System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17668, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17668 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17668
- **State**: PUBLISHED
- **Published Date**: October 17, 2019 at 11:05 UTC
- **Last Updated**: August 05, 2024 at 01:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samsung Galaxy S10 and Note10 devices allow unlock operations via unregistered fingerprints in certain situations involving a third-party screen protector.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.forbes.com/sites/gordonkelly/2019/10/15/samsung-galaxy-s10-note10-plus-fingerprint-reader-warning-upgrade-galaxy-s11)
2. [](https://www.engadget.com/2019/10/17/samsung-patch-fingerprint-reader/)
3. [](https://news.ycombinator.com/item?id=21280205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1690, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1690
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 15:26 UTC
- **Last Updated**: August 01, 2024 at 18:48 UTC
- **Reserved Date**: February 20, 2024 at 20:46 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the terawallet_export_user_search() function in all versions up to, and including, 1.4.10. This makes it possible for authenticated attackers, with subscriber-level access and above, to export a list of registered users and their emails.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**subratamal - TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/18e24a2e-cbc6-4285-b846-bea513b6ff69?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3043412/woo-wallet/trunk/includes/class-woo-wallet-ajax.php)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9903
- **State**: PUBLISHED
- **Published Date**: June 27, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 14:02 UTC
- **Reserved Date**: June 24, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The sched_read_attr function in kernel/sched/core.c in the Linux kernel 3.14-rc before 3.14-rc4 uses an incorrect size, which allows local users to obtain sensitive information from kernel stack memory via a crafted sched_getattr system call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4efbc454ba68def5ef285b26ebfcfdb605b52755)
2. [](https://github.com/torvalds/linux/commit/4efbc454ba68def5ef285b26ebfcfdb605b52755)
3. [91511](http://www.securityfocus.com/bid/91511) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20423
- **State**: PUBLISHED
- **Published Date**: July 13, 2021 at 16:10 UTC
- **Last Updated**: September 16, 2024 at 18:49 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak for Applications 4.3 could allow an authenticated user gain escalated privilesges due to improper application permissions. IBM X-Force ID: 196308.
### Affected Products
**IBM - Cloud Pak for Applications**
Affected versions:
- 4.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6471329)
2. [ibm-cp4a-cve202120423-priv-escalation (196308)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196308) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32344
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 15:53 UTC
- **Last Updated**: August 03, 2024 at 07:39 UTC
- **Reserved Date**: June 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_patient.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/hospitals-patient-records-management-system/SQLi-10.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23004
- **State**: PUBLISHED
- **Published Date**: March 01, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 19:33 UTC
- **Reserved Date**: January 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19)
2. [](https://github.com/torvalds/linux/commit/15342f930ebebcfe36f2415049736a77d7d2e045)
3. [[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9149
- **State**: PUBLISHED
- **Published Date**: July 09, 2019 at 20:45 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mailvelope prior to 3.3.0 allows private key operations without user interaction via its client-API. By modifying an URL parameter in Mailvelope, an attacker is able to sign (and encrypt) arbitrary messages with Mailvelope, assuming the private key password is cached. A second vulnerability allows an attacker to decrypt an arbitrary message when the GnuPG backend is used in Mailvelope.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330)
2. [](https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html)
3. [](https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25878
- **State**: PUBLISHED
- **Published Date**: May 27, 2022 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 02:36 UTC
- **Reserved Date**: February 24, 2022 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:P`
### Affected Products
**n/a - protobufjs**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507)
3. [](https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197)
4. [](https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f)
5. [](https://github.com/protobufjs/protobuf.js/pull/1731)
### Credits
- Alessio Della Libera from Snyk |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20048, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20048 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20048
- **State**: PUBLISHED
- **Published Date**: April 01, 2024 at 02:35 UTC
- **Last Updated**: August 01, 2024 at 21:52 UTC
- **Reserved Date**: November 02, 2023 at 13:35 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541769; Issue ID: ALPS08541769.
### Affected Products
**MediaTek, Inc. - MT2713, MT6781, MT6789, MT6835, MT6855, MT6879, MT6886, MT6895, MT6983, MT6985, MT6989, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2022
- **State**: PUBLISHED
- **Published Date**: May 28, 2010 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:05 UTC
- **Reserved Date**: May 24, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
jail.c in jail in FreeBSD 8.0 and 8.1-PRERELEASE, when the "-l -U root" options are omitted, does not properly restrict access to the current working directory, which might allow local users to read, modify, or create arbitrary files via standard filesystem operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-1247](http://www.vupen.com/english/advisories/2010/1247)
2. [FreeBSD-SA-10:04](http://security.FreeBSD.org/advisories/FreeBSD-SA-10:04.jail.asc)
3. [40399](http://www.securityfocus.com/bid/40399)
4. [1024038](http://securitytracker.com/id?1024038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16806
- **State**: PUBLISHED
- **Published Date**: November 13, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Ulterius/server/commit/770d1821de43cf1d0a93c79025995bdd812a76ee)
2. [43141](https://www.exploit-db.com/exploits/43141/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38881
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:28 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Rainbow Table Password cracking attack due to the use of one-way hashes without salts when storing user passwords.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://caterease.com)
2. [](http://horizon.com)
3. [](https://vuldb.com/?id.273365)
4. [](https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22075
- **State**: PUBLISHED
- **Published Date**: January 05, 2024 at 00:00 UTC
- **Last Updated**: June 05, 2025 at 16:18 UTC
- **Reserved Date**: January 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/firefly-iii/firefly-iii/releases/tag/v6.1.1)
2. [](https://www.sonarsource.com/blog/front-end-frameworks-when-bypassing-built-in-sanitization-might-backfire/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38749
- **State**: PUBLISHED
- **Published Date**: September 05, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 11:02 UTC
- **Reserved Date**: August 25, 2022 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**snakeyaml - SnakeYAML**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47024)
2. [](https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open)
3. [[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html)
4. [GLSA-202305-28](https://security.gentoo.org/glsa/202305-28)
5. [](https://security.netapp.com/advisory/ntap-20240315-0010/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0412
- **State**: PUBLISHED
- **Published Date**: February 14, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Spidean PostWrap allows remote attackers to inject arbitrary HTML and web script via the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013130](http://securitytracker.com/id?1013130)
2. [postwrap-xss(19261)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19261)
3. [20050208 XSS VULNERABILITY AT MODULE PostWrap](http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0065.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9956
- **State**: PUBLISHED
- **Published Date**: September 25, 2017 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 00:37 UTC
