System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15953
- **State**: PUBLISHED
- **Published Date**: July 27, 2020 at 06:07 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dinhvh/libetpan/issues/386)
2. [GLSA-202007-55](https://security.gentoo.org/glsa/202007-55)
3. [[debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00026.html)
4. [FEDORA-2020-13ae5f7221](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFBWNA5REI5ZGW2DAOEAVHM23MOU6O5J/)
5. [FEDORA-2020-44e52ef729](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M65FVH5XPS23NLHFN3ABEGBSCHZAISXN/)
6. [openSUSE-SU-2020:1454](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html)
7. [openSUSE-SU-2020:1505](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00075.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1166
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in (1) Openfile.aspx and (2) Html.aspx in HTTP Commander 4.0 allows remote attackers to view arbitrary files via a .. (dot dot) in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2780](http://www.osvdb.org/2780)
2. [8948](http://www.securityfocus.com/bid/8948)
3. [](http://www.http-com.com/Default.asp?section=Features)
4. [10125](http://secunia.com/advisories/10125)
5. [http-commander-directory-traversal(13622)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13622) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0455
- **State**: PUBLISHED
- **Published Date**: February 11, 2009 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the anonymous comments feature in lib-comment.php in glFusion 1.1.0, 1.1.1, and earlier versions allows remote attackers to inject arbitrary web script or HTML via the username parameter to comment.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.fortconsult.net/images/pdf/advisories/glFusion-xss-advisory.pdf)
2. [33878](http://secunia.com/advisories/33878)
3. [](http://www.glfusion.org/article.php/xsscomments)
4. [33683](http://www.securityfocus.com/bid/33683)
5. [glfusion-libcomment-xss(48603)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36590
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:07 UTC
- **Last Updated**: April 14, 2025 at 22:46 UTC
- **Reserved Date**: June 23, 2023 at 20:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30224
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 05:02 UTC
- **Last Updated**: April 08, 2025 at 20:45 UTC
- **Reserved Date**: March 26, 2024 at 09:10 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Deserialization of Untrusted Data vulnerability in Wholesale Team WholesaleX.This issue affects WholesaleX: from n/a through 1.3.2.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Wholesale Team - WholesaleX**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wholesalex/wordpress-wholesalex-plugin-1-3-2-unauthenticated-php-object-injection-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3838
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 07:46 UTC
- **Last Updated**: February 13, 2025 at 17:53 UTC
- **Reserved Date**: April 15, 2024 at 17:25 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 124.0.6367.60 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html)
2. [](https://issues.chromium.org/issues/328278717)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6463
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 15:15 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70532](http://www.securityfocus.com/bid/70532)
2. [SUSE-SU-2015:0743](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
4. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2541
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 08:08 UTC
- **Last Updated**: September 04, 2024 at 07:00 UTC
- **Reserved Date**: May 05, 2023 at 08:31 UTC
- **Assigned By**: KNIME
### Vulnerability Description
The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**KNIME - KNIME Business Hub**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [](https://www.knime.com/security/advisories#CVE-2023-2541)
2. [](https://zigrin.com/advisories/knime-business-hub-sensitive-information-disclosure/)
### Credits
- Zigrin Security |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0812
- **State**: PUBLISHED
- **Published Date**: April 20, 2011 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: February 04, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Solaris component in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27918
- **State**: PUBLISHED
- **Published Date**: March 06, 2024 at 20:25 UTC
- **Last Updated**: August 05, 2024 at 18:06 UTC
- **Reserved Date**: February 28, 2024 at 15:14 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Coder allows oragnizations to provision remote development environments via Terraform. Prior to versions 2.6.1, 2.7.3, and 2.8.4, a vulnerability in Coder's OIDC authentication could allow an attacker to bypass the `CODER_OIDC_EMAIL_DOMAIN` verification and create an account with an email not in the allowlist. Deployments are only affected if the OIDC provider allows users to create accounts on the provider. During OIDC registration, the user's email was improperly validated against the allowed `CODER_OIDC_EMAIL_DOMAIN`s. This could allow a user with a domain that only partially matched an allowed domain to successfully login or register. An attacker could register a domain name that exploited this vulnerability and register on a Coder instance with a public OIDC provider.
Coder instances with OIDC enabled and protected by the `CODER_OIDC_EMAIL_DOMAIN` configuration are affected. Coder instances using a private OIDC provider are not affected, as arbitrary users cannot register through a private OIDC provider without first having an account on the provider. Public OIDC providers are impacted. GitHub authentication and external authentication are not impacted. This vulnerability is remedied in versions 2.8.4, 2.7.3, and 2.6.1 All versions prior to these patches are affected by the vulnerability.*It is recommended that customers upgrade their deployments as soon as possible if they are utilizing OIDC authentication with the `CODER_OIDC_EMAIL_DOMAIN` setting.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**coder - coder**
Affected versions:
- >= 2.8.0, < 2.8.4 (Status: affected)
- >= 2.7.0, < 2.7.3 (Status: affected)
- < 2.6.1 (Status: affected)
### References
1. [https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf](https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf)
2. [https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0](https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0)
3. [https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31](https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31)
4. [https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb](https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb)
5. [https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c](https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24954
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 17:03 UTC
- **Last Updated**: February 28, 2025 at 20:02 UTC
- **Reserved Date**: January 31, 2023 at 20:37 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft SharePoint Server Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Microsoft - Microsoft SharePoint Enterprise Server 2016**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server 2019**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft SharePoint Server Subscription Edition**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [Microsoft SharePoint Server Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45324
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 14:54 UTC
- **Last Updated**: March 12, 2025 at 04:00 UTC
- **Reserved Date**: August 27, 2024 at 06:43 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C`
### Weakness Classification (CWE)
- CWE-134: Security Weakness
### Affected Products
**Fortinet - FortiPAM**
Affected versions:
