System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27658
- **State**: PUBLISHED
- **Published Date**: October 29, 2020 at 08:55 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-1004: Security Weakness
### Affected Products
**Synology - Synology Router Manager (SRM)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.synology.com/security/advisory/Synology_SA_20_14)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1086) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3186
- **State**: PUBLISHED
- **Published Date**: May 06, 2020 at 16:35 UTC
- **Last Updated**: November 15, 2024 at 17:28 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the management access list configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured management interface access list on an affected system. The vulnerability is due to the configuration of different management access lists, with ports allowed in one access list and denied in another. An attacker could exploit this vulnerability by sending crafted remote management traffic to the local IP address of an affected system. A successful exploit could allow the attacker to bypass the configured management access list policies, and traffic to the management interface would not be properly denied.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Threat Defense Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20200506 Cisco Firepower Threat Defense Software Management Access List Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-accesslist-bypass-5dZs5qZp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33943, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33943 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33943
- **State**: PUBLISHED
- **Published Date**: July 27, 2022 at 16:22 UTC
- **Last Updated**: February 20, 2025 at 20:14 UTC
- **Reserved Date**: July 22, 2022 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authenticated (contributor or higher user role) Cross-Site Scripting (XSS) vulnerability in Nico Amarilla's BxSlider WP plugin <= 2.0.0 at WordPress.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nico Amarilla - BxSlider WP (WordPress plugin)**
Affected versions:
- <= 2.0.0 (Status: affected)
### References
1. [](https://wordpress.org/plugins/bxslider-wp/#developers)
2. [](https://patchstack.com/database/vulnerability/bxslider-wp/wordpress-bxslider-wp-plugin-2-0-0-authenticated-cross-site-scripting-xss-vulnerability)
### Credits
- Vulnerability discovered by Ngo Van Thien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5886
- **State**: PUBLISHED
- **Published Date**: January 10, 2019 at 14:00 UTC
- **Last Updated**: August 04, 2024 at 20:09 UTC
- **Reserved Date**: January 10, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in ShopXO 1.2.0. In the application\install\controller\Index.php file, there is no validation lock file in the Add method, which allows an attacker to reinstall the database. The attacker can write arbitrary code to database.php during system reinstallation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gongfuxiang/shopxo/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8304
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 04:20 UTC
- **Reserved Date**: October 16, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in In-Portal CMS 5.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the next_template parameter to admin/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140916 Vulnerabilities in In-Portal CMS](http://seclists.org/fulldisclosure/2014/Sep/54)
2. [](http://websecurity.com.ua/7276) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18023
- **State**: PUBLISHED
- **Published Date**: October 07, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 11:01 UTC
- **Reserved Date**: October 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/1336)
2. [USN-4034-1](https://usn.ubuntu.com/4034-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1776
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 08:57 UTC
- **Last Updated**: August 03, 2024 at 00:16 UTC
- **Reserved Date**: May 18, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Popups, Welcome Bar, Optins and Lead Generation Plugin WordPress plugin before 2.1.8 does not sanitize and escape some campaign parameters, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Popups, Welcome Bar, Optins and Lead Generation Plugin – Icegram**
Affected versions:
- 2.1.8 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9)
### Credits
- Pritam Dash |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46843
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 13:55 UTC
- **Last Updated**: August 03, 2024 at 14:39 UTC
- **Reserved Date**: December 09, 2022 at 10:55 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Le Van Toan Woocommerce Vietnam Checkout plugin <= 2.0.4 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Le Van Toan - Woocommerce Vietnam Checkout**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woo-vietnam-checkout/wordpress-woocommerce-vietnam-checkout-plugin-2-0-4-cross-site-scripting-xss?_s_id=cve)
### Credits
- TEAM WEBoB of BoB 11th (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5654
- **State**: PUBLISHED
- **Published Date**: October 11, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: July 24, 2015 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Dojo Toolkit before 1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [77026](http://www.securityfocus.com/bid/77026)
2. [JVNDB-2015-000153](http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153)
3. [JVN#13456571](http://jvn.jp/en/jp/JVN13456571/index.html)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21975256)
5. [1034848](http://www.securitytracker.com/id/1034848) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1413
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 19:40 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19960803 Exploiting Zolaris 2.4 ?? :)](http://marc.info/?l=bugtraq&m=87602167419549&w=2)
2. [296](http://www.securityfocus.com/bid/296) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4616
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 10:42 UTC
- **Last Updated**: September 30, 2024 at 18:48 UTC
- **Reserved Date**: August 30, 2023 at 08:06 UTC
- **Assigned By**: LGE
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/thumbnail endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the current user.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**LG Electronics - LG-LED Assistant**
Affected versions:
- 2.1.45 (Status: affected)
### References
1. [](https://lgsecurity.lge.com/bulletins/idproducts#updateDetails)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-23-1223/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0339
- **State**: PUBLISHED
- **Published Date**: September 18, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: May 10, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 5.5 and earlier allows remote attackers to display a URL in the address bar that is different than the URL that is actually being displayed, which could be used in web site spoofing attacks, aka the "Web page spoofing vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS01-027](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-027)
2. [5694](http://www.osvdb.org/5694)
3. [oval:org.mitre.oval:def:1096](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1096)
4. [2737](http://www.securityfocus.com/bid/2737)
5. [L-087](http://www.ciac.org/ciac/bulletins/l-087.shtml)
6. [ie-html-url-spoofing(6556)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21587
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 19:03 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Web Applications Desktop Integrator**
Affected versions:
- 12.2.3-12.2.11 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2022.html)
2. [](http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0734
- **State**: PUBLISHED
- **Published Date**: February 20, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:27 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
SQL injection vulnerability in the Certificate Authority Proxy Function (CAPF) implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCum46483.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140218 Cisco Unified Communications Manager CAPF Unauthenticated Blind SQL Injection Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0734)
2. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=32916)
3. [65645](http://www.securityfocus.com/bid/65645) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7669
- **State**: PUBLISHED
- **Published Date**: December 27, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 01, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in (1) includes/MapImportCSV2.php and (2) includes/MapImportCSV.php in the Easy2Map plugin before 1.3.0 for WordPress allow remote attackers to include and execute arbitrary files via the csvfile parameter related to "upload file functionality."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20151004 Multiple Path/Directory Traversal and/or Local File Inclusion in Easy2Map version 1.2.9 WordPress plugin](http://www.securityfocus.com/archive/1/536597/100/0/threaded)
2. [](https://wordpress.org/plugins/easy2map/#developers)
3. [](https://wpvulndb.com/vulnerabilities/8206) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39286
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 21:18 UTC
- **Last Updated**: February 13, 2025 at 15:17 UTC
- **Reserved Date**: August 15, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Incorrect execution-assigned permissions in the Linux kernel mode driver for the Intel(R) 800 Series Ethernet Driver before version 1.15.4 may allow an authenticated user to potentially enable information disclosure via local access.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-279: Security Weakness
### Affected Products
**n/a - Intel(R) 800 Series Ethernet Driver**
Affected versions:
- before version 1.15.4 (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2709
- **State**: PUBLISHED
- **Published Date**: April 23, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: April 01, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2014-4928](http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131821.html)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768)
3. [66630](http://www.securityfocus.com/bid/66630)
4. [](http://svn.cacti.net/viewvc?view=rev&revision=7439)
5. [59203](http://secunia.com/advisories/59203)
6. [FEDORA-2014-4892](http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131842.html)
7. [[oss-security] 20140403 Re: CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"](http://seclists.org/oss-sec/2014/q2/15)
8. [57647](http://secunia.com/advisories/57647)
9. [DSA-2970](http://www.debian.org/security/2014/dsa-2970)
10. [GLSA-201509-03](https://security.gentoo.org/glsa/201509-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17201
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 20:44 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Some huawei smartphones with software BTV-DL09C233B350, Berlin-L21HNC432B360, Berlin-L22HNC636B360, Berlin-L24HNC567B360, Berlin-L21C10B130, Berlin-L21C185B132, Berlin-L21C464B130, Berlin-L22C346B140, Berlin-L22C636B160, Berlin-L23C605B131, Berlin-L23DOMC109B160, MHA-AL00AC00B125 have a DoS vulnerability. Due to insufficient input validation, an attacker could trick a user to execute a malicious application, which could be exploited by attacker to launch DoS attacks.