- **Reserved Date**: June 26, 2017 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass
### Affected Products
**Schneider Electric SE - U.Motion**
Affected versions:
- U.motion Builder Versions 1.2.1 and prior. (Status: affected)
### References
1. [](http://www.schneider-electric.com/en/download/document/SEVD-2017-178-01/)
2. [99344](http://www.securityfocus.com/bid/99344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0687
- **State**: PUBLISHED
- **Published Date**: January 31, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 31, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Opera before 11.01 does not properly implement Wireless Application Protocol (WAP) dropdown lists, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted WAP document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/windows/1101/)
2. [oval:org.mitre.oval:def:12563](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12563)
3. [ADV-2011-0231](http://www.vupen.com/english/advisories/2011/0231)
4. [](http://www.opera.com/docs/changelogs/unix/1101/)
5. [46036](http://www.securityfocus.com/bid/46036)
6. [70733](http://osvdb.org/70733)
7. [](http://www.opera.com/docs/changelogs/mac/1101/)
8. [43023](http://secunia.com/advisories/43023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21039
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 14:29 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In dumpstateBoard of Dumpstate.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783650References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2023-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46235, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46235
- **State**: PUBLISHED
- **Published Date**: April 22, 2025 at 09:53 UTC
- **Last Updated**: April 22, 2025 at 14:18 UTC
- **Reserved Date**: April 22, 2025 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks – Gutenberg based Page Builder allows Stored XSS. This issue affects SKT Blocks – Gutenberg based Page Builder: from n/a through 2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**sonalsinha21 - SKT Blocks – Gutenberg based Page Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/skt-blocks/vulnerability/wordpress-skt-blocks-gutenberg-based-page-builder-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- zaim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40581
- **State**: REJECTED
- **Last Updated**: March 27, 2023 at 00:00 UTC
- **Reserved Date**: September 12, 2022 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27845
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 19:38 UTC
- **Last Updated**: February 20, 2025 at 20:27 UTC
- **Reserved Date**: March 24, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) in PlausibleHQ Plausible Analytics (WordPress plugin) <= 1.2.2
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**PlausibleHQ - Plausible Analytics (WordPress plugin)**
Affected versions:
- <= 1.2.2 (Status: affected)
### References
1. [](https://wordpress.org/plugins/plausible-analytics/#developers)
2. [](https://patchstack.com/database/vulnerability/plausible-analytics/wordpress-plausible-analytics-plugin-1-2-2-authenticated-stored-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by José Aguilera (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39793
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:20 UTC
- **Last Updated**: January 14, 2025 at 20:52 UTC
- **Reserved Date**: June 28, 2024 at 18:05 UTC
- **Assigned By**: talos
### Vulnerability Description
Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-15: Security Weakness
### Affected Products
**Wavlink - Wavlink AC3000**
Affected versions:
- M33A8.V5030.210505 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2053](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2053)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17714
- **State**: PUBLISHED
- **Published Date**: December 16, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon parameter, the /register org parameter, the /register query parameter, the /register region parameter, the /register regionName parameter, the /register timezone parameter, the /register vId parameter, the /register zip parameter, or the /tping id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=Txp6IwR24jY)
2. [](https://github.com/boxug/trape/commit/628149159ba25adbfc29a3ae1d4b10c7eb936dd3)
3. [](https://www.seekurity.com/blog/general/cve-2017-17713-and-cve-2017-17714-multiple-sql-injections-and-xss-vulnerabilities-found-in-the-hackers-tracking-tool-trape-boxug/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26757
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 19:18 UTC
- **Last Updated**: August 03, 2024 at 05:11 UTC
- **Reserved Date**: March 08, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213255)
2. [](https://support.apple.com/en-us/HT213256)
3. [](https://support.apple.com/en-us/HT213258)
4. [](https://support.apple.com/en-us/HT213253)
5. [](https://support.apple.com/en-us/HT213254)
6. [](https://support.apple.com/en-us/HT213257)
7. [](http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2484
- **State**: PUBLISHED
- **Published Date**: September 09, 2015 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-094](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094)
2. [76586](http://www.securityfocus.com/bid/76586)
3. [1033487](http://www.securitytracker.com/id/1033487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1995
- **State**: PUBLISHED
- **Published Date**: October 12, 2011 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 22:46 UTC
- **Reserved Date**: May 09, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that was not properly initialized, aka "OLEAuto32.dll Remote Code Execution Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS11-081](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-081)
2. [oval:org.mitre.oval:def:12838](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12838) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8644
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:28 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to disclose information due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8652 and CVE-2017-8662.
### Affected Products
**Microsoft Corporation - Microsoft Edge**
Affected versions:
- Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016. (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8644)
2. [42459](https://www.exploit-db.com/exploits/42459/)
3. [100044](http://www.securityfocus.com/bid/100044)
4. [1039101](http://www.securitytracker.com/id/1039101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43566
- **State**: PUBLISHED
- **Published Date**: October 17, 2024 at 22:39 UTC
- **Last Updated**: January 29, 2025 at 23:50 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Microsoft - Microsoft Edge (Chromium-based)**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43566) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18536
- **State**: PUBLISHED
- **Published Date**: December 26, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 11:15 UTC
- **Reserved Date**: October 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The GLCKIo and Asusgio low-level drivers in ASUS Aura Sync v1.07.22 and earlier expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106250](http://www.securityfocus.com/bid/106250)
2. [](http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html)
3. [](https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities)
4. [20181221 [CORE-2017-0012] - ASUS Drivers Elevation of Privilege Vulnerabilities](http://seclists.org/fulldisclosure/2018/Dec/34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1263, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1263
- **State**: PUBLISHED
- **Published Date**: August 31, 2022 at 15:33 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 06, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**n/a - Kernel:KVM**
Affected versions:
- Fixed in kernel v5.18-rc3 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2072698)
2. [](https://www.openwall.com/lists/oss-security/2022/04/07/1)
3. [](https://github.com/torvalds/linux/commit/5593473a1e6c743764b08e3b6071cb43b5cfa6c4)
4. [](https://access.redhat.com/security/cve/CVE-2022-1263) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5341
- **State**: PUBLISHED
- **Published Date**: February 22, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod_scorm in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 mishandles availability dates, which allows remote authenticated users to bypass intended access restrictions and read SCORM contents via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://moodle.org/mod/forum/discuss.php?d=323236)
2. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50837) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4303