- 1.4.0 (Status: affected)
- 1.3.0 (Status: affected)
- 1.2.0 (Status: affected)
- 1.1.0 (Status: affected)
- 1.0.0 (Status: affected)
**Fortinet - FortiProxy**
Affected versions:
- 7.6.0 (Status: affected)
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
**Fortinet - FortiSRA**
Affected versions:
- 1.4.0 (Status: affected)
**Fortinet - FortiWeb**
Affected versions:
- 7.6.0 (Status: affected)
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
**Fortinet - FortiOS**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.2.0 (Status: affected)
### References
1. [https://fortiguard.fortinet.com/psirt/FG-IR-24-325](https://fortiguard.fortinet.com/psirt/FG-IR-24-325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43490, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43490 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43490
- **State**: PUBLISHED
- **Published Date**: March 14, 2024 at 16:45 UTC
- **Last Updated**: February 13, 2025 at 17:13 UTC
- **Reserved Date**: November 27, 2023 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-682: Security Weakness
### Affected Products
**n/a - Intel(R) Xeon(R) D Processors with Intel(R) SGX**
Affected versions:
- See references (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html)
2. [](https://security.netapp.com/advisory/ntap-20240405-0009/)
3. [](https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8119
- **State**: PUBLISHED
- **Published Date**: February 04, 2020 at 19:08 UTC
- **Last Updated**: August 04, 2024 at 09:48 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**n/a - Nextcloud Server**
Affected versions:
- 17.0.0 (Status: affected)
### References
1. [](https://hackerone.com/reports/719426)
2. [](https://nextcloud.com/security/advisory/?id=NC-SA-2019-012)
3. [openSUSE-SU-2020:0220](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00019.html)
4. [openSUSE-SU-2020:0229](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13544
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 06:00 UTC
- **Last Updated**: February 11, 2025 at 15:14 UTC
- **Reserved Date**: January 20, 2025 at 19:40 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Zarinpal Paid Download WordPress plugin through 2.3 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Zarinpal Paid Download**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/91884263-62a7-436e-b19f-682b1aeb37d6/)
### Credits
- Bob Matyas
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22128
- **State**: PUBLISHED
- **Published Date**: October 17, 2022 at 00:00 UTC
- **Last Updated**: May 13, 2025 at 20:10 UTC
- **Reserved Date**: December 21, 2021 at 00:00 UTC
- **Assigned By**: Salesforce
### Vulnerability Description
Tableau discovered a path traversal vulnerability affecting Tableau Server Administration Agent’s internal file transfer service that could allow remote code execution.Tableau only supports product versions for 24 months after release. Older versions have reached their End of Life and are no longer supported. They are also not assessed for potential security issues and do not receive security updates.
### Affected Products
**n/a - Tableau Server**
Affected versions:
- 2022.1 - 2022.1.42021.4 - 2021.4.92021.3 - 2021.3.142021.2 - 2021.2.152021.1 - 2021.1.172020.4 - 2020.4.20 (Status: affected)
### References
1. [](https://help.salesforce.com/s/articleView?id=000367027&type=1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38614, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38614 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38614
- **State**: PUBLISHED
- **Published Date**: June 19, 2024 at 13:56 UTC
- **Last Updated**: May 04, 2025 at 09:15 UTC
- **Reserved Date**: June 18, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
openrisc: traps: Don't send signals to kernel mode threads
OpenRISC exception handling sends signals to user processes on floating
point exceptions and trap instructions (for debugging) among others.
There is a bug where the trap handling logic may send signals to kernel
threads, we should not send these signals to kernel threads, if that
happens we treat it as an error.
This patch adds conditions to die if the kernel receives these
exceptions in kernel mode code.
### Affected Products
**Linux - Linux**
Affected versions:
- 27267655c5313ba0f5a3caa9ad35d887d9a12574 (Status: affected)
- 27267655c5313ba0f5a3caa9ad35d887d9a12574 (Status: affected)
- 27267655c5313ba0f5a3caa9ad35d887d9a12574 (Status: affected)
- 27267655c5313ba0f5a3caa9ad35d887d9a12574 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.4 (Status: affected)
- 0 (Status: unaffected)
- 6.6.33 (Status: unaffected)
- 6.8.12 (Status: unaffected)
- 6.9.3 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db)
2. [](https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538)
3. [](https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9)
4. [](https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26969
- **State**: PUBLISHED
- **Published Date**: April 14, 2023 at 00:00 UTC
- **Last Updated**: February 07, 2025 at 16:01 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Atropim 1.5.26 is vulnerable to Directory Traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/atrocore/atrocore-1.5.26) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32672
- **State**: PUBLISHED
- **Published Date**: October 04, 2021 at 17:40 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**redis - redis**
Affected versions:
- >= 3.2.0, < 5.0.14 (Status: affected)
- >= 6.0.0, < 6.0.16 (Status: affected)
- >= 6.0.0, < 6.2.6 (Status: affected)
### References
1. [](https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm)
2. [](https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd)
3. [FEDORA-2021-8913c7900c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/)
4. [FEDORA-2021-61c487f241](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/)
5. [FEDORA-2021-aa94492a09](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/)
6. [DSA-5001](https://www.debian.org/security/2021/dsa-5001)
7. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
8. [](https://security.netapp.com/advisory/ntap-20211104-0003/)
9. [GLSA-202209-17](https://security.gentoo.org/glsa/202209-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47319
- **State**: PUBLISHED
- **Published Date**: October 05, 2024 at 12:30 UTC
- **Last Updated**: October 08, 2024 at 15:37 UTC
- **Reserved Date**: September 24, 2024 at 13:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Bit Apps Bit Form – Contact Form Plugin allows Code Injection.This issue affects Bit Form – Contact Form Plugin: from n/a through 2.13.10.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Bit Apps - Bit Form – Contact Form Plugin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/bit-form/wordpress-bit-form-plugin-2-13-10-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Certus Cybersecurity (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11579
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 20:43 UTC
- **Last Updated**: December 04, 2024 at 21:42 UTC
- **Reserved Date**: November 20, 2024 at 22:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of obj files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23697.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Luxion - KeyShot**
Affected versions:
- 2024 13.0.0 Build 92 4.10.171 (Status: affected)
### References
1. [ZDI-24-1610](https://www.zerodayinitiative.com/advisories/ZDI-24-1610/)
2. [vendor-provided URL](https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20115
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 19:59 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In broadcastServiceStateChanged of TelephonyRegistry.java, there is a possible way to learn base station information without location permission due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-210118427