### Affected Products
**Huawei Technologies Co., Ltd. - BTV-EMUI5.0,Berlin-EMUI5.0,Berlin-L21,Berlin-L22,Berlin-L23,MHA-AL00A**
Affected versions:
- BTV-DL09C233B350, Berlin-L21HNC432B360, Berlin-L22HNC636B360, Berlin-L24HNC567B360, Berlin-L21C10B130, Berlin-L21C185B132, Berlin-L21C464B130, Berlin-L22C346B140, Berlin-L22C636B160, Berlin-L23C605B131, Berlin-L23DOMC109B160, MHA-AL00AC00B125 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180124-01-dos-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2191
- **State**: PUBLISHED
- **Published Date**: March 08, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 05:10 UTC
- **Reserved Date**: March 02, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:0489](http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html)
2. [72941](http://www.securityfocus.com/bid/72941)
3. [](http://www.wireshark.org/security/wnpa-sec-2015-10.html)
4. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14)
5. [](http://advisories.mageia.org/MGASA-2015-0117.html)
6. [1031858](http://www.securitytracker.com/id/1031858)
7. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023)
8. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html)
9. [MDVSA-2015:183](http://www.mandriva.com/security/advisories?name=MDVSA-2015:183)
10. [DSA-3210](http://www.debian.org/security/2015/dsa-3210)
11. [RHSA-2015:1460](http://rhn.redhat.com/errata/RHSA-2015-1460.html)
12. [GLSA-201510-03](https://security.gentoo.org/glsa/201510-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34525
- **State**: PUBLISHED
- **Published Date**: July 14, 2021 at 17:54 UTC
- **Last Updated**: November 19, 2024 at 14:34 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows DNS Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34525) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8351
- **State**: PUBLISHED
- **Published Date**: April 30, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 16:34 UTC
- **Reserved Date**: April 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98371](http://www.securityfocus.com/bid/98371)
2. [](https://github.com/ImageMagick/ImageMagick/issues/448)
3. [DSA-3863](http://www.debian.org/security/2017/dsa-3863) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2859
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 15:01 UTC
- **Last Updated**: May 21, 2025 at 19:11 UTC
- **Reserved Date**: August 16, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html)
2. [](https://crbug.com/1338412)
3. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0107
- **State**: PUBLISHED
- **Published Date**: February 25, 2005 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 02:33 UTC
- **Reserved Date**: January 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bsmtpd 2.3 and earlier does not properly sanitize e-mail addresses, which allows remote attackers to execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-690](http://www.debian.org/security/2005/dsa-690) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0392
- **State**: PUBLISHED
- **Published Date**: February 25, 2011 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 07, 2011 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco TelePresence Recording Server devices with software 1.6.x do not require authentication for an XML-RPC interface, which allows remote attackers to perform unspecified actions via a session on TCP port 8080, aka Bug ID CSCtg35833.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [telepresence-xmlrpc-security-bypass(65609)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65609)
2. [20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml)
3. [1025114](http://www.securitytracker.com/id?1025114)
4. [46522](http://www.securityfocus.com/bid/46522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27298
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 17:48 UTC
- **Last Updated**: August 22, 2024 at 18:28 UTC
- **Reserved Date**: February 22, 2024 at 18:08 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
parse-server is a Parse Server for Node.js / Express. This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database. The vulnerability has been fixed in 6.5.0 and 7.0.0-alpha.20.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**parse-community - parse-server**
Affected versions:
- < 6.5.0 (Status: affected)
- >= 7.0.0-alpha.1, < 7.0.0-alpha.20 (Status: affected)
### References
1. [https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2](https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2)
2. [https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504](https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504)
3. [https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833](https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833)
4. [https://github.com/parse-community/parse-server/releases/tag/6.5.0](https://github.com/parse-community/parse-server/releases/tag/6.5.0)
5. [https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20](https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46720
- **State**: PUBLISHED
- **Published Date**: May 05, 2025 at 18:53 UTC
- **Last Updated**: May 05, 2025 at 19:00 UTC
- **Reserved Date**: April 28, 2025 at 20:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Keystone is a content management system for Node.js. Prior to version 6.5.0, `{field}.isFilterable` access control can be bypassed in `update` and `delete` mutations by adding additional unique filters. These filters can be used as an oracle to probe the existence or value of otherwise unreadable fields. Specifically, when a mutation includes a `where` clause with multiple unique filters (e.g. `id` and `email`), Keystone will attempt to match records even if filtering by the latter fields would normally be rejected by `field.isFilterable` or `list.defaultIsFilterable`. This can allow malicious actors to infer the presence of a particular field value when a filter is successful in returning a result. This affects any project relying on the default or dynamic `isFilterable` behavior (at the list or field level) to prevent external users from using the filtering of fields as a discovery mechanism. While this access control is respected during `findMany` operations, it was not completely enforced during `update` and `delete` mutations when accepting more than one unique `where` values in filters. This has no impact on projects using `isFilterable: false` or `defaultIsFilterable: false` for sensitive fields, or for those who have otherwise omitted filtering by these fields from their GraphQL schema. This issue has been patched in `@keystone-6/core` version 6.5.0. To mitigate this issue in older versions where patching is not a viable pathway, set `isFilterable: false` statically for relevant fields to prevent filtering by them earlier in the access control pipeline (that is, don't use functions); set `{field}.graphql.omit.read: true` for relevant fields, which implicitly removes filtering by these fields from the GraphQL schema; and/or deny `update` and `delete` operations for the relevant lists completely.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
- CWE-200: Improper Input Validation
### Affected Products
**keystonejs - keystone**
Affected versions:
- < 6.5.0 (Status: affected)
### References
1. [https://github.com/keystonejs/keystone/security/advisories/GHSA-hg9m-67mm-7pg3](https://github.com/keystonejs/keystone/security/advisories/GHSA-hg9m-67mm-7pg3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23511
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 03:03 UTC
- **Reserved Date**: January 12, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, tvOS 16.3, watchOS 9.3. An app may be able to bypass Privacy preferences.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213606)
2. [](https://support.apple.com/en-us/HT213601)
3. [](https://support.apple.com/en-us/HT213605)
4. [](https://support.apple.com/en-us/HT213604)
5. [](https://support.apple.com/en-us/HT213599) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20172
- **State**: PUBLISHED
- **Published Date**: January 18, 2023 at 14:58 UTC
- **Last Updated**: August 05, 2024 at 21:45 UTC
- **Reserved Date**: January 17, 2023 at 14:57 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ridhoq soundslike. It has been classified as critical. Affected is the function get_song_relations of the file app/api/songs.py. The manipulation leads to sql injection. The patch is identified as 90bb4fb667d9253d497b619b9adaac83bf0ce0f8. It is recommended to apply a patch to fix this issue. VDB-218490 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**ridhoq - soundslike**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218490)
