgets.aspx in Blogsa 1.0 Beta 3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchText parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20090302 Blogsa <= 1.0 Beta 3 XSS Vulnerability](http://www.securityfocus.com/archive/1/501382/100/0/threaded) 2. [blogsa-widgets-xss(49024)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49024) 3. [33957](http://www.securityfocus.com/bid/33957)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5974 - **State**: PUBLISHED - **Published Date**: January 27, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 11:13 UTC - **Reserved Date**: January 26, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in login.aspx in Active Price Comparison 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) password and (2) username fields. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [7283](https://www.exploit-db.com/exploits/7283) 2. [32921](http://secunia.com/advisories/32921) 3. [ADV-2008-3296](http://www.vupen.com/english/advisories/2008/3296) 4. [activeprice-login-sql-injection(46909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46909)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0968 - **State**: PUBLISHED - **Published Date**: April 15, 2020 at 15:13 UTC - **Last Updated**: February 07, 2025 at 15:17 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970. ### Affected Products **Microsoft - Internet Explorer 9** Affected versions: - Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected) **Microsoft - Internet Explorer 11** Affected versions: - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows Server 2019 (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows RT 8.1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2012 R2 (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems** Affected versions: - unspecified (Status: affected) **Microsoft - Internet Explorer 11 on Windows Server 2012** Affected versions: - unspecified (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0453 - **State**: PUBLISHED - **Published Date**: February 18, 2011 at 16:00 UTC - **Last Updated**: August 06, 2024 at 21:51 UTC - **Reserved Date**: January 14, 2011 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [43326](http://secunia.com/advisories/43326) 2. [](http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html) 3. [ADV-2011-0393](http://www.vupen.com/english/advisories/2011/0393) 4. [70898](http://osvdb.org/70898) 5. [JVNDB-2011-000013](http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013) 6. [JVN#71542734](http://jvn.jp/en/jp/JVN71542734/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27559, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27559 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27559 - **State**: PUBLISHED - **Published Date**: March 01, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 00:34 UTC - **Reserved Date**: February 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stupid Simple CMS v1.2.4 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /save_settings.php ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/kilooooo/cms/blob/main/1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2900, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2900 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2900 - **State**: PUBLISHED - **Published Date**: May 25, 2023 at 21:00 UTC - **Last Updated**: August 02, 2024 at 06:41 UTC - **Reserved Date**: May 25, 2023 at 20:36 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in NFine Rapid Development Platform 20230511. It has been classified as problematic. Affected is an unknown function of the file /Login/CheckLogin. The manipulation leads to use of weak hash. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-229974 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-328: Security Weakness ### Affected Products **NFine - Rapid Development Platform** Affected versions: - 20230511 (Status: affected) ### References 1. [](https://vuldb.com/?id.229974) 2. [](https://vuldb.com/?ctiid.229974) 3. [](https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md) ### Credits - webray.com.cn (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6822 - **State**: PUBLISHED - **Published Date**: September 30, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:31 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Nerdico (aka com.nerdico.danielepais) application 1.9 Stable for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#473289](http://www.kb.cert.org/vuls/id/473289) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18749 - **State**: REJECTED - **Published Date**: November 04, 2019 at 20:17 UTC - **Last Updated**: November 04, 2019 at 20:17 UTC - **Reserved Date**: November 04, 2019 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40755 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 20:16 UTC - **Last Updated**: August 03, 2024 at 12:28 UTC - **Reserved Date**: September 16, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jasper-software/jasper/issues/338)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3942 - **State**: PUBLISHED - **Published Date**: August 04, 2015 at 01:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 12, 2015 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the web-server component in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75227](http://www.securityfocus.com/bid/75227) 2. [](http://www.garrettcom.com/techsupport/MNS6K_R456_Release_Notes.pdf) 3. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36272, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36272 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36272 - **State**: REJECTED - **Published Date**: August 22, 2022 at 15:04 UTC - **Last Updated**: August 22, 2022 at 15:04 UTC - **Reserved Date**: March 09, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13905, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13905 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13905 - **State**: PUBLISHED - **Published Date**: February 27, 2025 at 04:21 UTC - **Last Updated**: February 27, 2025 at 14:46 UTC - **Reserved Date**: February 24, 2025 at 18:06 UTC - **Assigned By**: Wordfence ### Vulnerability Description The OneStore Sites plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 0.1.1 via the class-export.php file. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **sainwp - OneStore Sites** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f2c70d5f-beb3-480e-8ea8-c3ab01ce5a20?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/onestore-sites/trunk/classess/class-export.php#L3) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24515 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 12:59 UTC - **Last Updated**: October 03, 2024 at 13:29 UTC - **Reserved Date**: January 25, 2023 at 13:49 UTC - **Assigned By**: INCIBE ### Vulnerability Description Server-Side Request Forgery (SSRF) vulnerability in API checker of Pandora FMS. Application does not have a check on the URL scheme used while retrieving API URL. Rather than validating the http/https scheme, the application allows other scheme such as file, which could allow a malicious user to fetch internal file content. This issue affects Pandora FMS v767 version and prior versions on all platforms. ### CVSS Metrics - **CVSS Base Score**: 5.2/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **Artica PFMS - Pandora FMS** Affected versions: - v0 (Status: affected) ### References 1. [](https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/) 2. [](https://gist.github.com/damodarnaik/9cc76c6b320510c34a0a668bd7439f7b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9505 - **State**: PUBLISHED - **Published Date**: October 02, 2018 at 19:00 UTC - **Last Updated**: September 16, 2024 at 19:10 UTC - **Reserved Date**: April 05, 2018 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In mca_ccb_hdl_req of mca_cact.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9.0 Android ID: A-110791536 ### Affected Products **Google Inc. - Android** Affected versions: - Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9.0 (Status: affected) ### References 1. [105482](http://www.securityfocus.com/bid/105482) 2. [](https://source.android.com/security/bulletin/2018-10-01%2C) 3. [](https://android.googlesource.com/platform/system/bt/+/5216e6120160b28d76e9ee4dff9995e772647511)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-47090, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-47090 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-47090 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 00:00 UTC - **Last Updated**: January 24, 2025 at 15:03 UTC - **Reserved Date**: December 12, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GPAC MP4box 2.1-DEV-rev574-g9d5bb184b contains a buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c, check needed for num_exp_tile_columns ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gpac/gpac/issues/2341) 2. [](https://github.com/gpac/gpac/commit/48760768611f6766bf9e7378bb7cc66cebd6e49d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9074, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9074 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9074 - **State**: PUBLISHED - **Published Date**: October 10, 2024 at 02:06 UTC - **Last Updated**: October 10, 2024 at 13:11 UTC - **Reserved Date**: September 21, 2024 at 00:48 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Advanced Blocks Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **essamamdani - Advanced Blocks Pro** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f419d14a-90d1-445a-b629-c2e978c3ab81?source=cve) 