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-05-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0081
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:27 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wu-ftp allows files to be overwritten via the rnfr command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cve.org/CVERecord?id=CVE-1999-0081) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5284
- **State**: PUBLISHED
- **Published Date**: September 29, 2023 at 19:31 UTC
- **Last Updated**: August 02, 2024 at 07:52 UTC
- **Reserved Date**: September 29, 2023 at 09:49 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file upload_save_student.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240912.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SourceCodester - Engineers Online Portal**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.240912)
2. [](https://vuldb.com/?ctiid.240912)
3. [](https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20upload_save_student.php%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf)
### Credits
- llixixioo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9944, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9944 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9944
- **State**: PUBLISHED
- **Published Date**: May 17, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 10, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addLink method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5379.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.0.29935 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39665
- **State**: PUBLISHED
- **Published Date**: August 18, 2023 at 00:00 UTC
- **Last Updated**: October 07, 2024 at 18:51 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://support.dlink.com/)
3. [](https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L-bufferoverflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1133
- **State**: PUBLISHED
- **Published Date**: December 19, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: December 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001107 Explanation Authentix Input Validation Error](http://marc.info/?l=bugtraq&m=97362374200478&w=2)
2. [1907](http://www.securityfocus.com/bid/1907)
3. [20001106 Authentix Security Advisory](http://marc.info/?l=bugtraq&m=97353881829760&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11156
- **State**: PUBLISHED
- **Published Date**: August 14, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:36 UTC
- **Reserved Date**: July 10, 2017 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
Synology Download Station 3.8.x before 3.8.5-3475 and 3.x before 3.5-2984 uses weak permissions (0777) for ui/dlm/btsearch directory, which allows remote authenticated users to execute arbitrary code by uploading an executable via unspecified vectors.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Synology - Synology Download Station**
Affected versions:
- 3.8.x before 3.8.5-3475 and 3.x before 3.5-2984 (Status: affected)
### References
1. [](https://www.synology.com/en-global/support/security/Synology_SA_17_28_Download_Station) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23159
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 12:55 UTC
- **Last Updated**: May 26, 2025 at 05:19 UTC
- **Reserved Date**: January 11, 2025 at 14:28 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: venus: hfi: add a check to handle OOB in sfr region
sfr->buf_size is in shared memory and can be modified by malicious user.
OOB write is possible when the size is made higher than actual sfr data
buffer. Cap the size to allocated size for such cases.
### Affected Products
**Linux - Linux**
Affected versions:
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
- d96d3f30c0f2f564f6922bf4ccdf4464992e31fb (Status: affected)
**Linux - Linux**
Affected versions:
- 4.13 (Status: affected)
- 0 (Status: unaffected)
- 5.4.293 (Status: unaffected)
- 5.10.237 (Status: unaffected)
- 5.15.181 (Status: unaffected)
- 6.1.135 (Status: unaffected)
- 6.6.88 (Status: unaffected)
- 6.12.24 (Status: unaffected)
- 6.13.12 (Status: unaffected)
- 6.14.3 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4dd109038d513b92d4d33524ffc89ba32e02ba48)
2. [](https://git.kernel.org/stable/c/8879397c0da5e5ec1515262995e82cdfd61b282a)
3. [](https://git.kernel.org/stable/c/1b8fb257234e7d2d4b3f48af07c5aa5e11c71634)
4. [](https://git.kernel.org/stable/c/4e95233af57715d81830fe82b408c633edff59f4)
5. [](https://git.kernel.org/stable/c/5af611c70fb889d46d2f654b8996746e59556750)
6. [](https://git.kernel.org/stable/c/530f623f56a6680792499a8404083e17f8ec51f4)
7. [](https://git.kernel.org/stable/c/a062d8de0be5525ec8c52f070acf7607ec8cbfe4)
8. [](https://git.kernel.org/stable/c/d78a8388a27b265fcb2b8d064f088168ac9356b0)
9. [](https://git.kernel.org/stable/c/f4b211714bcc70effa60c34d9fa613d182e3ef1e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44355
- **State**: PUBLISHED
- **Published Date**: November 17, 2023 at 13:31 UTC
- **Last Updated**: October 11, 2024 at 15:59 UTC
- **Reserved Date**: September 28, 2023 at 16:25 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to impact a minor integrity feature. Exploitation of this issue does require user interaction.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Adobe - ColdFusion**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25925
- **State**: PUBLISHED
- **Published Date**: February 26, 2024 at 15:09 UTC
- **Last Updated**: August 02, 2024 at 17:49 UTC
- **Reserved Date**: February 12, 2024 at 08:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in SYSBASICS WooCommerce Easy Checkout Field Editor, Fees & Discounts.This issue affects WooCommerce Easy Checkout Field Editor, Fees & Discounts: from n/a through 3.5.12.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**SYSBASICS - WooCommerce Easy Checkout Field Editor, Fees & Discounts**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/phppoet-checkout-fields/wordpress-woocommerce-easy-checkout-field-editor-fees-discounts-plugin-3-5-12-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8327, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8327 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8327
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 02:14 UTC
- **Last Updated**: August 30, 2024 at 14:43 UTC
- **Reserved Date**: August 30, 2024 at 01:25 UTC
- **Assigned By**: twcert
### Vulnerability Description
Easy test
Online Learning and Testing Platform from HWA JIUH DIGITAL TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with regular privilege to inject arbitrary SQL commands to read, modify, and delete database contents.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**HWA JIUH DIGITAL TECHNOLOGY - Easy test Online Learning and Testing Platform**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-8028-360e1-1.html)
2. [](https://www.twcert.org.tw/en/cp-139-8032-a3d5c-2.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1700
- **State**: PUBLISHED
- **Published Date**: June 09, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 15, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted profile-time parameter in a printer-url.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zerodayinitiative.com/advisories/ZDI-11-173/)
2. [1025606](http://www.securitytracker.com/id?1025606)
3. [20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability](http://www.securityfocus.com/archive/1/518267/100/0/threaded)
4. [](http://download.novell.com/Download?buildid=6_bNby38ERg~)
5. [](http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008722)
6. [44811](http://secunia.com/advisories/44811)
7. [48124](http://www.securityfocus.com/bid/48124) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4660
- **State**: PUBLISHED
- **Published Date**: November 20, 2019 at 15:41 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: January 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..