2. [](https://vuldb.com/?ctiid.218490)
3. [](https://github.com/ridhoq/soundslike/pull/5)
4. [](https://github.com/ridhoq/soundslike/commit/90bb4fb667d9253d497b619b9adaac83bf0ce0f8)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1000005, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1000005 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1000005
- **State**: PUBLISHED
- **Published Date**: February 19, 2020 at 12:38 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: July 05, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
mcrypt_get_block_size did not enforce that the provided "module" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89)
2. [](https://www.facebook.com/security/advisories/cve-2016-1000005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1826
- **State**: PUBLISHED
- **Published Date**: March 26, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:50 UTC
- **Reserved Date**: January 29, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the iThoughtsHD app 4.19 for iOS on iPad devices, when the WiFi Transfer feature is used, allows remote attackers to inject arbitrary web script or HTML via a crafted map name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.madirish.net/559) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28506
- **State**: PUBLISHED
- **Published Date**: January 14, 2022 at 19:04 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: March 16, 2021 at 00:00 UTC
- **Assigned By**: Arista
### Vulnerability Description
An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Arista Networks - EOS**
Affected versions:
- 4.26.2F (Status: affected)
- 4.25.5.1M (Status: affected)
- 4.25.4M (Status: affected)
- 4.25.3 (Status: affected)
- 4.24.7M (Status: affected)
### References
1. [](https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5904
- **State**: PUBLISHED
- **Published Date**: November 01, 2023 at 00:01 UTC
- **Last Updated**: February 27, 2025 at 20:37 UTC
- **Reserved Date**: November 01, 2023 at 00:01 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pkp - pkp/pkp-lib**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/4df6bce6-dbe3-48e4-9830-e95cdc5138b6)
2. [](https://github.com/pkp/pkp-lib/commit/aa5c6acb634fbe460765facb2dc26df4b0d7424b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4946
- **State**: PUBLISHED
- **Published Date**: January 03, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 06:32 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Rational LifeCycle Project Administration in Jazz Team Server in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Team Concert (RTC) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Requirements Composer (RRC) 3.x before 3.0.1.6 IF7 and 4.x before 4.0.7 IF9; Rational DOORS Next Generation (RDNG) 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Engineering Lifecycle Manager (RELM) 4.x through 4.0.7, 5.x through 5.0.2, and 6.x before 6.0.1; Rational Rhapsody Design Manager (DM) 4.x through 4.0.7, 5.x through 5.0.2, and 6.x before 6.0.1; and Rational Software Architect Design Manager (DM) 4.x through 4.0.7, 5.x through 5.0.2, and 6.x before 6.0.1 allows local users to bypass intended access restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21973404) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0864
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 15:35 UTC
- **Last Updated**: August 02, 2024 at 23:40 UTC
- **Reserved Date**: March 04, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.22.9 does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - UpdraftPlus WordPress Backup Plugin**
Affected versions:
- 1.22.9 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872)
2. [](http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html)
### Credits
- Taurus Omar |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47899
- **State**: PUBLISHED
- **Published Date**: January 31, 2025 at 03:17 UTC
- **Last Updated**: March 18, 2025 at 20:03 UTC
- **Reserved Date**: October 04, 2024 at 16:08 UTC
- **Assigned By**: imaginationtech
### Vulnerability Description
Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Imagination Technologies - Graphics DDK**
Affected versions:
- 1.17 RTM (Status: affected)
- 25.1 RTM (Status: unaffected)
### References
1. [](https://www.imaginationtech.com/gpu-driver-vulnerabilities/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2537
- **State**: PUBLISHED
- **Published Date**: September 30, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: June 30, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a (1) BTRFS_IOC_CLONE or (2) BTRFS_IOC_CLONE_RANGE ioctl call that specifies this file as a donor.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1041-1](http://www.ubuntu.com/usn/USN-1041-1)
2. [[oss-security] 20100721 Re: CVE request: kernel: btrfs](http://www.openwall.com/lists/oss-security/2010/07/21/10)
3. [SUSE-SA:2010:040](http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html)
4. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35)
5. [42758](http://secunia.com/advisories/42758)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=616998)
7. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ebc3464781ad24474abcbd2274e6254689853b5)
8. [ADV-2011-0070](http://www.vupen.com/english/advisories/2011/0070)
9. [[oss-security] 20100721 CVE request: kernel: btrfs](http://www.openwall.com/lists/oss-security/2010/07/21/4)
10. [41847](http://www.securityfocus.com/bid/41847) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15396, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15396 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15396
- **State**: PUBLISHED
- **Published Date**: August 28, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 17, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**n/a - Google Chrome prior to 62.0.3202.75 unknown**
Affected versions:
- Google Chrome prior to 62.0.3202.75 unknown (Status: affected)
### References
1. [](http://bugs.icu-project.org/trac/changeset/40494)
2. [RHSA-2017:3082](https://access.redhat.com/errata/RHSA-2017:3082)
3. [](https://crbug.com/770452)
4. [DSA-4020](https://www.debian.org/security/2017/dsa-4020)
5. [101597](http://www.securityfocus.com/bid/101597)
6. [](https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html)
7. [GLSA-201711-02](https://security.gentoo.org/glsa/201711-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0293
- **State**: PUBLISHED
- **Published Date**: April 04, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: April 04, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in FtpXQ FTP server 2.0.93 allows remote attackers to read arbitrary files via a .. (dot dot) in the GET command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010228 Vulnerability in FtpXQ Server](http://archives.neohapsis.com/archives/bugtraq/2001-02/0508.html)
2. [2426](http://www.securityfocus.com/bid/2426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27399
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 17:15 UTC
- **Last Updated**: February 27, 2025 at 17:59 UTC
- **Reserved Date**: February 24, 2025 at 15:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Mastodon is a self-hosted, federated microblogging platform. In versions prior to 4.1.23, 4.2.16, and 4.3.4, when the visibility for domain blocks/reasons is set to "users" (localized English string: "To logged-in users"), users that are not yet approved can view the block reasons. Instance admins that do not want their domain blocks to be public are impacted. Versions 4.1.23, 4.2.16, and 4.3.4 fix the issue.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
- CWE-285: Security Weakness
### Affected Products
**mastodon - mastodon**
Affected versions:
- < 4.1.23 (Status: affected)
- >= 4.2.0, < 4.2.16 (Status: affected)
- >= 4.3.0, < 4.3.4 (Status: affected)
### References
1. [https://github.com/mastodon/mastodon/security/advisories/GHSA-94h4-fj37-c825](https://github.com/mastodon/mastodon/security/advisories/GHSA-94h4-fj37-c825)
2. [https://github.com/mastodon/mastodon/commit/6b519cfefa93a923b19d0f20c292c7185f8fd5f5](https://github.com/mastodon/mastodon/commit/6b519cfefa93a923b19d0f20c292c7185f8fd5f5)
3. [https://github.com/mastodon/mastodon/blob/93f0427b8a84faf68d5d02cdf9a26f98fae16f2b/app/controllers/api/v1/instances/domain_blocks_controller.rb#L33-L35](https://github.com/mastodon/mastodon/blob/93f0427b8a84faf68d5d02cdf9a26f98fae16f2b/app/controllers/api/v1/instances/domain_blocks_controller.rb#L33-L35)