- **State**: PUBLISHED
- **Published Date**: August 21, 2023 at 22:34 UTC
- **Last Updated**: October 01, 2024 at 17:52 UTC
- **Reserved Date**: August 10, 2023 at 21:31 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method, resulting in an HTML injection vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Jenkins Project - Jenkins Fortify Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-08-16](https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3140)
### Credits
- Kevin Guerroudj, CloudBees, Inc. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27726
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 08:18 UTC
- **Last Updated**: March 28, 2025 at 13:56 UTC
- **Reserved Date**: March 11, 2025 at 04:20 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file download process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered by a crafted HTTP request to specific functions of the product from a device connected to the LAN side.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**KDDI CORPORATION - HGW-BL1500HM**
Affected versions:
- Ver 002.002.003 and earlier (Status: affected)
### References
1. [](https://kddi-tech.com/contents/appendix_L2_06.html#64433e4a-8946-9c06-bddf-91cbfe56c8e5)
2. [](https://jvn.jp/en/jp/JVN04278547/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1106, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1106 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1106
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in kppp in KDE allows local users to gain root access via a long -c (account_name) command line argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19980429 Security hole in kppp](http://www.securityfocus.com/archive/1/9121)
2. [kde-kppp-account-bo(1643)](https://exchange.xforce.ibmcloud.com/vulnerabilities/1643)
3. [92](http://www.securityfocus.com/bid/92) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0221
- **State**: PUBLISHED
- **Published Date**: June 05, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [59342](http://secunia.com/advisories/59342)
2. [59669](http://secunia.com/advisories/59669)
3. [](http://www.novell.com/support/kb/doc.php?id=7015300)
4. [59990](http://secunia.com/advisories/59990)
5. [1030337](http://www.securitytracker.com/id/1030337)
6. [59454](http://secunia.com/advisories/59454)
7. [59126](http://secunia.com/advisories/59126)
8. [](http://www.novell.com/support/kb/doc.php?id=7015264)
9. [59306](http://secunia.com/advisories/59306)
10. [](http://www-01.ibm.com/support/docview.wss?uid=swg21678289)
11. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
12. [HPSBUX03046](http://marc.info/?l=bugtraq&m=140266410314613&w=2)
13. [61254](http://secunia.com/advisories/61254)
14. [](http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E)
15. [59895](http://secunia.com/advisories/59895)
16. [59449](http://secunia.com/advisories/59449)
17. [](http://www-01.ibm.com/support/docview.wss?uid=isg400001843)
18. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946)
19. [HPSBOV03047](http://marc.info/?l=bugtraq&m=140317760000786&w=2)
20. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676879)
21. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677828)
22. [59441](http://secunia.com/advisories/59441)
23. [HPSBMU03074](http://marc.info/?l=bugtraq&m=140621259019789&w=2)
24. [59189](http://secunia.com/advisories/59189)
25. [MDVSA-2014:106](http://www.mandriva.com/security/advisories?name=MDVSA-2014:106)
26. [59300](http://secunia.com/advisories/59300)
27. [GLSA-201407-05](http://security.gentoo.org/glsa/glsa-201407-05.xml)
28. [59284](http://secunia.com/advisories/59284)
29. [](http://www.ibm.com/support/docview.wss?uid=swg24037783)
30. [59365](http://secunia.com/advisories/59365)
31. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677695)
32. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
33. [59495](http://secunia.com/advisories/59495)
34. [](http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163)
35. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676889)
36. [FEDORA-2014-9308](http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html)
37. [58945](http://secunia.com/advisories/58945)
38. [](http://www-01.ibm.com/support/docview.wss?uid=isg400001841)
39. [59659](http://secunia.com/advisories/59659)
40. [openSUSE-SU-2016:0640](http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html)
41. [59429](http://secunia.com/advisories/59429)
42. [](http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html)
43. [59655](http://secunia.com/advisories/59655)
44. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676071)
45. [59437](http://secunia.com/advisories/59437)
46. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754)
47. [](http://www.vmware.com/security/advisories/VMSA-2014-0006.html)
48. [59310](http://secunia.com/advisories/59310)
49. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html)
50. [](http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc)
51. [](http://www.fortiguard.com/advisory/FG-IR-14-018/)
52. [SUSE-SU-2015:0743](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html)
53. [](http://www.ibm.com/support/docview.wss?uid=swg21676793)
54. [](http://www.ibm.com/support/docview.wss?uid=swg21676356)
55. [HPSBMU03057](http://marc.info/?l=bugtraq&m=140389274407904&w=2)
56. [](http://support.citrix.com/article/CTX140876)
57. [59167](http://secunia.com/advisories/59167)
58. [59120](http://secunia.com/advisories/59120)
59. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757)
60. [HPSBMU03069](http://marc.info/?l=bugtraq&m=140499827729550&w=2)
61. [MDVSA-2014:105](http://www.mandriva.com/security/advisories?name=MDVSA-2014:105)
62. [59460](http://secunia.com/advisories/59460)
63. [RHSA-2014:1021](http://rhn.redhat.com/errata/RHSA-2014-1021.html)
64. [58939](http://secunia.com/advisories/58939)
65. [SSRT101590](http://marc.info/?l=bugtraq&m=140266410314613&w=2)
66. [59027](http://secunia.com/advisories/59027)
67. [59514](http://secunia.com/advisories/59514)
68. [](http://www.ibm.com/support/docview.wss?uid=swg21676226)
69. [20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl)
70. [67901](http://www.securityfocus.com/bid/67901)
71. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10075)
72. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
73. [59221](http://secunia.com/advisories/59221)
74. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676419)
75. [58714](http://secunia.com/advisories/58714)
76. [HPSBGN03050](http://marc.info/?l=bugtraq&m=140482916501310&w=2)
77. [](http://www.openssl.org/news/secadv_20140605.txt)
78. [58615](http://secunia.com/advisories/58615)
79. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
80. [](http://support.apple.com/kb/HT6443)
81. [59301](http://secunia.com/advisories/59301)
82. [59784](http://secunia.com/advisories/59784)
83. [](https://kb.bluecoat.com/index?page=content&id=SA80)
84. [HPSBMU03076](http://marc.info/?l=bugtraq&m=140904544427729&w=2)
85. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629)
86. [](http://www-01.ibm.com/support/docview.wss?uid=swg21678167)
87. [59192](http://secunia.com/advisories/59192)
88. [FEDORA-2014-9301](http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html)
89. [HPSBMU03062](http://marc.info/?l=bugtraq&m=140752315422991&w=2)
90. [HPSBMU03056](http://marc.info/?l=bugtraq&m=140389355508263&w=2)
91. [59175](http://secunia.com/advisories/59175)
92. [HPSBMU03051](http://marc.info/?l=bugtraq&m=140448122410568&w=2)
93. [59666](http://secunia.com/advisories/59666)
94. [HPSBMU03055](http://marc.info/?l=bugtraq&m=140431828824371&w=2)
95. [59413](http://secunia.com/advisories/59413)
96. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
97. [](http://www-01.ibm.com/support/docview.wss?uid=swg21675821)
98. [59721](http://secunia.com/advisories/59721)
99. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756)
100. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676062)
101. [58713](http://secunia.com/advisories/58713)
102. [](http://www-01.ibm.com/support/docview.wss?uid=swg21673137)
103. [MDVSA-2015:062](http://www.mandriva.com/security/advisories?name=MDVSA-2015:062)
104. [](http://www-01.ibm.com/support/docview.wss?uid=swg21676035)
105. [59450](http://secunia.com/advisories/59450)
106. [](http://linux.oracle.com/errata/ELSA-2014-1053.html)
107. [59287](http://secunia.com/advisories/59287)
108. [](http://www-01.ibm.com/support/docview.wss?uid=swg21683332)
109. [59491](http://secunia.com/advisories/59491)
110. [59364](http://secunia.com/advisories/59364)
111. [59451](http://secunia.com/advisories/59451)
112. [58977](http://secunia.com/advisories/58977)
113. [](https://www.novell.com/support/kb/doc.php?id=7015271)
114. [60571](http://secunia.com/advisories/60571)
115. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d3152655d5319ce883c8e3ac4b99f8de4c59d846)
116. [](http://www.blackberry.com/btsc/KB36051)