### Affected Products
**statusnet - statusnet**
Affected versions:
- through 2010 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2010-4660)
2. [](https://www.openwall.com/lists/oss-security/2011/01/25/13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41406
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: May 20, 2025 at 17:45 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in the /admin/admin_pic.php component of Church Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CokuTau-CH/Bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/RCE-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39906
- **State**: PUBLISHED
- **Published Date**: July 19, 2024 at 19:50 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 02, 2024 at 19:37 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
A command injection vulnerability was found in the IndieAuth functionality of the Ruby on Rails based Haven blog web application. The affected functionality requires authentication, but an attacker can craft a link that they can pass to a logged in administrator of the blog software. This leads to the immediate execution of the provided commands when the link is accessed by the authenticated administrator. This issue may lead to Remote Code Execution (RCE) and has been addressed by commit `c52f07c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**havenweb - haven**
Affected versions:
- < c52f07c (Status: affected)
### References
1. [https://github.com/havenweb/haven/security/advisories/GHSA-65cm-7g24-hm9f](https://github.com/havenweb/haven/security/advisories/GHSA-65cm-7g24-hm9f)
2. [https://github.com/havenweb/haven/commit/c52f07c](https://github.com/havenweb/haven/commit/c52f07c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17981
- **State**: PUBLISHED
- **Published Date**: December 30, 2017 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 21:06 UTC
- **Reserved Date**: December 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/slider_edit.php edit_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/d4wner/Vulnerabilities-Report/blob/master/Muslim%20Matrimonial%20Script.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1198
- **State**: PUBLISHED
- **Published Date**: June 23, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 01:14 UTC
- **Reserved Date**: March 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40481](http://secunia.com/advisories/40481)
2. [USN-930-1](http://ubuntu.com/usn/usn-930-1)
3. [FEDORA-2010-10361](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html)
4. [1024138](http://www.securitytracker.com/id?1024138)
5. [ADV-2010-1640](http://www.vupen.com/english/advisories/2010/1640)
6. [41050](http://www.securityfocus.com/bid/41050)
7. [firefox-plugin-instances-code-exec(59664)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59664)
8. [RHSA-2010:0501](http://www.redhat.com/support/errata/RHSA-2010-0501.html)
9. [ADV-2010-1557](http://www.vupen.com/english/advisories/2010/1557)
10. [MDVSA-2010:125](http://www.mandriva.com/security/advisories?name=MDVSA-2010:125)
11. [ADV-2010-1773](http://www.vupen.com/english/advisories/2010/1773)
12. [RHSA-2010:0499](http://www.redhat.com/support/errata/RHSA-2010-0499.html)
13. [ADV-2010-1556](http://www.vupen.com/english/advisories/2010/1556)
14. [ADV-2010-1592](http://www.vupen.com/english/advisories/2010/1592)
15. [USN-930-2](http://www.ubuntu.com/usn/usn-930-2)
16. [ADV-2010-1551](http://www.vupen.com/english/advisories/2010/1551)
17. [](http://www.mozilla.org/security/announce/2010/mfsa2010-28.html)
18. [RHSA-2010:0500](http://www.redhat.com/support/errata/RHSA-2010-0500.html)
19. [SUSE-SA:2010:030](http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html)
20. [oval:org.mitre.oval:def:10990](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990)
21. [41102](http://www.securityfocus.com/bid/41102)
22. [40401](http://secunia.com/advisories/40401)
23. [FEDORA-2010-10344](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html)
24. [](https://bugzilla.mozilla.org/show_bug.cgi?id=532246)
25. [40326](http://secunia.com/advisories/40326)
26. [oval:org.mitre.oval:def:14176](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176)
27. [](http://support.avaya.com/css/P8/documents/100091069) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1595
- **State**: PUBLISHED
- **Published Date**: May 16, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 21:02 UTC
- **Reserved Date**: May 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CodeThat ShoppingCart 1.3.1 stores config.ini under the web root, which allows remote attackers to obtain sensitive information via a direct request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16157](http://www.osvdb.org/16157)
2. [15251](http://secunia.com/advisories/15251)
3. [1013924](http://securitytracker.com/id?1013924)
4. [](http://lostmon.blogspot.com/2005/05/codethat-shoppingcart-critical.html)
5. [13560](http://www.securityfocus.com/bid/13560) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25646
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 06:20 UTC
- **Last Updated**: August 02, 2024 at 11:25 UTC
- **Reserved Date**: February 09, 2023 at 19:47 UTC
- **Assigned By**: zte
### Vulnerability Description
There is an unauthorized access vulnerability in ZTE H388X. If H388X is caused by brute-force serial port cracking,attackers with common user permissions can use this vulnerability to obtain elevated permissions on the affected device by performing specific operations.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-281: Security Weakness
### Affected Products
**ZTE - ZXHN H388X**
Affected versions:
- V10.1: AGZHM_1.3.1 (Status: affected)
### References
1. [](https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22479
- **State**: PUBLISHED
- **Published Date**: January 10, 2023 at 20:34 UTC
- **Last Updated**: March 10, 2025 at 21:30 UTC
- **Reserved Date**: December 29, 2022 at 17:41 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
KubePi is a modern Kubernetes panel. A session fixation attack allows an attacker to hijack a legitimate user session, versions 1.6.3 and below are susceptible. A patch will be released in version 1.6.4.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**KubeOperator - KubePi**
Affected versions:
- <= 1.6.3 (Status: affected)
### References
1. [https://github.com/KubeOperator/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h](https://github.com/KubeOperator/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8534
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:24 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT209600) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46639
- **State**: PUBLISHED
- **Published Date**: January 23, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 14:23 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in the descarga_etiqueta.php component of Correos Prestashop 1.7.x allows attackers to execute a directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ia-informatica.com/it/CVE-2022-46639) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3052
- **State**: PUBLISHED
- **Published Date**: September 23, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in module/down.inc.php in jportal 2.3.1 allows remote attackers to execute arbitrary SQL commands via the search field to download.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20](http://securityreason.com/securityalert/20)