4. [https://github.com/mastodon/mastodon/blob/93f0427b8a84faf68d5d02cdf9a26f98fae16f2b/app/controllers/api/v1/instances/domain_blocks_controller.rb#L49-L51](https://github.com/mastodon/mastodon/blob/93f0427b8a84faf68d5d02cdf9a26f98fae16f2b/app/controllers/api/v1/instances/domain_blocks_controller.rb#L49-L51) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40195
- **State**: PUBLISHED
- **Published Date**: August 28, 2023 at 07:50 UTC
- **Last Updated**: April 23, 2025 at 16:19 UTC
- **Reserved Date**: August 10, 2023 at 09:26 UTC
- **Assigned By**: apache
### Vulnerability Description
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.
When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.
To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
- CWE-829: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Airflow Spark Provider**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/apache/airflow/pull/33233)
2. [](https://lists.apache.org/thread/fzy95b1d6zv31j5wrx3znhzcscck2o24)
### Credits
- happyhacking-k |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10041
- **State**: PUBLISHED
- **Published Date**: October 23, 2024 at 13:46 UTC
- **Last Updated**: January 02, 2025 at 14:21 UTC
- **Reserved Date**: October 16, 2024 at 16:13 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-922: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 1.6.0 (Status: affected)
**Red Hat - Red Hat Enterprise Linux 8**
Affected versions:
- 0:1.3.1-36.el8_10 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:1.5.1-21.el9_5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9**
Affected versions:
- 0:1.5.1-21.el9_5 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 9.4 Extended Update Support**
Affected versions:
- 0:1.5.1-21.el9_4 (Status: unaffected)
**Red Hat - Red Hat Enterprise Linux 7**
### References
1. [RHSA-2024:10379](https://access.redhat.com/errata/RHSA-2024:10379)
2. [RHSA-2024:11250](https://access.redhat.com/errata/RHSA-2024:11250)
3. [RHSA-2024:9941](https://access.redhat.com/errata/RHSA-2024:9941)
4. [](https://access.redhat.com/security/cve/CVE-2024-10041)
5. [RHBZ#2319212](https://bugzilla.redhat.com/show_bug.cgi?id=2319212) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1044
- **State**: PUBLISHED
- **Published Date**: February 26, 2023 at 12:20 UTC
- **Last Updated**: August 02, 2024 at 05:32 UTC
- **Reserved Date**: February 26, 2023 at 12:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in MuYuCMS 2.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The manipulation of the argument file_path leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221803.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-23: Security Weakness
### Affected Products
**n/a - MuYuCMS**
Affected versions:
- 2.2 (Status: affected)
### References
1. [](https://vuldb.com/?id.221803)
2. [](https://vuldb.com/?ctiid.221803)
3. [](https://github.com/MuYuCMS/MuYuCMS/issues/5)
### Credits
- kaga_cve (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22461
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 14:26 UTC
- **Last Updated**: April 09, 2025 at 04:00 UTC
- **Reserved Date**: January 07, 2025 at 02:19 UTC
- **Assigned By**: ivanti
### Vulnerability Description
SQL injection in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote authenticated attacker with admin privileges to achieve code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Ivanti - Endpoint Manager**
Affected versions:
- 2024 SU1 (Status: unaffected)
- 2022 SU7 (Status: unaffected)
### References
1. [](https://forums.ivanti.com/s/article/Security-Advisory-EPM-April-2025-for-EPM-2024-and-EPM-2022-SU6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0006
- **State**: PUBLISHED
- **Published Date**: January 13, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62184](http://secunia.com/advisories/62184)
2. [MS15-005](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-005)
3. [71930](http://www.securityfocus.com/bid/71930)
4. [win-ms15kb3022777-update(99522)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99522)
5. [62098](http://secunia.com/advisories/62098)
6. [ms-nla-cve20150006-security-bypass(99521)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99521) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4124
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 13:41 UTC
- **Last Updated**: April 14, 2025 at 18:14 UTC
- **Reserved Date**: November 23, 2022 at 09:33 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF checks when deleting popups, which could allow unauthenticated users to delete them
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Popup Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1927
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:07 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the map feature (tiki-map.phtml) in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to determine the existence of arbitrary files via .. (dot dot) sequences in the mapfile parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10100](http://www.securityfocus.com/bid/10100)
2. [20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]](http://marc.info/?l=bugtraq&m=108180073206947&w=2)
3. [11344](http://secunia.com/advisories/11344)
4. [](http://tikiwiki.org/tiki-read_article.php?articleId=66)
5. [tikiwiki-tikimap-file-disclosure(15848)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15848) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28407
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 19:34 UTC
- **Reserved Date**: November 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/stefanberger/swtpm/releases/tag/v0.4.2)
2. [](https://bugzilla.suse.com/show_bug.cgi?id=1198395)
3. [](https://github.com/stefanberger/swtpm/releases/tag/v0.5.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4847
- **State**: PUBLISHED
- **Published Date**: June 20, 2007 at 22:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: June 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Spey 0.3.3 has unknown impact and attack vectors related to "A number of security holes which could lead to compromise," a different issue than CVE-2005-4846.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/forum/forum.php?forum_id=514029)
2. [38887](http://www.osvdb.org/38887) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47650
- **State**: PUBLISHED
- **Published Date**: November 18, 2023 at 21:20 UTC
- **Last Updated**: August 02, 2024 at 21:16 UTC
- **Reserved Date**: November 07, 2023 at 17:36 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Add Local Avatar.This issue affects Add Local Avatar: from n/a through 12.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Peter Sterling - Add Local Avatar**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/add-local-avatar/wordpress-add-local-avatar-plugin-12-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- LEE SE HYOUNG (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12453
- **State**: PUBLISHED
- **Published Date**: August 04, 2017 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: August 04, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=21813) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3079, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3079
- **State**: PUBLISHED
- **Published Date**: June 05, 2023 at 21:40 UTC
- **Last Updated**: February 13, 2025 at 16:49 UTC
- **Reserved Date**: June 02, 2023 at 21:29 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 114.0.5735.110 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1450481)
3. [](https://www.couchbase.com/alerts/)
4. [](https://www.debian.org/security/2023/dsa-5420)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/)
7. [](https://security.gentoo.org/glsa/202311-11)
8. [](http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html)
9. [](http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html)
10. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6781, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6781
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 08:32 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 13, 2023 at 14:44 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom fields in all versions up to, and including, 2.10.26 due to insufficient input sanitization and output escaping on user supplied values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**themeisle - Orbit Fox by ThemeIsle**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/23e39019-c322-4027-84f2-faabd9ca4983?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/obfx_modules/header-footer-scripts/init.php#L315)