117. [](http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755)
118. [](http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm)
119. [](http://www-01.ibm.com/support/docview.wss?uid=swg21677527)
120. [60687](http://secunia.com/advisories/60687)
121. [](https://bugzilla.redhat.com/show_bug.cgi?id=1103593)
122. [59528](http://secunia.com/advisories/59528)
123. [58337](http://secunia.com/advisories/58337)
124. [59518](http://secunia.com/advisories/59518)
125. [59162](http://secunia.com/advisories/59162)
126. [59490](http://secunia.com/advisories/59490)
127. [](http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E)
128. [HPSBMU03065](http://marc.info/?l=bugtraq&m=140491231331543&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15729
- **State**: PUBLISHED
- **Published Date**: October 21, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 21:57 UTC
- **Reserved Date**: October 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) for adding a glossary.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/thorsten/phpMyFAQ/commit/867618110feb836e168435548d6c2cbb7c65eda3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12516
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 18:49 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
### Affected Products
**Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT**
Affected versions:
- PLAT 7.3 (E0504) (Status: affected)
### References
1. [1039152](http://www.securitytracker.com/id/1039152)
2. [100367](http://www.securityfocus.com/bid/100367)
3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1862
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Extreme Messageboard (XMB) 1.8 SP3 and 1.9 beta allow remote attackers to inject arbitrary web script or HTML via the (1) xmbuser parameter to xmb.php, (2) folder parameter to u2u.php, (3) viewmost, replymost, or latest parameter to stats.php, (4) message or icons parameter to post.php, (5) threadlist, pagelinks, forumlist, navigation, or (6) forumdisplay parameter to forumdisplay.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [xmb-forum-multiple-xss(15654)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15654)
2. [20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 Partagium SP3 and 1.9 Nexus Beta]](http://marc.info/?l=bugtraq&m=108032355905265&w=2)
3. [11230](http://secunia.com/advisories/11230)
4. [14988](http://osvdb.org/14988)
5. [14985](http://osvdb.org/14985)
6. [14983](http://osvdb.org/14983)
7. [14987](http://osvdb.org/14987)
8. [9983](http://www.securityfocus.com/bid/9983)
9. [14986](http://osvdb.org/14986)
10. [](https://docs.xmbforum2.com/index.php?title=Security_Issue_History) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47715
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 14:10 UTC
- **Last Updated**: August 02, 2024 at 21:16 UTC
- **Reserved Date**: November 09, 2023 at 11:31 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Storage Protect Plus Server 10.1.0 through 10.1.16 could allow an authenticated user with read-only permissions to add or delete entries from an existing HyperVisor configuration. IBM X-Force ID: 271538.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**IBM - Storage Protect Plus Server**
Affected versions:
- 10.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7144861)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/271538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9564
- **State**: PUBLISHED
- **Published Date**: June 26, 2020 at 20:10 UTC
- **Last Updated**: May 05, 2025 at 17:05 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Bridge**
Affected versions:
- 10.0.1 and earlier version versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/bridge/apsb20-19.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31232
- **State**: PUBLISHED
- **Published Date**: April 30, 2021 at 12:46 UTC
- **Last Updated**: August 03, 2024 at 22:55 UTC
- **Reserved Date**: April 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.grafana.com/c/security-announcements)
2. [](https://github.com/cortexproject/cortex)
3. [](https://github.com/cortexproject/cortex/pull/4129/files)
4. [](https://lists.cncf.io/g/cortex-users/message/50) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44759
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 00:00 UTC
- **Last Updated**: December 03, 2024 at 15:59 UTC
- **Reserved Date**: August 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file download vulnerability in the component /Doc/DownloadFile of NUS-M9 ERP Management Software v3.0.0 allows attackers to download arbitrary files and access sensitive information via a crafted interface request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/WarmBrew/web_vul/blob/main/M9ERP/M9ERP-filedown-Doc.md)
2. [](https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44759.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8526
- **State**: PUBLISHED
- **Published Date**: August 06, 2018 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 07, 2016 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.
### Affected Products
**Hewlett Packard Enterprise - Aruba AirWave**
Affected versions:
- all versions up to, but not including, 8.2.3.1 (Status: affected)
### References
1. [96495](http://www.securityfocus.com/bid/96495)
2. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt)
3. [41482](https://www.exploit-db.com/exploits/41482/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7686, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7686
- **State**: PUBLISHED
- **Published Date**: October 03, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 02, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016)
2. [[oss-security] 20151002 Re: DoS attack through Email-Address perl module v1.907 (CVE id request)](http://www.openwall.com/lists/oss-security/2015/10/02/13)
3. [[oss-security] 20150927 DoS attack through Email-Address perl module v1.907 (CVE id request)](http://www.openwall.com/lists/oss-security/2015/09/27/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23555
- **State**: PUBLISHED
- **Published Date**: December 28, 2022 at 00:12 UTC
- **Last Updated**: April 11, 2025 at 15:48 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provided. The vulnerability allows an attacker that knows different invitation flows names (e.g. `enrollment-invitation-test` and `enrollment-invitation-admin`) via either different invite links or via brute forcing to signup via a single invitation url for any valid invite link received (it can even be a url for a third flow as long as it's a valid invite) as the token used in the `Invitations` section of the Admin interface does NOT change when a different `enrollment flow` is selected via the interface and it is NOT bound to the selected flow, so it will be valid for any flow when used. This issue is patched in authentik 2022.11.4,2022.10.4 and 2022.12.0. Only configurations that use invitations and have multiple enrollment flows with invitation stages that grant different permissions are affected. The default configuration is not vulnerable, and neither are configurations with a single enrollment flow. As a workaround, fixed data can be added to invitations which can be checked in the flow to deny requests. Alternatively, an identifier with high entropy (like a UUID) can be used as flow slug, mitigating the attack vector by exponentially decreasing the possibility of discovering other flows.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**goauthentik - authentik**
Affected versions:
- >= 2022.11.0, < 2022.11.4 (Status: affected)
- < 2022.10.4 (Status: affected)
### References
1. [https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h](https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10104
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 06:00 UTC
- **Last Updated**: November 15, 2024 at 18:44 UTC
- **Reserved Date**: October 17, 2024 at 18:15 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Jobs for WordPress plugin before 2.7.8 does not sanitise and escape some of its Job settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Jobs for WordPress**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/f0a9c8ae-f2cf-4322-8216-4778b0e37a48/)
### Credits
- Krugov Artyom
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46764
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 07:12 UTC
- **Last Updated**: May 04, 2025 at 09:33 UTC
- **Reserved Date**: September 11, 2024 at 15:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: add check for invalid name in btf_name_valid_section()
If the length of the name string is 1 and the value of name[0] is NULL
byte, an OOB vulnerability occurs in btf_name_valid_section() and the
return value is true, so the invalid name passes the check.
To solve this, you need to check if the first position is NULL byte and
if the first character is printable.