2. [20050923 Sql injection in jPortal version 2.3.1 (module download)](http://marc.info/?l=bugtraq&m=112748957426316&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21435
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 16:58 UTC
- **Last Updated**: May 03, 2025 at 00:47 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows OLE Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
### References
1. [Windows OLE Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21435) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3931
- **State**: REJECTED
- **Last Updated**: December 12, 2022 at 00:00 UTC
- **Reserved Date**: November 10, 2022 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7813
- **State**: PUBLISHED
- **Published Date**: October 30, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:58 UTC
- **Reserved Date**: October 14, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not properly handled in the do_physdev_op function in arch/arm/physdev.c, or (2) HYPERVISOR_hvm_op hypercalls, which are not properly handled in the do_hvm_op function in arch/arm/hvm.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xenbits.xen.org/xsa/advisory-146.html)
2. [FEDORA-2015-242be2c240](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html)
3. [FEDORA-2015-a931b02be2](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html)
4. [DSA-3414](http://www.debian.org/security/2015/dsa-3414)
5. [FEDORA-2015-6f6b79efe2](http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html)
6. [GLSA-201604-03](https://security.gentoo.org/glsa/201604-03)
7. [1034029](http://www.securitytracker.com/id/1034029) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6851
- **State**: PUBLISHED
- **Published Date**: December 16, 2023 at 11:00 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 15, 2023 at 16:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in kalcaddle KodExplorer up to 4.51.03. It has been rated as critical. This issue affects the function unzipList of the file plugins/zipView/app.php of the component ZIP Archive Handler. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The patch is named 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248219.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**kalcaddle - KodExplorer**
Affected versions:
- 4.51.03 (Status: affected)
### References
1. [](https://vuldb.com/?id.248219)
2. [](https://vuldb.com/?ctiid.248219)
3. [](https://note.zhaoj.in/share/D44UjzoFXYfi)
4. [](https://github.com/kalcaddle/KodExplorer/commit/5cf233f7556b442100cf67b5e92d57ceabb126c6)
5. [](https://github.com/kalcaddle/KodExplorer/releases/tag/4.52.01)
### Credits
- glzjin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2973
- **State**: REJECTED
- **Published Date**: December 15, 2014 at 17:27 UTC
- **Last Updated**: December 15, 2014 at 04:57 UTC
- **Reserved Date**: April 21, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1462
- **State**: PUBLISHED
- **Published Date**: April 16, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in WebAsyst Shop-Script FREE has unknown impact and attack vectors via the sub parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20100414 VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation Vulnerabilities](http://www.securityfocus.com/archive/1/510741/100/0/threaded)
2. [ADV-2010-0882](http://www.vupen.com/english/advisories/2010/0882)
3. [](http://www.vupen.com/english/research-web.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39334
- **State**: PUBLISHED
- **Published Date**: November 25, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 15:59 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server.
### CVSS Metrics
- **CVSS Base Score**: 3.9/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 3.6.1 (Status: affected)
### References
1. [](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv)
2. [](https://github.com/nextcloud/desktop/issues/4927)
3. [](https://github.com/nextcloud/desktop/pull/5022)
4. [](https://hackerone.com/reports/1699740) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4502
- **State**: PUBLISHED
- **Published Date**: November 22, 2011 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 00:25 UTC
- **Reserved Date**: November 22, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to execute arbitrary commands via shell metacharacters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.upnp-hacks.org/devices.html)
2. [](http://www.upnp-hacks.org/suspect.html)
3. [VU#357851](http://www.kb.cert.org/vuls/id/357851) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23408
- **State**: REJECTED
- **Last Updated**: January 01, 2025 at 00:00 UTC
- **Reserved Date**: January 16, 2024 at 17:32 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4797, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4797 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4797
- **State**: PUBLISHED
- **Published Date**: May 05, 2006 at 23:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: May 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in printd line printer daemon (lpd) in Solaris 7 through 10 allows remote attackers to delete arbitrary files via ".." sequences in an "Unlink data file" command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-1342](http://www.vupen.com/english/advisories/2005/1342)
2. [16367](http://secunia.com/advisories/16367)
3. [18650](http://www.osvdb.org/18650)
4. [1014635](http://securitytracker.com/id?1014635)
5. [](http://downloads.securityfocus.com/vulnerabilities/exploits/solaris_lpd_unlink.pm)
6. [solaris-printd-file-deletion(21773)](https://exchange.xforce.ibmcloud.com/vulnerabilities/21773)
7. [101842](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101842-1)
8. [P-280](http://www.ciac.org/ciac/bulletins/p-280.shtml)
9. [14510](http://www.securityfocus.com/bid/14510) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47648
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:20 UTC
- **Last Updated**: May 07, 2025 at 18:11 UTC
- **Reserved Date**: May 07, 2025 at 10:45 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in axima Pays – WooCommerce Payment Gateway allows Stored XSS. This issue affects Pays – WooCommerce Payment Gateway: from n/a through 2.6.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**axima - Pays – WooCommerce Payment Gateway**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/axima-payment-gateway/vulnerability/wordpress-pays-woocommerce-payment-gateway-2-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3661, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3661 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3661
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to cause a denial of service (thread consumption) via vectors related to a CLI handshake.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2016:0070](https://access.redhat.com/errata/RHSA-2016:0070)
2. [](https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16369
- **State**: PUBLISHED
- **Published Date**: December 09, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a Same Origin Policy security bypass vulnerability, affecting files on the local system, etc.