3. [](https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/obfx_modules/header-footer-scripts/init.php#L34)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3011567%40themeisle-companion%2Ftrunk&old=2991564%40themeisle-companion%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Nex Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23410
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 21:04 UTC
- **Last Updated**: November 08, 2024 at 08:21 UTC
- **Reserved Date**: January 18, 2022 at 00:00 UTC
- **Assigned By**: Axis
### Vulnerability Description
AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Axis Communications AB - AXIS IP Utility**
Affected versions:
- All version prior to 4.18.0 (Status: affected)
### References
1. [](https://www.axis.com/files/tech_notes/CVE-2022-23410.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31377
- **State**: PUBLISHED
- **Published Date**: October 19, 2021 at 18:17 UTC
- **Last Updated**: September 16, 2024 at 17:28 UTC
- **Reserved Date**: April 15, 2021 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS). Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S8, 18.4R3-S7; 19.1 versions prior to 19.1R2-S3, 19.1R3-S5; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R1-S1, 20.4R2.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-732: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 15.1 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- 19.1 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.1 (Status: affected)
- 20.2 (Status: affected)
- 20.3 (Status: affected)
- 20.4 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8463
- **State**: PUBLISHED
- **Published Date**: January 12, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:20 UTC
- **Reserved Date**: October 05, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A denial of service vulnerability in the Qualcomm FUSE file system could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30786860. References: QC-CR#586855.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-01-01.html)
2. [95245](http://www.securityfocus.com/bid/95245) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46942
- **State**: PUBLISHED
- **Published Date**: January 13, 2024 at 00:00 UTC
- **Last Updated**: June 03, 2025 at 14:03 UTC
- **Reserved Date**: October 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lack of authentication in NPM's package @evershop/evershop before version 1.0.0-rc.8, allows remote attackers to obtain sensitive information via improper authorization in GraphQL endpoints.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://devhub.checkmarx.com/cve-details/Cx00cea2d5-d2c5/)
2. [](https://devhub.checkmarx.com/cve-details/CVE-2023-46942/)
3. [](https://advisory.checkmarx.net/advisory/CVE-2023-46942) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27332
- **State**: PUBLISHED
- **Published Date**: April 01, 2024 at 21:51 UTC
- **Last Updated**: August 21, 2024 at 22:34 UTC
- **Reserved Date**: February 23, 2024 at 19:42 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22288.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 10.1.1.381 (Status: affected)
### References
1. [ZDI-24-197](https://www.zerodayinitiative.com/advisories/ZDI-24-197/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0238
- **State**: PUBLISHED
- **Published Date**: July 21, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4981)
2. [APPLE-SA-2011-10-12-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html)
3. [APPLE-SA-2011-10-11-1](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html)
4. [](http://support.apple.com/kb/HT4999)
5. [](http://support.apple.com/kb/HT4808)
6. [APPLE-SA-2011-07-20-1](http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21486, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21486 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21486
- **State**: PUBLISHED
- **Published Date**: May 04, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 16:28 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper export of android application components vulnerability in ImagePreviewActivity in Call Settings to SMR May-2023 Release 1 allows physical attackers to access some media data stored in sandbox.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-926: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- Android 11, 12, 13 (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=05) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0635
- **State**: PUBLISHED
- **Published Date**: July 08, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 07, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1010655](http://securitytracker.com/id?1010655)
2. [CLA-2005:916](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916)
3. [MDKSA-2004:067](http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067)
4. [](http://www.ethereal.com/appnotes/enpa-sa-00015.html)
5. [12024](http://secunia.com/advisories/12024)
6. [oval:org.mitre.oval:def:9721](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721)
7. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381)
8. [FEDORA-2004-219](http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html)
9. [ethereal-snmp-community-dos(16632)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16632)
10. [FEDORA-2004-220](http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html)
11. [DSA-528](http://www.debian.org/security/2004/dsa-528)
12. [VU#835846](http://www.kb.cert.org/vuls/id/835846)
13. [RHSA-2004:378](http://www.redhat.com/support/errata/RHSA-2004-378.html)
14. [GLSA-200407-08](http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26343
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:12 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2090
- **State**: PUBLISHED
- **Published Date**: June 30, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 30, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.fujitsu.com/global/support/software/security/products-f/interstage-200703e.html)
2. [](http://tomcat.apache.org/security-4.html)
3. [30908](http://secunia.com/advisories/30908)
4. [[Security-announce] 20080107 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1](http://lists.vmware.com/pipermail/security-announce/2008/000003.html)
5. [ADV-2007-2732](http://www.vupen.com/english/advisories/2007/2732)
6. [13873](http://www.securityfocus.com/bid/13873)
7. [239312](http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1)
8. [ADV-2007-3087](http://www.vupen.com/english/advisories/2007/3087)
9. [30899](http://secunia.com/advisories/30899)
10. [29242](http://secunia.com/advisories/29242)
11. [ADV-2008-1979](http://www.vupen.com/english/advisories/2008/1979/references)
12. [APPLE-SA-2007-07-31](http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html)
13. [ADV-2008-0065](http://www.vupen.com/english/advisories/2008/0065)
14. [20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)](http://www.securityfocus.com/archive/1/500412/100/0/threaded)
15. [SUSE-SR:2008:005](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html)
16. [33668](http://secunia.com/advisories/33668)
17. [20080108 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1](http://www.securityfocus.com/archive/1/485938/100/0/threaded)
18. [20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/500396/100/0/threaded)
19. [RHSA-2007:0360](http://www.redhat.com/support/errata/RHSA-2007-0360.html)
20. [ADV-2009-0233](http://www.vupen.com/english/advisories/2009/0233)
21. [oval:org.mitre.oval:def:10499](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10499)
22. [28365](http://secunia.com/advisories/28365)
23. [](http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm)
24. [](http://tomcat.apache.org/security-6.html)
25. [ADV-2007-3386](http://www.vupen.com/english/advisories/2007/3386)
26. [](http://www.securiteam.com/securityreviews/5GP0220G0U.html)
27. [](http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf)
28. [RHSA-2007:0327](http://www.redhat.com/support/errata/RHSA-2007-0327.html)
29. [27037](http://secunia.com/advisories/27037)
30. [1014365](http://securitytracker.com/id?1014365)
31. [](http://docs.info.apple.com/article.html?artnum=306172)
32. [SSRT071447](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
33. [HPSBUX02262](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795)
34. [](http://tomcat.apache.org/security-5.html)
35. [25159](http://www.securityfocus.com/bid/25159)
36. [26660](http://secunia.com/advisories/26660)