2. [](https://wordpress.org/plugins/advanced-blocks-pro/#developers) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11938, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11938 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11938 - **State**: PUBLISHED - **Published Date**: December 21, 2024 at 07:03 UTC - **Last Updated**: December 28, 2024 at 00:50 UTC - **Reserved Date**: November 27, 2024 at 21:41 UTC - **Assigned By**: Wordfence ### Vulnerability Description The One Click Upsell Funnel for WooCommerce – Funnel Builder for WordPress, Create WooCommerce Upsell, Post-Purchase Upsell & Cross Sell Offers that Boost Sales & Increase Profits with Sales Funnel Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wps_wocuf_pro_yes shortcode in all versions up to, and including, 3.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wpswings - One Click Upsell Funnel for WooCommerce – Funnel Builder for WordPress, Create WooCommerce Upsell, Post-Purchase Upsell & Cross Sell Offers that Boost Sales & Increase Profits with Sales Funnel Builder** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4c10d6cb-e0a7-4b8d-b50f-e23885355872?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/woo-one-click-upsell-funnel/tags/3.4.9/public/class-woocommerce-one-click-upsell-funnel-public.php) 3. [](https://wordpress.org/plugins/woo-one-click-upsell-funnel/#developers) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26528, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26528 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26528 - **State**: PUBLISHED - **Published Date**: June 13, 2023 at 14:17 UTC - **Last Updated**: October 22, 2024 at 21:10 UTC - **Reserved Date**: February 24, 2023 at 11:22 UTC - **Assigned By**: Patchstack ### Vulnerability Description Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in jinit9906 Shipyaari Shipping Management plugin <= 1.0 versions. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **jinit9906 - Shipyaari Shipping Management** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/manage-shipyaari-shipping/wordpress-shipyaari-shipping-management-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Mahesh Nagabhairava (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2063 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:15 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in antiboard.php in AntiBoard 0.7.2 and earlier allows remote attackers to inject arbitrary HTML or web script via the feedback parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8269](http://www.osvdb.org/8269) 2. [10821](http://www.securityfocus.com/bid/10821) 3. [20040728 AntiBoard <= 0.7.2 XSS/SQL Injection](http://marc.info/?l=bugtraq&m=109105610220965&w=2) 4. [12137](http://secunia.com/advisories/12137) 5. [antiboard-feedback-xss(16830)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16830)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-58054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-58054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-58054 - **State**: PUBLISHED - **Published Date**: March 06, 2025 at 15:53 UTC - **Last Updated**: May 04, 2025 at 10:08 UTC - **Reserved Date**: March 06, 2025 at 15:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: staging: media: max96712: fix kernel oops when removing module The following kernel oops is thrown when trying to remove the max96712 module: Unable to handle kernel paging request at virtual address 00007375746174db Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010af89000 [00007375746174db] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: crct10dif_ce polyval_ce mxc_jpeg_encdec flexcan snd_soc_fsl_sai snd_soc_fsl_asoc_card snd_soc_fsl_micfil dwc_mipi_csi2 imx_csi_formatter polyval_generic v4l2_jpeg imx_pcm_dma can_dev snd_soc_imx_audmux snd_soc_wm8962 snd_soc_imx_card snd_soc_fsl_utils max96712(C-) rpmsg_ctrl rpmsg_char pwm_fan fuse [last unloaded: imx8_isi] CPU: 0 UID: 0 PID: 754 Comm: rmmod Tainted: G C 6.12.0-rc6-06364-g327fec852c31 #17 Tainted: [C]=CRAP Hardware name: NXP i.MX95 19X19 board (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : led_put+0x1c/0x40 lr : v4l2_subdev_put_privacy_led+0x48/0x58 sp : ffff80008699bbb0 x29: ffff80008699bbb0 x28: ffff00008ac233c0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: ffff000080cf1170 x22: ffff00008b53bd00 x21: ffff8000822ad1c8 x20: ffff000080ff5c00 x19: ffff00008b53be40 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000004 x13: ffff0000800f8010 x12: 0000000000000000 x11: ffff000082acf5c0 x10: ffff000082acf478 x9 : ffff0000800f8010 x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d x5 : 8080808000000000 x4 : 0000000000000020 x3 : 00000000553a3dc1 x2 : ffff00008ac233c0 x1 : ffff00008ac233c0 x0 : ff00737574617473 Call trace: led_put+0x1c/0x40 v4l2_subdev_put_privacy_led+0x48/0x58 v4l2_async_unregister_subdev+0x2c/0x1a4 max96712_remove+0x1c/0x38 [max96712] i2c_device_remove+0x2c/0x9c device_remove+0x4c/0x80 device_release_driver_internal+0x1cc/0x228 driver_detach+0x4c/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 i2c_del_driver+0x54/0x64 max96712_i2c_driver_exit+0x18/0x1d0 [max96712] __arm64_sys_delete_module+0x1a4/0x290 invoke_syscall+0x48/0x10c el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xd8 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x190/0x194 Code: f9000bf3 aa0003f3 f9402800 f9402000 (f9403400) ---[ end trace 0000000000000000 ]--- This happens because in v4l2_i2c_subdev_init(), the i2c_set_cliendata() is called again and the data is overwritten to point to sd, instead of priv. So, in remove(), the wrong pointer is passed to v4l2_async_unregister_subdev(), leading to a crash. ### Affected Products **Linux - Linux** Affected versions: - 5814f32fef137e34577c4f053272c53e7ca33cd9 (Status: affected) - 5814f32fef137e34577c4f053272c53e7ca33cd9 (Status: affected) - 5814f32fef137e34577c4f053272c53e7ca33cd9 (Status: affected) - 5814f32fef137e34577c4f053272c53e7ca33cd9 (Status: affected) - 5814f32fef137e34577c4f053272c53e7ca33cd9 (Status: affected) **Linux - Linux** Affected versions: - 5.17 (Status: affected) - 0 (Status: unaffected) - 6.1.129 (Status: unaffected) - 6.6.76 (Status: unaffected) - 6.12.13 (Status: unaffected) - 6.13.2 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3311c5395e7322298b659b8addc704b39fb3a59c) 2. [](https://git.kernel.org/stable/c/dfde3d63afbaae664c4d36e53cfb4045d5374561) 3. [](https://git.kernel.org/stable/c/278a98f6d8a7bbe1110433b057333536e4490edf) 4. [](https://git.kernel.org/stable/c/1556b9149b81cc549c13f5e56e81e89404d8a666) 5. [](https://git.kernel.org/stable/c/ee1b5046d5cd892a0754ab982aeaaad3702083a5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-42768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-42768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-42768 - **State**: PUBLISHED - **Published Date**: December 06, 2022 at 00:00 UTC - **Last Updated**: April 23, 2025 at 19:27 UTC - **Reserved Date**: October 11, 2022 at 00:00 UTC - **Assigned By**: Unisoc ### Vulnerability Description In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. ### Weakness Classification (CWE) - CWE-126: Security Weakness ### Affected Products **Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8013** Affected versions: - Android10/Android11/Android12 (Status: affected) ### References 1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1599588060988411006)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21246 - **State**: PUBLISHED - **Published Date**: January 19, 2022 at 11:21 UTC - **Last Updated**: September 24, 2024 at 20:32 UTC - **Reserved Date**: November 15, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - Communications Operations Monitor** Affected versions: - 3.4 (Status: affected) - 4.2 (Status: affected) - 4.3 (Status: affected) - 4.4 (Status: affected) - 5.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5195 - **State**: PUBLISHED - **Published Date**: July 21, 2017 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:41 UTC - **Reserved Date**: July 01, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1254544) 2. [](https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157) 3. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html) 4. [](https://github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27be) 5. [USN-2783-1](http://www.ubuntu.com/usn/USN-2783-1) 6. [](https://www-01.ibm.com/support/docview.wss?uid=swg21986956) 7. [](https://www-01.ibm.com/support/docview.wss?uid=swg21988706) 8. [RHSA-2016:2583](http://rhn.redhat.com/errata/RHSA-2016-2583.html) 9. [FEDORA-2015-77bfbc1bcd](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html) 10. [RHSA-2016:0780](http://rhn.redhat.com/errata/RHSA-2016-0780.html) 11. [DSA-3388](http://www.debian.org/security/2015/dsa-3388) 12. [[oss-security] 20150825 Several low impact ntp.org ntpd issues](http://www.openwall.com/lists/oss-security/2015/08/25/3) 13. [76474](http://www.securityfocus.com/bid/76474) 14. [FEDORA-2015-14212](http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html) 15. [](https://www-01.ibm.com/support/docview.wss?uid=swg21989542) 16. [](https://www-01.ibm.com/support/docview.wss?uid=swg21985122) 17. [FEDORA-2015-14213](http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38536, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38536 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38536 - **State**: PUBLISHED - **Published Date**: March 13, 2024 at 21:18 UTC - **Last Updated**: August 02, 2024 at 17:46 UTC - **Reserved Date**: July 19, 2023 at 17:13 UTC - **Assigned By**: OpenText ### Vulnerability Description HTML injection in OpenText™ Exceed Turbo X affecting version 12.5.1. The vulnerability could result in Cross site scripting.   ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **OpenText™ - Exceed Turbo X** Affected versions: - 12.5.1 (Status: affected) ### References 1. [](https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0260, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0260 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0260 - **State**: PUBLISHED - **Published Date**: June 02, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:14 UTC - **Reserved Date**: April 26, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link View Server-Side Component" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS00-025](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-025) 2. [1109](http://www.securityfocus.com/bid/1109) 3. [282](http://www.osvdb.org/282)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10205 - **State**: PUBLISHED - **Published Date**: August 08, 2017 at 15:00 UTC - **Last Updated**: October 04, 2024 at 17:09 UTC - **Reserved Date**: June 21, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Enterprise Management Console). The supported version that is affected is 2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). ### Affected Products **Oracle Corporation - Hospitality Simphony** Affected versions: - 2.9 (Status: affected) ### References 1. [1038941](http://www.securitytracker.com/id/1038941) 2. [99787](http://www.securityfocus.com/bid/99787) 3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45006 - **State**: PUBLISHED - **Published Date**: October 17, 2023 at 11:24 UTC - **Last Updated**: September 12, 2024 at 20:49 UTC - **Reserved Date**: October 02, 2023 at 10:33 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ByConsole WooODT Lite – WooCommerce Order Delivery or Pickup with Date Time Location plugin <= 2.4.6 versions. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ByConsole - WooODT Lite – WooCommerce Order Delivery or Pickup with Date Time Location** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/byconsole-woo-order-delivery-time/wordpress-wooodt-lite-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2650 - **State**: PUBLISHED - **Published Date**: July 16, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:24 UTC - **Reserved Date**: March 20, 2015 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect confidentiality via unknown vectors related to Multichannel Framework. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) 2. [1032917](http://www.securitytracker.com/id/1032917)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41847 - **State**: PUBLISHED - **Published Date**: September 30, 2022 at 04:41 UTC - **Last Updated**: May 20, 2025 at 19:35 UTC - **Reserved Date**: September 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/axiomatic-systems/Bento4/issues/750) 2. [](https://github.com/axiomatic-systems/Bento4/issues/759) 3. [](https://github.com/axiomatic-systems/Bento4/issues/775)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7730, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7730 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7730 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: October 03, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12238 - **State**: PUBLISHED - **Published Date**: September 28, 2017 at 07:00 UTC - **Last Updated**: November 15, 2024 at 17:56 UTC - **Reserved Date**: August 03, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927. ### Weakness Classification (CWE) - CWE-399: Security Weakness ### Affected Products **n/a - Cisco IOS** Affected versions: - Cisco IOS (Status: affected) ### References 1. [1039453](http://www.securitytracker.com/id/1039453) 2. [101040](http://www.securityfocus.com/bid/101040) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-vpls)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3612, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3612 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3612 - **State**: PUBLISHED - **Published Date**: September 11, 2023 at 09:04 UTC - **Last Updated**: September 26, 2024 at 14:32 UTC - **Reserved Date**: July 11, 2023 at 06:15 UTC - **Assigned By**: SK-CERT ### Vulnerability Description Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-749: Security Weakness ### Affected Products **Govee - Govee Home** Affected versions: - 5.7.03 (Status: affected) ### References 1. [](https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10) ### Credits - Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8490 - **State**: PUBLISHED - **Published Date**: June 15, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 16:34 UTC - **Reserved Date**: May 03, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297. ### Affected