### Affected Products
**n/a - Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions**
Affected versions:
- Adobe Acrobat Reader 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, 11.0.22 and earlier versions (Status: affected)
### References
1. [1039791](http://www.securitytracker.com/id/1039791)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb17-36.html)
3. [101820](http://www.securityfocus.com/bid/101820) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24366
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 21:16 UTC
- **Last Updated**: February 07, 2025 at 22:49 UTC
- **Reserved Date**: January 20, 2025 at 15:18 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SFTPGo is an open source, event-driven file transfer solution. SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being `rsync`. It is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends. Due to missing sanitization of the client provided `rsync` command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. This issue was fixed in version v2.6.5 by checking the client provided arguments. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**drakkan - sftpgo**
Affected versions:
- >= 0.9.5, < 2.6.5 (Status: affected)
### References
1. [https://github.com/drakkan/sftpgo/security/advisories/GHSA-vj7w-3m8c-6vpx](https://github.com/drakkan/sftpgo/security/advisories/GHSA-vj7w-3m8c-6vpx)
2. [https://github.com/drakkan/sftpgo/commit/b347ab6051f6c501da205c09315fe99cd1fa3ba1](https://github.com/drakkan/sftpgo/commit/b347ab6051f6c501da205c09315fe99cd1fa3ba1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6701, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6701 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6701
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 26, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
The ambientIlluminationColor property implementation in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to obtain sensitive information from process memory via a function call, a different vulnerability than CVE-2015-6697, CVE-2015-6699, CVE-2015-6700, CVE-2015-6702, CVE-2015-6703, and CVE-2015-6704.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb15-24.html)
2. [](http://www.zerodayinitiative.com/advisories/ZDI-15-479)
3. [1033796](http://www.securitytracker.com/id/1033796) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45916
- **State**: PUBLISHED
- **Published Date**: December 07, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 17:28 UTC
- **Reserved Date**: November 27, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ILIAS before 7.16 allows XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/)
2. [20221208 SEC Consult SA-20221206-0 :: Multiple critical vulnerabilities in ILIAS eLearning platform](http://seclists.org/fulldisclosure/2022/Dec/7)
3. [](http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2623, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2623 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2623
- **State**: PUBLISHED
- **Published Date**: August 12, 2022 at 19:37 UTC
- **Last Updated**: August 03, 2024 at 00:46 UTC
- **Reserved Date**: August 02, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1337798)
3. [GLSA-202208-35](https://security.gentoo.org/glsa/202208-35)
4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6199, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6199 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6199
- **State**: PUBLISHED
- **Published Date**: January 10, 2015 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 02, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
The HTTP Server Adapter in IBM Sterling B2B Integrator 5.1 and 5.2.x and Sterling File Gateway 2.1 and 2.2 allows remote attackers to cause a denial of service (connection-slot exhaustion) via a crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-sbi-cve20146199-dos(98650)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98650)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21693131)
3. [IT05121](http://www-01.ibm.com/support/docview.wss?uid=swg1IT05121)
4. [62082](http://secunia.com/advisories/62082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9239
- **State**: PUBLISHED
- **Published Date**: May 26, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: May 26, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-3852-1](https://usn.ubuntu.com/3852-1/)
2. [](http://dev.exiv2.org/issues/1295)
3. [98720](http://www.securityfocus.com/bid/98720)
4. [](https://github.com/lolo-pop/poc/tree/master/Segmentation%20fault%20in%20convert-test%28exiv2%29)
5. [openSUSE-SU-2020:0482](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0086
- **State**: PUBLISHED
- **Published Date**: January 05, 2023 at 16:21 UTC
- **Last Updated**: January 13, 2025 at 17:15 UTC
- **Reserved Date**: January 05, 2023 at 16:21 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The JetWidgets for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.12. This is due to missing nonce validation on the save() function. This makes it possible for unauthenticated attackers to to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be used to enable SVG uploads that could make Cross-Site Scripting possible.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Affected Products
**jetmonsters - JetWidgets For Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8de3d3c7-bde2-4455-8d60-20307f0a53ee)
2. [](https://plugins.trac.wordpress.org/browser/jetwidgets-for-elementor/trunk/includes/class-jet-widgets-settings.php#L149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25317
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Cerebrate through 1.4. genericForm allows reflected XSS in form descriptions via a user-controlled description.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cerebrate-project/cerebrate/commit/e60d97c214f9ac6df90c87241b3b3554afc06238)
2. [](https://zigrin.com/advisories/cerebrate-reflected-xss-in-form-descriptions/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37470
- **State**: PUBLISHED
- **Published Date**: July 25, 2021 at 20:08 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nch.com.au/webdictate/index.html)
2. [](https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41157
- **State**: PUBLISHED
- **Published Date**: September 16, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 18:47 UTC
- **Reserved Date**: August 24, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://webmin.com/tags/webmin-changelog/)
2. [](https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11083
- **State**: PUBLISHED
- **Published Date**: November 27, 2024 at 05:31 UTC
- **Last Updated**: November 27, 2024 at 12:06 UTC
- **Reserved Date**: November 11, 2024 at 18:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The ProfilePress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.15.18 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**collizo4sky - Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/60c8159f-0641-4b75-9d56-34bd13105caf?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3197296/wp-user-avatar)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14354
- **State**: PUBLISHED
- **Published Date**: October 05, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 12, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
A remote cross-site scripting vulnerability in HP UCMDB Foundation Software versions 10.10, 10.11, 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, and 10.33 could be remotely exploited to allow cross-site scripting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101254](http://www.securityfocus.com/bid/101254)