37. [RHSA-2008:0261](http://www.redhat.com/support/errata/RHSA-2008-0261.html)
38. [20050606 A new whitepaper by Watchfire - HTTP Request Smuggling](http://seclists.org/lists/bugtraq/2005/Jun/0025.html)
39. [](http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx)
40. [](http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540)
41. [26235](http://secunia.com/advisories/26235)
42. [[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E)
43. [[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E)
44. [[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E)
45. [[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E)
46. [[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E)
47. [[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E)
48. [[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E)
49. [[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E)
50. [[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-39387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-39387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-39387
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 16:08 UTC
- **Last Updated**: April 25, 2025 at 13:56 UTC
- **Reserved Date**: April 16, 2025 at 06:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WPoperation Opstore allows PHP Local File Inclusion. This issue affects Opstore: from n/a through 1.4.5.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**WPoperation - Opstore**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/theme/opstore/vulnerability/wordpress-opstore-theme-1-4-5-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2205
- **State**: PUBLISHED
- **Published Date**: June 22, 2011 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: May 31, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Prosody before 0.8.1 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.prosody.im/prosody-0-8-1-released/)
2. [](http://hg.prosody.im/0.8/rev/5305a665bdd4)
3. [prosody-xml-dos(67884)](https://exchange.xforce.ibmcloud.com/vulnerabilities/67884)
4. [](http://hg.prosody.im/0.8/rev/ee6a18f10a8d)
5. [[oss-security] 20110615 Re: CVE Request: prosody DoS, djabberd external entity injection](http://www.openwall.com/lists/oss-security/2011/06/15/5)
6. [44852](http://secunia.com/advisories/44852)
7. [](http://prosody.im/doc/release/0.8.1)
8. [[oss-security] 20110614 CVE Request: prosody DoS, djabberd external entity injection](http://www.openwall.com/lists/oss-security/2011/06/14/6)
9. [48125](http://www.securityfocus.com/bid/48125) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2608
- **State**: PUBLISHED
- **Published Date**: December 04, 2005 at 11:00 UTC
- **Last Updated**: August 08, 2024 at 01:36 UTC
- **Reserved Date**: December 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SmartWebby Smart Guest Book stores SmartGuestBook.mdb (aka the "news database") under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as the unencrypted username and password of the administrator's account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9363](http://www.osvdb.org/9363)
2. [12401](http://secunia.com/advisories/12401)
3. [smart-guestbook-database-file-access(17146)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17146)
4. [1011084](http://securitytracker.com/id?1011084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0660
- **State**: PUBLISHED
- **Published Date**: February 01, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:26 UTC
- **Reserved Date**: February 01, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the IFrame module before 03.02.01 for DotNetNuke (DNN) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "Pass through values."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [dotnetnuke-iframe-unspecified-xss(32037)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32037)
2. [](http://www.dotnetnuke.com/Default.aspx?tabid=825&EntryID=1278)
3. [22334](http://www.securityfocus.com/bid/22334)
4. [36476](http://osvdb.org/36476)
5. [ADV-2007-0433](http://www.vupen.com/english/advisories/2007/0433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32833, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32833 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32833
- **State**: PUBLISHED
- **Published Date**: April 24, 2024 at 08:28 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 18, 2024 at 11:08 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nick Halsey List Custom Taxonomy Widget allows Stored XSS.This issue affects List Custom Taxonomy Widget: from n/a through 4.1.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nick Halsey - List Custom Taxonomy Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/list-custom-taxonomy-widget/wordpress-list-custom-taxonomy-widget-plugin-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5700
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 03, 2006 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25764
- **State**: PUBLISHED
- **Published Date**: March 18, 2021 at 19:20 UTC
- **Last Updated**: August 03, 2024 at 20:11 UTC
- **Reserved Date**: January 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In JetBrains PhpStorm before 2020.3, source code could be added to debug logs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.jetbrains.com)
2. [](https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5595
- **State**: REJECTED
- **Published Date**: December 05, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 16:48 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5198
- **State**: PUBLISHED
- **Published Date**: October 04, 2007 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: October 04, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27965](http://secunia.com/advisories/27965)
2. [ADV-2007-3394](http://www.vupen.com/english/advisories/2007/3394)
3. [](http://bugs.gentoo.org/show_bug.cgi?id=194178)
4. [27609](http://secunia.com/advisories/27609)
5. [27124](http://secunia.com/advisories/27124)
6. [MDVSA-2008:067](http://www.mandriva.com/security/advisories?name=MDVSA-2008:067)
7. [28930](http://secunia.com/advisories/28930)
8. [29862](http://secunia.com/advisories/29862)
9. [](http://sourceforge.net/forum/forum.php?forum_id=740172)
10. [](http://sourceforge.net/tracker/index.php?func=detail&aid=1687867&group_id=29880&atid=397597)
11. [FEDORA-2008-3098](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00282.html)
12. [USN-532-1](http://www.ubuntu.com/usn/usn-532-1)
13. [25952](http://www.securityfocus.com/bid/25952)
14. [DSA-1495](http://www.debian.org/security/2008/dsa-1495)
15. [SUSE-SR:2007:025](http://www.novell.com/linux/security/advisories/2007_25_sr.html)
16. [27362](http://secunia.com/advisories/27362)
17. [](http://sourceforge.net/tracker/index.php?func=detail&aid=1813346&group_id=29880&atid=397597)
18. [GLSA-200711-11](http://security.gentoo.org/glsa/glsa-200711-11.xml)
19. [FEDORA-2008-3061](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00249.html)
20. [FEDORA-2008-3146](https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00320.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6884
- **State**: PUBLISHED
- **Published Date**: March 03, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 19, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TLS cipher suites with CBC mode in TLS 1.1 and 1.2 in MatrixSSL before 3.8.3 allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matrixssl/matrixssl/blob/master/CHANGES.md)
2. [[oss-security] 20160819 Re: CVE request: MatrixSSL lack of RSA-CRT hardening](http://www.openwall.com/lists/oss-security/2016/08/19/8)
3. [91488](http://www.securityfocus.com/bid/91488) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37003, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37003 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37003
- **State**: PUBLISHED
- **Published Date**: August 09, 2022 at 20:10 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: July 28, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.0 (Status: affected)
- 11.0.0 (Status: affected)
**Huawei - Magic UI**
Affected versions:
- 4.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/8/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27759, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27759
- **State**: PUBLISHED
- **Published Date**: May 06, 2022 at 18:10 UTC
- **Last Updated**: September 17, 2024 at 04:19 UTC
- **Reserved Date**: February 26, 2021 at 00:00 UTC
- **Assigned By**: HCL
### Vulnerability Description
This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application.