### Affected Products
**Linux - Linux**
Affected versions:
- bd70a8fb7ca4fcb078086f4d96b048aaf1aa4786 (Status: affected)
- bd70a8fb7ca4fcb078086f4d96b048aaf1aa4786 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.9 (Status: affected)
- 0 (Status: unaffected)
- 6.10.10 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c8ffe2d4d37a05ce18c71b87421443c16f8475e5)
2. [](https://git.kernel.org/stable/c/bb6705c3f93bed2af03d43691743d4c43e3c8e6f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1799
- **State**: PUBLISHED
- **Published Date**: July 29, 2022 at 09:15 UTC
- **Last Updated**: April 21, 2025 at 13:51 UTC
- **Reserved Date**: May 19, 2022 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
Incorrect signature trust exists within Google Play services SDK play-services-basement. A debug version of Google Play services is trusted by the SDK for devices that are non-GMS. We recommend upgrading the SDK past the 2022-05-03 release.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-501: Security Weakness
### Affected Products
**Google LLC - Google Play Services SDK**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://developers.google.com/android/guides/releases#may_03_2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21568
- **State**: PUBLISHED
- **Published Date**: July 19, 2022 at 21:08 UTC
- **Last Updated**: September 24, 2024 at 19:51 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle iReceivables product of Oracle E-Business Suite (component: Access Request). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iReceivables. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iReceivables accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - iReceivables**
Affected versions:
- 12.2.3-12.2.11 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8848
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 21:05 UTC
- **Last Updated**: November 22, 2024 at 21:29 UTC
- **Reserved Date**: September 13, 2024 at 18:17 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25268.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 10.3.1.387 (Status: affected)
### References
1. [ZDI-24-1271](https://www.zerodayinitiative.com/advisories/ZDI-24-1271/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1101
- **State**: PUBLISHED
- **Published Date**: March 02, 2023 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 19:19 UTC
- **Reserved Date**: February 28, 2023 at 00:00 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes.
### Weakness Classification (CWE)
- CWE-307: Security Weakness
### Affected Products
**SonicWall - SonicOS**
Affected versions:
- SonicOS 6.5.4.11-97n and earlier (Status: affected)
- SonicOS NSv 6.5.4.4-44v-21-1551 and earlier (Status: affected)
- SonicOS NSsp 7.0.1-5083 and earlier (Status: affected)
- SonicOS 7.0.1-5095 and earlier (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22524
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 14:57 UTC
- **Last Updated**: January 07, 2025 at 17:29 UTC
- **Reserved Date**: January 07, 2025 at 10:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in instaform.ir فرم ساز فرم افزار allows Stored XSS.This issue affects فرم ساز فرم افزار: from n/a through 2.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**instaform.ir - فرم ساز فرم افزار**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/formafzar/vulnerability/wordpress-frm-s-z-frm-fz-r-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- zaim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24290
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 09:46 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 01, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions), Teamcenter V13.2 (All versions < V13.2.0.8), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). The tcserver.exe binary in affected applications is vulnerable to a stack overflow condition during the parsing of user input that may lead the binary to crash.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Siemens - Teamcenter V12.4**
Affected versions:
- All versions < V12.4.0.13 (Status: affected)
**Siemens - Teamcenter V13.0**
Affected versions:
- All versions < V13.0.0.9 (Status: affected)
**Siemens - Teamcenter V13.1**
Affected versions:
- All versions (Status: affected)
**Siemens - Teamcenter V13.2**
Affected versions:
- All versions < V13.2.0.8 (Status: affected)
**Siemens - Teamcenter V13.3**
Affected versions:
- All versions < V13.3.0.3 (Status: affected)
**Siemens - Teamcenter V14.0**
Affected versions:
- All versions < V14.0.0.2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-789162.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5023
- **State**: PUBLISHED
- **Published Date**: July 22, 2014 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:48 UTC
- **Reserved Date**: July 22, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout -b" command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://hatriot.github.io/blog/2014/06/29/gitlist-rce/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4061
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 13:41 UTC
- **Last Updated**: April 17, 2025 at 13:56 UTC
- **Reserved Date**: November 18, 2022 at 18:44 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The JobBoardWP WordPress plugin before 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.
### Weakness Classification (CWE)
- CWE-434 Unrestricted Upload of File with Dangerous Type: Security Weakness
### Affected Products
**Unknown - JobBoardWP**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665)
### Credits
- cydave |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38218
- **State**: PUBLISHED
- **Published Date**: October 13, 2023 at 06:15 UTC
- **Last Updated**: August 02, 2024 at 17:30 UTC
- **Reserved Date**: July 13, 2023 at 16:21 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Incorrect Authorization . An authenticated attacker can exploit this to achieve information exposure and privilege escalation.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb23-50.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0143
- **State**: PUBLISHED
- **Published Date**: October 03, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM OpenPages GRC Platform 6.2 before IF7, 6.2.1 before 6.2.1.1 IF5, 7.0 before FP4, and 7.1 before FP1 allows remote authenticated users to obtain sensitive information by reading error messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21963358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26206
- **State**: PUBLISHED
- **Published Date**: February 15, 2024 at 13:59 UTC
- **Last Updated**: August 02, 2024 at 11:39 UTC
- **Reserved Date**: February 20, 2023 at 15:09 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiNAC 9.4.0 - 9.4.2, 9.2.0 - 9.2.8, 9.1.0 - 9.1.10 and 7.2.0 allows an attacker to execute unauthorized code or commands via the name fields observed in the policy audit logs.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:X/RC:X`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Fortinet - FortiNAC**
Affected versions:
- 9.4.0 (Status: affected)
- 9.2.0 (Status: affected)
- 9.1.0 (Status: affected)
- 7.2.0 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-23-063](https://fortiguard.com/psirt/FG-IR-23-063) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47876
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 15:49 UTC
- **Last Updated**: November 21, 2024 at 16:53 UTC
- **Reserved Date**: October 04, 2024 at 16:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Sakai is a Collaboration and Learning Environment. Starting in version 23.0 and prior to version 23.2, kernel users created with type roleview can log in as a normal user. This can result in illegal access being granted to the system. Version 23.3 fixes this vulnerability.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
- CWE-863: Incorrect Authorization
### Affected Products
**sakaiproject - sakai**
Affected versions:
- >= 23.0, < 23.3 (Status: affected)
### References
1. [https://github.com/sakaiproject/sakai/security/advisories/GHSA-cx95-q6gx-w4qp](https://github.com/sakaiproject/sakai/security/advisories/GHSA-cx95-q6gx-w4qp)
2. [https://github.com/sakaiproject/sakai/commit/a9aadd9347cfb204515e89ac0163e1be9e56cc41](https://github.com/sakaiproject/sakai/commit/a9aadd9347cfb204515e89ac0163e1be9e56cc41)
3. [https://sakaiproject.atlassian.net/browse/SAK-50571](https://sakaiproject.atlassian.net/browse/SAK-50571) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42046
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 00:00 UTC
- **Last Updated**: April 17, 2025 at 13:49 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wfshbr64.sys and wfshbr32.sys specially crafted IOCTL allows arbitrary user to perform local privilege escalation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.wfs.games/news/20221220_01.html)
2. [](https://github.com/kkent030315/CVE-2022-42046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46807
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 22:55 UTC
- **Last Updated**: August 02, 2024 at 20:53 UTC
- **Reserved Date**: October 27, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An SQL Injection vulnerability in web component of EPMM before 12.1.0.0 allows an authenticated user with appropriate privilege to access or modify data in the underlying database.