2. [](https://www.tenable.com/security/research/tra-2017-32)
3. [](https://softwaresupport.hpe.com/km/KM02977984)
4. [ESB-2017.2509](https://www.auscert.org.au/bulletins/53150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1251, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1251 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1251
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SmallHTTP 1.204 through 3.00 beta 8 allows remote attackers to cause a denial of service via multiple long URL requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [vwebserver-long-url-dos(6771)](http://www.iss.net/security_center/static/6771.php)
2. [20010629 4 New vulns. vWebServer and SmallHTTP](http://online.securityfocus.com/archive/1/194418)
3. [2980](http://www.securityfocus.com/bid/2980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6754
- **State**: PUBLISHED
- **Published Date**: November 25, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 11, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A remote code execution vulnerability in Webview in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-05 could enable a remote attacker to execute arbitrary code when the user is navigating to a website. This issue is rated as High due to the possibility of remote code execution in an unprivileged process. Android ID: A-31217937.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-5.0.2 (Status: affected)
- Android-5.1.1 (Status: affected)
- Android-6.0 (Status: affected)
- Android-6.0.1 (Status: affected)
### References
1. [40846](https://www.exploit-db.com/exploits/40846/)
2. [94204](http://www.securityfocus.com/bid/94204)
3. [](https://source.android.com/security/bulletin/2016-11-01.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3634
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 17:03 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2017:2787](https://access.redhat.com/errata/RHSA-2017:2787)
2. [1038928](http://www.securitytracker.com/id/1038928)
3. [99729](http://www.securityfocus.com/bid/99729)
4. [RHSA-2017:2886](https://access.redhat.com/errata/RHSA-2017:2886)
5. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31867
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:52 UTC
- **Last Updated**: April 01, 2025 at 15:47 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Job Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JS Job Manager: from n/a through 2.0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**JoomSky - JS Job Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve)
### Credits
- Tran Hoang Tuan Kiet (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14283
- **State**: PUBLISHED
- **Published Date**: July 31, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 16, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the highlightMode attribute. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5771.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.1049 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7716, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7716 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7716
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 09:20 UTC
- **Last Updated**: September 17, 2024 at 03:54 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of package deeps are vulnerable to Prototype Pollution via the set function.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**n/a - deeps**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-DEEPS-598667)
### Credits
- NerdJS |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49567
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 07:59 UTC
- **Last Updated**: October 18, 2024 at 15:25 UTC
- **Reserved Date**: November 27, 2023 at 14:21 UTC
- **Assigned By**: Bitdefender
### Vulnerability Description
A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate.
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**Bitdefender - Total Security**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.bitdefender.com/support/security-advisories/insecure-trust-of-certificates-using-collision-hash-functions-in-bitdefender-total-security-https-scanning-va-11239/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2192
- **State**: PUBLISHED
- **Published Date**: August 06, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MobileMe in Apple Mac OS X 10.5 before 10.5.8 does not properly delete credentials upon signout from the preference pane, which makes it easier for attackers to hijack a MobileMe session via unspecified vectors, related to a "logic issue."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT3757)
2. [36096](http://secunia.com/advisories/36096)
3. [macosx-mobileme-session-hijack(52432)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52432)
4. [56839](http://osvdb.org/56839)
5. [APPLE-SA-2009-08-05-1](http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html)
6. [35954](http://www.securityfocus.com/bid/35954)
7. [ADV-2009-2172](http://www.vupen.com/english/advisories/2009/2172)
8. [TA09-218A](http://www.us-cert.gov/cas/techalerts/TA09-218A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34057
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 04:52 UTC
- **Last Updated**: March 06, 2025 at 15:40 UTC
- **Reserved Date**: May 25, 2023 at 17:21 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**n/a - VMware Tools**
Affected versions:
- 12.x.x (Status: affected)
- 11.x.x (Status: affected)
- 10.3.x (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2023-0024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47288, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47288 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47288
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:34 UTC
- **Last Updated**: May 04, 2025 at 07:07 UTC
- **Reserved Date**: May 21, 2024 at 13:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
Fix an 11-year old bug in ngene_command_config_free_buf() while
addressing the following warnings caught with -Warray-bounds:
arch/alpha/include/asm/string.h:22:16: warning: '__builtin_memcpy' offset [12, 16] from the object at 'com' is out of the bounds of referenced subobject 'config' with type 'unsigned char' at offset 10 [-Warray-bounds]
arch/x86/include/asm/string_32.h:182:25: warning: '__builtin_memcpy' offset [12, 16] from the object at 'com' is out of the bounds of referenced subobject 'config' with type 'unsigned char' at offset 10 [-Warray-bounds]
The problem is that the original code is trying to copy 6 bytes of
data into a one-byte size member _config_ of the wrong structue
FW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a
legitimate compiler warning because memcpy() overruns the length
of &com.cmd.ConfigureBuffers.config. It seems that the right
structure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains
6 more members apart from the header _hdr_. Also, the name of
the function ngene_command_config_free_buf() suggests that the actual
intention is to ConfigureFreeBuffers, instead of ConfigureBuffers
(which takes place in the function ngene_command_config_buf(), above).
Fix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS
into new struct config, and use &com.cmd.ConfigureFreeBuffers.config as
the destination address, instead of &com.cmd.ConfigureBuffers.config,
when calling memcpy().
This also helps with the ongoing efforts to globally enable
-Warray-bounds and get us closer to being able to tighten the
FORTIFY_SOURCE routines on memcpy().