### CVSS Metrics
- **CVSS Base Score**: 2.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:L/IR:L/AR:L/MAV:A/MAC:H/MPR:L/MUI:R/MS:U/MC:X/MI:N/MA:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**HCL Software - HCL BigFix Inventory**
Affected versions:
- 9.x (Status: affected)
- 10.x (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10512
- **State**: PUBLISHED
- **Published Date**: November 06, 2019 at 17:11 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Payload size is not checked before using it as array index in audio in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SXR1130 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33842
- **State**: PUBLISHED
- **Published Date**: June 22, 2023 at 01:34 UTC
- **Last Updated**: December 04, 2024 at 21:39 UTC
- **Reserved Date**: May 23, 2023 at 00:31 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM SPSS Modeler on Windows 17.0, 18.0, 18.2.2, 18.3, 18.4, and 18.5 requires the end user to have access to the server SSL key which could allow a local user to decrypt and obtain sensitive information. IBM X-Force ID: 256117.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**IBM - SPSS Modeler**
Affected versions:
- 17.0, 18.0, 18.2.2, 18.3, 18.4, 18.5 (Status: affected)
### References
1. [](https://https://www.ibm.com/support/pages/node/7004299)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/256117) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10481
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 11:06 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSRF in admin/add-glossary.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to add a new glossary term via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=343#csrf4)
2. [](https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-adding-a-new-glossary-term-cve-2020-10481) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15379
- **State**: PUBLISHED
- **Published Date**: June 09, 2021 at 15:15 UTC
- **Last Updated**: August 04, 2024 at 13:15 UTC
- **Reserved Date**: June 29, 2020 at 00:00 UTC
- **Assigned By**: brocade
### Vulnerability Description
Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.
### Affected Products
**n/a - Brocade SANnav**
Affected versions:
- Brocade SANnav before v.2.1.0a (Status: affected)
### References
1. [](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2250
- **State**: PUBLISHED
- **Published Date**: February 03, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 19:26 UTC
- **Reserved Date**: April 16, 2012 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Tor before 0.2.3.24-rc allows remote attackers to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitweb.torproject.org/tor.git?a=blob_plain%3Bhb=HEAD%3Bf=ChangeLog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3763
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 04:50 UTC
- **Reserved Date**: December 28, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
In Nextcloud Calendar before 1.5.8 and 1.6.1, a missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nextcloud - Nextcloud Calendar application**
Affected versions:
- <1.6.1, <1.5.8 (Status: affected)
### References
1. [](https://nextcloud.com/security/advisory/?id=nc-sa-2018-004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7330
- **State**: PUBLISHED
- **Published Date**: October 17, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: February 20, 2014 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jenkinsci/jenkins/commit/36342d71e29e0620f803a7470ce96c61761648d8)
2. [[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)](http://www.openwall.com/lists/oss-security/2014/02/21/2)
3. [](https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6603
- **State**: PUBLISHED
- **Published Date**: March 28, 2019 at 20:13 UTC
- **Last Updated**: August 04, 2024 at 20:23 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs.
### Affected Products
**BIG-IP - BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator)**
Affected versions:
- 11.5.1-11.5.8 (Status: affected)
- 11.6.1-11.6.3 (Status: affected)
- 12.1.0-12.1.3 (Status: affected)
- 13.0.0-13.0.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K14632915)
2. [107625](http://www.securityfocus.com/bid/107625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4695
- **State**: PUBLISHED
- **Published Date**: March 10, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: March 10, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in RadScripts RadLance Gold 7.5 allows remote attackers to execute arbitrary SQL commands via the fid parameter in a view_forum action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35826](http://secunia.com/advisories/35826)
2. [55948](http://www.osvdb.org/55948)
3. [9195](http://www.exploit-db.com/exploits/9195)
4. [radlance-index-sql-injection(51834)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51834)
5. [35730](http://www.securityfocus.com/bid/35730) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1689
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 19:42 UTC
- **Last Updated**: October 08, 2024 at 16:17 UTC
- **Reserved Date**: December 02, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Multipoint Management Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [Windows Multipoint Management Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32750
- **State**: PUBLISHED
- **Published Date**: June 08, 2023 at 00:00 UTC
- **Last Updated**: January 06, 2025 at 20:40 UTC
- **Reserved Date**: May 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pydio Cells through 4.1.2 allows SSRF. For longer running processes, Pydio Cells allows for the creation of jobs, which are run in the background. The job "remote-download" can be used to cause the backend to send a HTTP GET request to a specified URL and save the response to a new file. The response file is then available in a user-specified folder in Pydio Cells.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses)
2. [](https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7911
- **State**: PUBLISHED
- **Published Date**: August 02, 2019 at 21:26 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
A server-side request forgery (SSRF) vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to the admin panel to manipulate system configuration and execute arbitrary code.
### Affected Products
**n/a - Magento 1 Magento 2**
Affected versions:
- Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 (Status: affected)
### References
1. [](https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-44277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-44277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-44277
- **State**: PUBLISHED
- **Published Date**: December 01, 2021 at 13:36 UTC
- **Last Updated**: August 04, 2024 at 04:17 UTC
- **Reserved Date**: November 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/librenms/librenms/pull/13554) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2871
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:09 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Human Resources component of Oracle E-Business Suite (subcomponent: General Utilities). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
### Affected Products
**Oracle Corporation - Human Resources**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
- 12.2.7 (Status: affected)
### References
1. [1040694](http://www.securitytracker.com/id/1040694)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
3. [103834](http://www.securityfocus.com/bid/103834) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0053
- **State**: PUBLISHED
- **Published Date**: February 10, 2016 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1034976](http://www.securitytracker.com/id/1034976)
2. [MS16-015](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-015)
3. [1034975](http://www.securitytracker.com/id/1034975) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4171
- **State**: PUBLISHED
- **Published Date**: January 17, 2022 at 09:45 UTC
- **Last Updated**: August 03, 2024 at 17:16 UTC
- **Reserved Date**: December 26, 2021 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
calibre-web is vulnerable to Business Logic Errors
### Weakness Classification (CWE)
- CWE-840: Security Weakness
### Affected Products
**janeczku - janeczku/calibre-web**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c)
2. [](https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5133
- **State**: PUBLISHED
- **Published Date**: February 07, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 02, 2017 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Off-by-one read/write on the heap in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to corrupt memory and possibly leak information and potentially execute code via a crafted PDF file.