Products **Microsoft Corporation - Microsoft Windows** Affected versions: - The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 (Status: affected) ### References 1. [42214](https://www.exploit-db.com/exploits/42214/) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8490) 3. [98867](http://www.securityfocus.com/bid/98867)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12617, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12617 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12617 - **State**: PUBLISHED - **Published Date**: December 24, 2024 at 04:22 UTC - **Last Updated**: December 24, 2024 at 16:55 UTC - **Reserved Date**: December 13, 2024 at 14:27 UTC - **Assigned By**: Wordfence ### Vulnerability Description The WC Price History for Omnibus plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX actions in all versions up to, and including, 2.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view and modify history data. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **kkarpieszuk - WC Price History for Omnibus** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b380b053-9847-48a8-ba12-d07db9df2baf?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3209687%40wc-price-history&new=3209687%40wc-price-history&sfp_email=&sfph_mail=) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39547, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39547 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39547 - **State**: PUBLISHED - **Published Date**: October 11, 2024 at 15:20 UTC - **Last Updated**: October 11, 2024 at 18:58 UTC - **Reserved Date**: June 25, 2024 at 15:12 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to cause a CPU-based Denial of Service (DoS). If specially crafted TCP traffic is received by the control plane, or a TCP session terminates unexpectedly, it will cause increased control plane CPU utilization by the rpd-server process. While not explicitly required, the impact is more severe when RIB sharding is enabled. Task accounting shows unexpected reads by the RPD Server jobs for shards: user@junos> show task accounting detail ... read:RPD Server.0.0.0.0+780.192.168.0.78+48886 TOT:00000003.00379787 MAX:00000000.00080516 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+49144 TOT:00000004.00007565 MAX:00000000.00080360 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+49694 TOT:00000003.00600584 MAX:00000000.00080463 RUNS: 233888\ read:RPD Server.0.0.0.0+780.192.168.0.78+50246 TOT:00000004.00346998 MAX:00000000.00080338 RUNS: 233888\ This issue affects: Junos OS with cRPD:  * All versions before 21.2R3-S8,  * 21.4 before 21.4R3-S7,  * 22.1 before 22.1R3-S6,  * 22.2 before 22.2R3-S4,  * 22.3 before 22.3R3-S3,  * 22.4 before 22.4R3-S2,  * 23.2 before 23.2R2-S2,  * 24.2 before 24.2R2;  Junos OS Evolved with cRPD:  * All versions before 21.4R3-S7-EVO,  * 22.2 before 22.2R3-S4-EVO,  * 22.3 before 22.3R3-S3-EVO,  * 22.4 before 22.4R3-S2-EVO,  * 23.2 before 23.2R2-EVO. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-755: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 0 (Status: affected) - 21.4 (Status: affected) - 22.1 (Status: affected) - 22.2 (Status: affected) - 22.3 (Status: affected) - 22.4 (Status: affected) - 23.2 (Status: affected) - 24.2 (Status: affected) **Juniper Networks - Junos OS Evolved** Affected versions: - 0 (Status: affected) - 22.2-EVO (Status: affected) - 22.3-EVO (Status: affected) - 22.4-EVO (Status: affected) - 23.2-EVO (Status: affected) ### References 1. [](https://supportportal.juniper.net/JSA88108)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-0397, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-0397 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-0397 - **State**: PUBLISHED - **Published Date**: January 21, 2015 at 18:00 UTC - **Last Updated**: August 06, 2024 at 04:10 UTC - **Reserved Date**: December 17, 2014 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2014-6600. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1031583](http://www.securitytracker.com/id/1031583) 2. [72164](http://www.securityfocus.com/bid/72164) 3. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html) 4. [oracle-cpujan2015-cve20150397(100173)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24044, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24044 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24044 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 09:46 UTC - **Last Updated**: August 03, 2024 at 03:59 UTC - **Reserved Date**: January 27, 2022 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The login functionality of the application does not employ any countermeasures against Password Spraying attacks or Credential Stuffing attacks. An attacker could obtain a list of valid usernames on the device by exploiting the issue and then perform a precise Password Spraying or Credential Stuffing attack in order to obtain access to at least one account. ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **Siemens - Desigo DXR2** Affected versions: - All versions < V01.21.142.5-22 (Status: affected) **Siemens - Desigo PXC3** Affected versions: - All versions < V01.21.142.4-18 (Status: affected) **Siemens - Desigo PXC4** Affected versions: - All versions < V02.20.142.10-10884 (Status: affected) **Siemens - Desigo PXC5** Affected versions: - All versions < V02.20.142.10-10884 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43248 - **State**: PUBLISHED - **Published Date**: August 19, 2024 at 17:17 UTC - **Last Updated**: August 19, 2024 at 18:03 UTC - **Reserved Date**: August 09, 2024 at 09:20 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Bit Apps Bit Form Pro allows File Manipulation.This issue affects Bit Form Pro: from n/a through 2.6.4. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Bit Apps - Bit Form Pro** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36723, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36723 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36723 - **State**: PUBLISHED - **Published Date**: December 29, 2021 at 14:12 UTC - **Last Updated**: September 16, 2024 at 17:18 UTC - **Reserved Date**: July 12, 2021 at 00:00 UTC - **Assigned By**: INCD ### Vulnerability Description Emuse - eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-359: Security Weakness ### Affected Products **Emuse - eServices / eNvoice** Affected versions: - Production (Status: affected) ### References 1. [](https://www.gov.il/en/departments/faq/cve_advisories) ### Credits - Simon Kenin - ClearSky Cyber Security Ltd.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22838 - **State**: PUBLISHED - **Published Date**: March 05, 2023 at 00:00 UTC - **Last Updated**: March 06, 2025 at 16:02 UTC - **Reserved Date**: February 17, 2023 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability in Product List Screen and Product Detail Screen of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script. ### Affected Products **EC-CUBE CO.,LTD. - EC-CUBE 4 series** Affected versions: - EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 (Status: affected) ### References 1. [](https://www.ec-cube.net/info/weakness/20230214/) 2. [](https://jvn.jp/en/jp/JVN04785663/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40204 - **State**: PUBLISHED - **Published Date**: December 20, 2023 at 18:41 UTC - **Last Updated**: April 29, 2025 at 03:47 UTC - **Reserved Date**: August 10, 2023 at 11:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Unrestricted Upload of File with Dangerous Type vulnerability in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager.This issue affects Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager: from n/a through 2.9.2. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-434: Security Weakness ### Affected Products **Premio - Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/folders/wordpress-folders-plugin-2-9-2-arbitrary-file-upload-vulnerability?_s_id=cve) ### Credits - Rafie Muhammad (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0102 - **State**: PUBLISHED - **Published Date**: February 02, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:06 UTC - **Reserved Date**: February 01, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description "Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges by removing the Users & Groups Data File, which effectively removes the Owner password and allows the Normal user to log in as the Owner account without a password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20001229 Mac OS 9 Multiple Users Control Panel Password Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2000-12/0497.html) 2. [macos-multiple-users(5830)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5830)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-27008, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-27008 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-27008 - **State**: PUBLISHED - **Published Date**: April 15, 2025 at 21:53 UTC - **Last Updated**: April 16, 2025 at 15:05 UTC - **Reserved Date**: February 17, 2025 at 11:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in NotFound Unlimited Timeline allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Unlimited Timeline: from n/a through n/a. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **NotFound - Unlimited Timeline** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/unlimited-timeline/vulnerability/wordpress-unlimited-timeline-1-6-1-broken-access-control-vulnerability?_s_id=cve) ### Credits - Tran Nguyen Bao Khanh(VCI - VNPT) (Patchstack Alliance)