### Affected Products
**Ivanti - EPMM**
Affected versions:
- 12.1.0.0 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0770
- **State**: PUBLISHED
- **Published Date**: December 08, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:31 UTC
- **Reserved Date**: August 03, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
romload.c in DGen Emulator 1.23 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files during decompression of (1) gzip or (2) bzip ROM files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=263282&archive=yes)
2. [dgen-rom-decompression-symlink(16884)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16884)
3. [12214](http://secunia.com/advisories/12214)
4. [10855](http://www.securityfocus.com/bid/10855) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27277
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 17:07 UTC
- **Last Updated**: August 02, 2024 at 00:27 UTC
- **Reserved Date**: February 22, 2024 at 01:26 UTC
- **Assigned By**: ibm
### Vulnerability Description
The private key for the IBM Storage Protect Plus Server 10.1.0 through 10.1.16 certificate can be disclosed, undermining the security of the certificate. IBM X-Force ID: 285205.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**IBM - Storage Protect Plus Server**
Affected versions:
- 10.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7144861)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/285205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45783
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 16:11 UTC
- **Reserved Date**: November 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dotcms.com/security/SI-67) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6994
- **State**: PUBLISHED
- **Published Date**: October 23, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 16, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The kernel in Apple iOS before 9.1 and OS X before 10.11.1 mishandles reuse of virtual memory, which allows attackers to cause a denial of service via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-10-21-4](http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html)
2. [APPLE-SA-2015-10-21-1](http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html)
3. [](https://support.apple.com/HT205375)
4. [](https://support.apple.com/HT205370)
5. [77263](http://www.securityfocus.com/bid/77263)
6. [1033929](http://www.securitytracker.com/id/1033929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10580
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 01:21 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
nodewebkit is an installer for node-webkit. nodewebkit downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested zip file with an attacker controlled zip file if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - nodewebkit node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2180
- **State**: PUBLISHED
- **Published Date**: May 04, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:43 UTC
- **Reserved Date**: May 03, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Golden FTP Server Pro 2.70 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long argument to the (1) NLST or (2) APPE commands, as demonstrated by the Infigo FTPStress Fuzzer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [goldenftp-nlst-appe-bo(26195)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26195)
2. [19917](http://secunia.com/advisories/19917)
3. [](http://www.infigo.hr/en/in_focus/tools)
4. [25217](http://www.osvdb.org/25217)
5. [20060502 FTP Fuzzer](http://marc.info/?l=bugtraq&m=114658586018818&w=2)
6. [ADV-2006-1640](http://www.vupen.com/english/advisories/2006/1640)
7. [17801](http://www.securityfocus.com/bid/17801)
8. [](http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03)
9. [20060508 INFIGO-2006-05-03: Multiple FTP Servers vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-05/0139.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-52377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-52377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52377
- **State**: PUBLISHED
- **Published Date**: November 14, 2024 at 17:42 UTC
- **Last Updated**: November 15, 2024 at 15:39 UTC
- **Reserved Date**: November 11, 2024 at 06:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in BdThemes Instant Image Generator allows Upload a Web Shell to a Web Server.This issue affects Instant Image Generator: from n/a through 1.5.4.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**BdThemes - Instant Image Generator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ai-image/wordpress-instant-image-generator-one-click-image-uploads-from-pixabay-pexels-and-openai-plugin-1-5-1-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33907
- **State**: PUBLISHED
- **Published Date**: August 07, 2023 at 01:54 UTC
- **Last Updated**: October 17, 2024 at 14:48 UTC
- **Reserved Date**: May 23, 2023 at 06:51 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In Contacts Service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1687281677639942145) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10457
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 13:00 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A missing permission check in Jenkins Oracle Cloud Infrastructure Compute Classic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
### Affected Products
**Jenkins project - Jenkins Oracle Cloud Infrastructure Compute Classic Plugin**
Affected versions:
- 1.0.0 and earlier (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1462)
2. [[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/10/16/6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2718
- **State**: PUBLISHED
- **Published Date**: May 16, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the WebMail system in Stalker CommuniGate Pro 5.1.8 and earlier, when using Microsoft Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via crafted STYLE tags.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1018048](http://www.securitytracker.com/id?1018048)
2. [36017](http://osvdb.org/36017)
3. [25250](http://secunia.com/advisories/25250)
4. [ADV-2007-1795](http://www.vupen.com/english/advisories/2007/1795)
5. [](http://www.scanit.be/advisory-2007-05-12.html)
6. [communigate-mail-xss(34266)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34266)
7. [](http://www.communigate.com/CommuniGatePro/History51.html)
8. [20070512 CommuniGate Pro web mail persistent cross-site scripting vulnerability](http://marc.info/?l=full-disclosure&m=117900749209206&w=2)
9. [23950](http://www.securityfocus.com/bid/23950) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2315
- **State**: PUBLISHED
- **Published Date**: September 09, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
admin/Auth in OpenKM 5.1.7 and other versions before 5.1.8-2 does not properly enforce privileges for changing user roles, which allows remote authenticated users to assign administrator privileges to arbitrary users via the userEdit action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20120323 CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)](http://www.openwall.com/lists/oss-security/2012/03/23/6)
2. [[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)](http://www.openwall.com/lists/oss-security/2012/05/04/2)
3. [51250](http://www.securityfocus.com/bid/51250)
4. [20120103 OpenKM 5.1.7 Privilege Escalation](http://archives.neohapsis.com/archives/bugtraq/2012-01/0007.html)
5. [[oss-security] 20120323 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)](http://www.openwall.com/lists/oss-security/2012/03/23/8)
6. [20120104 Re: OpenKM 5.1.7 Privilege Escalation](http://archives.neohapsis.com/archives/bugtraq/2012-01/0021.html)
7. [[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)](http://www.openwall.com/lists/oss-security/2012/05/04/13)
8. [openkm-userpermissions-security-bypass(72112)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72112)
9. [[oss-security] 20120427 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)](http://www.openwall.com/lists/oss-security/2012/04/27/6)
10. [47424](http://secunia.com/advisories/47424)
11. [78105](http://osvdb.org/78105) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3626
- **State**: PUBLISHED
- **Published Date**: March 20, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 20:17 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Edger8r tool in the Intel SGX SDK before version 2.1.2 (Linux) and 1.9.6 (Windows) may generate code that is susceptible to a side channel potentially allowing a local user to access unauthorized information.
### Affected Products
**Intel Corporation - SGX SDK**
Affected versions:
- before version 2.1.2 (Linux) and 1.9.6 (Windows) (Status: affected)
### References
1. [103479](http://www.securityfocus.com/bid/103479)
2. [](https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00117&languageid=en-fr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3357
- **State**: PUBLISHED
- **Published Date**: April 05, 2024 at 21:31 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 05, 2024 at 05:52 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. This affects an unknown part of the file admin/mod_reports/index.php. The manipulation of the argument end leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259461 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Aplaya Beach Resort Online Reservation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-259461 | SourceCodester Aplaya Beach Resort Online Reservation System index.php cross site scripting](https://vuldb.com/?id.259461)
2. [VDB-259461 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.259461)
3. [Submit #310226 | https://www.sourcecodester.com/ Aplaya Beach Resort Online Reservation System 1.0 reflected XSS](https://vuldb.com/?submit.310226)
4. [](https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-11.md)
### Credits
- qianzui1004 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7275
- **State**: PUBLISHED
- **Published Date**: January 08, 2014 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 19:45 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in misc.php in MyBB (aka MyBulletinBoard) before 1.6.12 allows remote attackers to inject arbitrary web script or HTML via the editor parameter in a smilie list popup.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mybb/mybb/commit/6212bc954d72caf591e141ca36b8df964387bee8)
2. [](http://blog.mybb.com/2013/12/16/mybb-1-6-12-released-security-maintenance-release)
3. [55945](http://secunia.com/advisories/55945)
4. [64570](http://www.securityfocus.com/bid/64570)
5. [101545](http://osvdb.org/101545) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6746
- **State**: PUBLISHED
- **Published Date**: June 03, 2019 at 18:15 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 24, 2019 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7634.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Foxit - Studio Photo**
Affected versions:
- 3.6.6 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-19-370/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38910
- **State**: PUBLISHED
- **Published Date**: March 10, 2022 at 19:50 UTC
- **Last Updated**: September 16, 2024 at 19:31 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DataPower Gateway V10CD, 10.0.1, and 2108.4.1 could allow a remote attacker to bypass security restrictions, caused by the improper validation of input. By sending a specially crafted JSON message, an attacker could exploit this vulnerability to modify structure and fields. IBM X-Force ID: 209824.