### Affected Products
**n/a - Google Chrome prior to 62.0.3202.62**
Affected versions:
- Google Chrome prior to 62.0.3202.62 (Status: affected)
### References
1. [101482](http://www.securityfocus.com/bid/101482)
2. [](https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html)
3. [](https://crbug.com/762106)
4. [DSA-4020](https://www.debian.org/security/2017/dsa-4020)
5. [RHSA-2017:2997](https://access.redhat.com/errata/RHSA-2017:2997)
6. [GLSA-201710-24](https://security.gentoo.org/glsa/201710-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39747
- **State**: PUBLISHED
- **Published Date**: March 30, 2022 at 16:02 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Settings Provider, there is a possible way to list values of non-readable global settings due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208268457
### Affected Products
**n/a - Android**
Affected versions:
- Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-12l) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12584
- **State**: PUBLISHED
- **Published Date**: July 16, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ConnectionBase::preparseNewBytes function in resip/stack/ConnectionBase.cxx in reSIProcate through 1.10.2 allows remote attackers to cause a denial of service (buffer overflow) or possibly execute arbitrary code when TLS communication is enabled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [45174](https://www.exploit-db.com/exploits/45174/)
2. [](https://github.com/resiprocate/resiprocate/commit/2cb291191c93c7c4e371e22cb89805a5b31d6608)
3. [[debian-lts-announce] 20180724 [SECURITY] [DLA 1439-1] resiprocate security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00031.html)
4. [20180808 [CVE-2018-12584] Heap overflow vulnerability in reSIProcate through 1.10.2](http://seclists.org/bugtraq/2018/Aug/14)
5. [](https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html)
6. [](http://joachimdezutter.webredirect.org/advisory.html)
7. [[debian-lts-announce] 20211229 [SECURITY] [DLA 2865-1] resiprocate security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00029.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1011
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 15:13 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows System Assessment Tool improperly handles file operations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1009, CVE-2020-1015.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4812
- **State**: PUBLISHED
- **Published Date**: October 09, 2006 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 19:23 UTC
- **Reserved Date**: September 15, 2006 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22300](http://secunia.com/advisories/22300)
2. [22650](http://secunia.com/advisories/22650)
3. [1016984](http://securitytracker.com/id?1016984)
4. [22281](http://secunia.com/advisories/22281)
5. [22338](http://secunia.com/advisories/22338)
6. [20349](http://www.securityfocus.com/bid/20349)
7. [OpenPKG-SA-2006.023](http://www.securityfocus.com/archive/1/448953/100/0/threaded)
8. [GLSA-200610-14](http://www.gentoo.org/security/en/glsa/glsa-200610-14.xml)
9. [2006-0055](http://www.trustix.org/errata/2006/0055)
10. [RHSA-2006:0688](http://rhn.redhat.com/errata/RHSA-2006-0688.html)
11. [USN-362-1](http://www.ubuntu.com/usn/usn-362-1)
12. [RHSA-2006:0708](http://rhn.redhat.com/errata/RHSA-2006-0708.html)
13. [22538](http://secunia.com/advisories/22538)
14. [1691](http://securityreason.com/securityalert/1691)
15. [](http://www.hardened-php.net/advisory_092006.133.html)
16. [22533](http://secunia.com/advisories/22533)
17. [](http://www.hardened-php.net/files/CVE-2006-4812.patch)
18. [](http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm)
19. [php-ecalloc-integer-overflow(29362)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29362)
20. [](http://cvs.php.net/viewvc.cgi/ZendEngine2/zend_alloc.c?r1=1.161&r2=1.162)
21. [SUSE-SA:2006:059](http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html)
22. [20061009 Advisory 09/2006: PHP unserialize() Array Creation Integer Overflow](http://www.securityfocus.com/archive/1/448014/100/0/threaded)
23. [22331](http://secunia.com/advisories/22331)
24. [ADV-2006-3922](http://www.vupen.com/english/advisories/2006/3922)
25. [22280](http://secunia.com/advisories/22280)
26. [](http://support.avaya.com/elmodocs2/security/ASA-2006-234.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1972
- **State**: PUBLISHED
- **Published Date**: April 22, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 13:13 UTC
- **Reserved Date**: April 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PatrolAgent.exe in BMC Performance Manager does not require authentication for requests to modify configuration files, which allows remote attackers to execute arbitrary code via a request on TCP port 3181 for modification of the masterAgentName and masterAgentStartLine SNMP parameters. NOTE: the vendor disputes this vulnerability, stating that it does not exist when the system is properly configured
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070418 ZDI-07-020: BMC Performance Manager SNMP Command Execution Vulnerability](http://www.securityfocus.com/archive/1/466223/100/0/threaded)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-07-020.html)
3. [ADV-2007-1458](http://www.vupen.com/english/advisories/2007/1458)
4. [1017935](http://www.securitytracker.com/id?1017935)
5. [23559](http://www.securityfocus.com/bid/23559)
6. [2599](http://securityreason.com/securityalert/2599)
7. [20070419 Re: ZDI-07-020: BMC Performance Manager SNMP Command Execution Vulnerability](http://www.securityfocus.com/archive/1/466274/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35095
- **State**: PUBLISHED
- **Published Date**: June 20, 2023 at 13:30 UTC
- **Last Updated**: October 10, 2024 at 18:13 UTC
- **Reserved Date**: June 13, 2023 at 15:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Flothemes Flo Forms – Easy Drag & Drop Form Builder plugin <= 1.0.40 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Flothemes - Flo Forms – Easy Drag & Drop Form Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/flo-forms/wordpress-flo-forms-plugin-1-0-40-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3150
- **State**: PUBLISHED
- **Published Date**: September 10, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 10, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Multi Website 1.5 allows remote attackers to execute arbitrary SQL commands via the Browse parameter in a vote action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9344](http://www.exploit-db.com/exploits/9344)
2. [ADV-2009-2132](http://www.vupen.com/english/advisories/2009/2132)
3. [36107](http://secunia.com/advisories/36107) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6030
- **State**: PUBLISHED
- **Published Date**: February 03, 2009 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 11:13 UTC
- **Reserved Date**: February 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in NetArtMedia Jobs Portal 1.3 allow remote attackers to execute arbitrary SQL commands via (1) the job parameter to index.php in the search module or (2) the news_id parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31937](http://secunia.com/advisories/31937)
2. [31281](http://www.securityfocus.com/bid/31281)
3. [6517](https://www.exploit-db.com/exploits/6517)
4. [jobsportal-index-sql-injection(45272)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45272) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7796
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160930 Re: CVE Request: systemd v209+: local denial-of-service attack](http://www.openwall.com/lists/oss-security/2016/09/30/1)
2. [](https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet)
3. [](https://github.com/systemd/systemd/issues/4234#issuecomment-250441246)
4. [SUSE-SU-2016:2475](http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=1381911)
6. [RHSA-2017:0003](http://rhn.redhat.com/errata/RHSA-2017-0003.html)
7. [SUSE-SU-2016:2476](http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html)
8. [1037320](http://www.securitytracker.com/id/1037320)
9. [93250](http://www.securityfocus.com/bid/93250)
10. [RHBA-2015:2092](https://rhn.redhat.com/errata/RHBA-2015-2092.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.