### Affected Products
**IBM - DataPower Gateway**
Affected versions:
- 2018.4.1.0 (Status: affected)
- 10.0.1.0 (Status: affected)
- 10.0.2.0 (Status: affected)
- 10.0.1.5 (Status: affected)
- 10.0.3.0 (Status: affected)
- 2108.4.1.18 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6562347)
2. [ibm-datapower-cve202138910-sec-bypass (209824)](https://exchange.xforce.ibmcloud.com/vulnerabilities/209824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30683
- **State**: PUBLISHED
- **Published Date**: September 16, 2022 at 17:45 UTC
- **Last Updated**: April 23, 2025 at 17:05 UTC
- **Reserved Date**: May 12, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a Violation of Secure Design Principles vulnerability that could lead to bypass the security feature of the encryption mechanism in the backend . An attacker could leverage this vulnerability to decrypt secrets, however, this is a high-complexity attack as the threat actor needs to already possess those secrets. Exploitation of this issue requires low-privilege access to AEM.
### Weakness Classification (CWE)
- CWE-657: Security Weakness
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-40.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32976
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 20:59 UTC
- **Last Updated**: September 03, 2024 at 15:41 UTC
- **Reserved Date**: April 22, 2024 at 15:14 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-835: Security Weakness
### Affected Products
**envoyproxy - envoy**
Affected versions:
- >= 1.30.0, <= 11.30.1 (Status: affected)
- >= 1.29.0, <= 1.29.4 (Status: affected)
- >= 1.28.0, <= 1.28.3 (Status: affected)
- > 1.18.0, <= 1.27.5 (Status: affected)
### References
1. [https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m](https://github.com/envoyproxy/envoy/security/advisories/GHSA-7wp5-c2vq-4f8m) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0725
- **State**: PUBLISHED
- **Published Date**: April 24, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: February 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the AirPortDriver module for AirPort in Apple Mac OS X 10.3.9 through 10.4.9, when running on hardware with the original AirPort wireless card, allows local users to execute arbitrary code by "sending malformed control commands."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24966](http://secunia.com/advisories/24966)
2. [](http://docs.info.apple.com/article.html?artnum=305391)
3. [23569](http://www.securityfocus.com/bid/23569)
4. [TA07-109A](http://www.us-cert.gov/cas/techalerts/TA07-109A.html)
5. [34857](http://www.osvdb.org/34857)
6. [APPLE-SA-2007-04-19](http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html)
7. [ADV-2007-1470](http://www.vupen.com/english/advisories/2007/1470) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0328
- **State**: PUBLISHED
- **Published Date**: March 19, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2012 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Janetter before 3.3.0.0 (aka 3.3.0) allows remote attackers to obtain session information for twitter.com web sites via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2012-000026](http://jvndb.jvn.jp/jvndb/JVNDB-2012-000026)
2. [52555](http://www.securityfocus.com/bid/52555)
3. [](http://janetter.net/history.html)
4. [JVN#10745573](http://jvn.jp/en/jp/JVN10745573/index.html)
5. [48480](http://secunia.com/advisories/48480)
6. [janetter-info-disclosure(74132)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74132)
7. [](http://blog.janetter.net/)
8. [80334](http://osvdb.org/80334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17392
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 17:30 UTC
- **Last Updated**: August 05, 2024 at 01:40 UTC
- **Reserved Date**: October 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Progress Sitefinity 12.1 has a Weak Password Recovery Mechanism for a Forgotten Password because the HTTP Host header is mishandled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://knowledgebase.progress.com/articles/Article/Security-Advisory-for-Resolving-Security-vulnerabilities-November-2019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5645
- **State**: PUBLISHED
- **Published Date**: November 01, 2006 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 19:55 UTC
- **Reserved Date**: November 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when "Enabled scanning of archives" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1018450](http://www.securitytracker.com/id?1018450)
2. [](http://www.sophos.com/support/knowledgebase/article/7609.html)
3. [1017132](http://securitytracker.com/id?1017132)
4. [ADV-2006-4239](http://www.vupen.com/english/advisories/2006/4239)
5. [20816](http://www.securityfocus.com/bid/20816)
6. [20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439)
7. [20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities](http://www.securityfocus.com/archive/1/474683/100/0/threaded)
8. [22591](http://secunia.com/advisories/22591) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5248
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:40 UTC
- **Reserved Date**: August 15, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28182
- **State**: PUBLISHED
- **Published Date**: April 04, 2024 at 14:41 UTC
- **Last Updated**: February 13, 2025 at 17:47 UTC
- **Reserved Date**: March 06, 2024 at 17:35 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**nghttp2 - nghttp2**
Affected versions:
- < 1.61.0 (Status: affected)
### References
1. [https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q](https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q)
2. [https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0](https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0)
3. [https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9](https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/)
7. [](https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html)
8. [](http://www.openwall.com/lists/oss-security/2024/04/03/16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37146
- **State**: PUBLISHED
- **Published Date**: September 08, 2022 at 00:28 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The PlexTrac platform prior to version 1.28.0 allows for username enumeration via HTTP response times on invalid login attempts for users configured to use the PlexTrac authentication provider. Login attempts for valid, unlocked users configured to use PlexTrac as their authentication provider take significantly longer than those for invalid users, allowing for valid users to be enumerated by an unauthenticated remote attacker. Note that the lockout policy implemented in Plextrac version 1.17.0 makes it impossible to distinguish between valid, locked user accounts and user accounts that do not exist, but does not prevent valid, unlocked users from being enumerated.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://plextrac.com)
2. [](https://www.controlgap.com/blog/a-plextrac-story) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7983
- **State**: PUBLISHED
- **Published Date**: May 05, 2020 at 17:06 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 26, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4492
- **State**: PUBLISHED
- **Published Date**: May 05, 2024 at 00:31 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 04, 2024 at 07:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). This issue affects the function formOfflineSet of the file /goform/setStaOffline. The manipulation of the argument GO/ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263081 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - i21**
Affected versions:
- 1.0.0.14(4656) (Status: affected)
### References
1. [VDB-263081 | Tenda i21 setStaOffline formOfflineSet stack-based overflow](https://vuldb.com/?id.263081)
2. [VDB-263081 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.263081)
3. [Submit #323601 | Tenda i21 V1.0.0.14(4656) Buffer Overflow](https://vuldb.com/?submit.323601)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md)
### Credits
- yhryhryhr_miemie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1083
- **State**: PUBLISHED
- **Published Date**: July 15, 2019 at 18:56 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when Microsoft Common Object Runtime Library improperly handles web requests, aka '.NET Denial of Service Vulnerability'.
### Affected Products
**Microsoft - Microsoft .NET Framework 4.5.2**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 (Status: affected)
- Windows Server 2012 (Server Core installation) (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2012 R2 (Server Core installation) (Status: affected)
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6**
Affected versions:
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6/4.6.1/4.6.2**
Affected versions:
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
**Microsoft - Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 (Status: affected)
- Windows Server 2012 (Server Core installation) (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2012 R2 (Server Core installation) (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 7 for 32-bit Systems Service Pack 1**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 7 for x64-based Systems Service Pack 1**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 8.1 for 32-bit systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 8.1 for x64-based systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 R2**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows RT 8.1**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2016**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1703 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1703 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 4.8 on Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.8 on Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 1903 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5**
Affected versions:
- Windows Server 2012 (Status: affected)
- Windows Server 2012 (Server Core installation) (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows Server 2012 R2 (Server Core installation) (Status: affected)
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows Server 2016 (Server Core installation) (Status: affected)
- Windows 10 Version 1703 for 32-bit Systems (Status: affected)
- Windows 10 Version 1703 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows Server, version 1803 (Server Core Installation) (Status: affected)
**Microsoft - Microsoft .NET Framework 3.0**
Affected versions:
- Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Microsoft .NET Framework 2.0**
Affected versions:
- Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Microsoft .NET Framework 3.5.1**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1083) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3015
- **State**: PUBLISHED
- **Published Date**: August 31, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: August 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI, (2) entering a javascript: URI when specifying the content of a Refresh header, (3) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (5) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (6) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://websecurity.com.ua/3386/)
2. [qtweb-javascript-xss(52993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6175
- **State**: PUBLISHED
- **Published Date**: February 19, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 19, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SilverSHielD 1.0.2.34 allows remote attackers to cause a denial of service (application crash) via a crafted argument to the opendir SFTP command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [silvershield-opendir-dos(46064)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46064)
2. [32374](http://secunia.com/advisories/32374)
3. [31884](http://www.securityfocus.com/bid/31884)
4. [6815](https://www.exploit-db.com/exploits/6815) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3169
- **State**: PUBLISHED
- **Published Date**: February 26, 2020 at 16:50 UTC
- **Last Updated**: November 15, 2024 at 17:37 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. An attacker would need valid administrator credentials to exploit this vulnerability.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Cisco - Cisco Firepower Extensible Operating System (FXOS)**
Affected versions:
- unspecified (Status: affected)
### References
1. [20200226 Cisco FXOS Software CLI Command Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fpwr-cmdinj) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5869, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5869 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5869
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 14:22 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/978793)
2. [](https://chromereleases.googleblog.com/2019/08/stable-channel-update-for-desktop_26.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29158
- **State**: PUBLISHED
- **Published Date**: September 02, 2022 at 07:10 UTC
- **Last Updated**: August 03, 2024 at 06:10 UTC
- **Reserved Date**: April 13, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache OFBiz up to version 18.12.05 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles URLs provided by external, unauthenticated users. Upgrade to 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12599
### Weakness Classification (CWE)
- CWE-1333: Security Weakness
### Affected Products
**Apache Software Foundation - Apache OFBiz**
Affected versions:
- Apache OFBiz (Status: affected)
### References
1. [](https://lists.apache.org/thread/7k92rg1o4ql2yw3o0vttkcl2jhq7j928)
2. [[oss-security] 20220902 Apache OFBiz - Regular Expression Denial of Service (ReDoS) (CVE-2022-29158)](http://www.openwall.com/lists/oss-security/2022/09/02/5)
### Credits
- Tony Torralba and Joseph Farebrother from the GitHub CodeQL team. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4957
- **State**: PUBLISHED
- **Published Date**: September 23, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 22, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the GetMember function in functions.php in MyReview 1.9.4 allows remote attackers to execute arbitrary SQL commands via the email parameter to Admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20105](http://www.securityfocus.com/bid/20105)
2. [2397](https://www.exploit-db.com/exploits/2397)
3. [21991](http://secunia.com/advisories/21991)
4. [myreview-functions-sql-injection(29029)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29029)
5. [ADV-2006-3716](http://www.vupen.com/english/advisories/2006/3716) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0909
- **State**: PUBLISHED
- **Published Date**: March 14, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: December 01, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0910, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
### Affected Products
**Microsoft Corporation - Microsoft SharePoint**
Affected versions:
- Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 (Status: affected)
### References
1. [103279](http://www.securityfocus.com/bid/103279)
2. [1040513](http://www.securitytracker.com/id/1040513)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1837
- **State**: PUBLISHED
- **Published Date**: April 03, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 02, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in MangoBery CMS 0.5.5 allow remote attackers to execute arbitrary PHP code via a URL in the Site_Path parameter to (1) boxes/quotes.php or (2) templates/mangobery/footer.sample.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3598](https://www.exploit-db.com/exploits/3598)
2. [mangoberycms-quotes-file-include(33290)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33290)
3. [ADV-2007-1147](http://www.vupen.com/english/advisories/2007/1147)
4. [24686](http://secunia.com/advisories/24686)
5. [23187](http://www.securityfocus.com/bid/23187)
6. [34510](http://osvdb.org/34510)
7. [](http://mangobery.svn.sourceforge.net/viewvc/mangobery?view=rev&revision=70)
8. [34509](http://osvdb.org/34509) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33664
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 15:28 UTC
- **Reserved Date**: April 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mpdavis/python-jose/issues/344)
2. [](https://github.com/mpdavis/python-jose/pull/345)
3. [](https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30628
- **State**: PUBLISHED
- **Published Date**: April 24, 2023 at 21:17 UTC
- **Last Updated**: February 12, 2025 at 16:35 UTC
- **Reserved Date**: April 13, 2023 at 13:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior,
the `changelog.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**kiwitcms - Kiwi**
Affected versions:
- <= 12.2 (Status: affected)
### References
1. [https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx](https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx)
2. [https://github.com/kiwitcms/Kiwi/commit/834c86dfd1b2492ccad7ebbfd6304bfec895fed2](https://github.com/kiwitcms/Kiwi/commit/834c86dfd1b2492ccad7ebbfd6304bfec895fed2)
3. [https://github.com/kiwitcms/enterprise/commit/e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751](https://github.com/kiwitcms/enterprise/commit/e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751)
4. [https://github.com/kiwitcms/Kiwi/blob/37bfb87696093ce0393160e2725949185cc0651d/.github/workflows/changelog.yml#L18](https://github.com/kiwitcms/Kiwi/blob/37bfb87696093ce0393160e2725949185cc0651d/.github/workflows/changelog.yml#L18)
5. [https://securitylab.github.com/research/github-actions-untrusted-input/](https://securitylab.github.com/research/github-actions-untrusted-input/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8573
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: January 06, 2021 at 16:15 UTC
- **Reserved Date**: December 16, 2015 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
No description available |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.