### Affected Products
**Linux - Linux**
Affected versions:
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
- dae52d009fc950b5c209260d50fcc000f5becd3c (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.34 (Status: affected)
- 0 (Status: unaffected)
- 4.4.277 (Status: unaffected)
- 4.9.277 (Status: unaffected)
- 4.14.241 (Status: unaffected)
- 4.19.199 (Status: unaffected)
- 5.4.136 (Status: unaffected)
- 5.10.54 (Status: unaffected)
- 5.13.6 (Status: unaffected)
- 5.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4487b968e5eacd02c493303dc2b61150bb7fe4b2)
2. [](https://git.kernel.org/stable/c/c6ddeb63dd543b5474b0217c4e47538b7ffd7686)
3. [](https://git.kernel.org/stable/c/e818f2ff648581a6c553ae2bebc5dcef9a8bb90c)
4. [](https://git.kernel.org/stable/c/ec731c6ef564ee6fc101fc5d73e3a3a953d09a00)
5. [](https://git.kernel.org/stable/c/e617fa62f6cf859a7b042cdd6c73af905ff8fca3)
6. [](https://git.kernel.org/stable/c/e991457afdcb5f4dbc5bc9d79eaf775be33e7092)
7. [](https://git.kernel.org/stable/c/b9a178f189bb6d75293573e181928735f5e3e070)
8. [](https://git.kernel.org/stable/c/8d4abca95ecc82fc8c41912fa0085281f19cc29f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30816
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 15:52 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
elitecms 1.01 is vulnerable to SQL Injection via /admin/edit_sidebar.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/elitecms-1.01/SQLi-6.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38785
- **State**: PUBLISHED
- **Published Date**: January 18, 2022 at 13:46 UTC
- **Last Updated**: August 04, 2024 at 01:51 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a NULL pointer deference in the Allwinner R818 SoC Android Q SDK V1.0 camera driver /dev/cedar_dev that could use the ioctl cmd IOCTL_GET_IOMMU_ADDR to cause a system crash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.allwinnertech.com/index.php?c=product&a=index&id=92)
2. [](https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9ACamera%20Driver%20has%20Null%20Pointer%20Dereference%20Vulnerability.md)
3. [](https://www.cnvd.org.cn/flaw/show/CNVD-2021-49170)
4. [](https://vul.wangan.com/a/CNVD-2021-49170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13546, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13546 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13546
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for CCASH, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CCASH) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1091
- **State**: PUBLISHED
- **Published Date**: October 13, 2016 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036986](http://www.securitytracker.com/id/1036986)
2. [93491](http://www.securityfocus.com/bid/93491)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-33.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27889
- **State**: PUBLISHED
- **Published Date**: March 15, 2021 at 16:57 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site Scripting (XSS) vulnerability in MyBB before 1.8.26 via Nested Auto URL when parsing messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/mybb/mybb/security/advisories/GHSA-xhj7-3349-mqcm)
2. [](http://packetstormsecurity.com/files/161908/MyBB-1.8.25-Remote-Command-Execution.html)
3. [](https://blog.sonarsource.com/mybb-remote-code-execution-chain) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33792, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33792
- **State**: PUBLISHED
- **Published Date**: May 24, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 15:47 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/anhdq201/netbox/issues/10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4769, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4769 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4769
- **State**: PUBLISHED
- **Published Date**: September 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit in Apple iTunes before 12.5.1 on Windows and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207157)
2. [](https://support.apple.com/HT207158)
3. [1036854](http://www.securitytracker.com/id/1036854)
4. [93062](http://www.securityfocus.com/bid/93062)
5. [APPLE-SA-2016-09-20-7](http://lists.apple.com/archives/security-announce/2016/Sep/msg00012.html)
6. [APPLE-SA-2016-09-20-2](http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1609, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1609
- **State**: PUBLISHED
- **Published Date**: November 02, 2018 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 18:54 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Quality Manager (RQM) 5.0 through 5.0.2 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 132929.
### Affected Products
**IBM - Rational Quality Manager**
Affected versions:
- 5.0 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
- 6.0.6 (Status: affected)
- 5.01 (Status: affected)
- 5.02 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=ibm10738137)
2. [ibm-rqm-cve20171609-xss(132929)](https://exchange.xforce.ibmcloud.com/vulnerabilities/132929)
3. [106384](http://www.securityfocus.com/bid/106384) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1204
- **State**: PUBLISHED
- **Published Date**: November 21, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: October 14, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netscape Communicator 4.x allows attackers to use a link to steal a user's preferences, including potentially sensitive information such as URL history, e-mail address, and possibly the e-mail password, by redefining the user_pref() function and accessing the prefs.js file, which is stored in a directory with a predictable name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20021119 iDEFENSE Security Advisory 11.19.02c: Netscape Predictable Directory Structure Allows Theft of Preferences File](http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0081.html)
2. [](http://www.idefense.com/advisory/11.19.02c.txt)
3. [netscape-preferences-file(10655)](http://www.iss.net/security_center/static/10655.php)
4. [6215](http://www.securityfocus.com/bid/6215) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0737
- **State**: PUBLISHED
- **Published Date**: February 13, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin/utilities_ConfigHelp.asp in CandyPress (CP) 4.1.1.26, and other 4.x and 3.x versions, allows remote attackers to execute arbitrary SQL commands via the helpfield parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27454](http://www.securityfocus.com/bid/27454)
2. [28662](http://secunia.com/advisories/28662)
3. [4988](https://www.exploit-db.com/exploits/4988)
4. [ADV-2008-0314](http://www.vupen.com/english/advisories/2008/0314)
5. [20080125 [CandyPress] eCommerce suite (SQL Injection + XSS + Path Disclosure)](http://www.securityfocus.com/archive/1/487058/100/0/threaded)
6. [](http://www.candypress.com/CPforum/forum_posts.asp?TID=10630&PN=1)
7. [3600](http://securityreason.com/securityalert/3600) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56508
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 15:52 UTC
- **Last Updated**: December 27, 2024 at 20:58 UTC
- **Reserved Date**: December 26, 2024 at 19:28 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
LinkAce is a self-hosted archive to collect links of your favorite websites. Prior to 1.15.6, a file upload vulnerability exists in the LinkAce. This issue occurs in the "Import Bookmarks" functionality, where malicious HTML files can be uploaded containing JavaScript payloads. These payloads execute when the uploaded links are accessed, leading to potential reflected or persistent XSS scenarios. This vulnerability is fixed in 1.15.6.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Kovah - LinkAce**
Affected versions:
- < 1.15.6 (Status: affected)
### References
1. [https://github.com/Kovah/LinkAce/security/advisories/GHSA-2wvv-4576-8862](https://github.com/Kovah/LinkAce/security/advisories/GHSA-2wvv-4576-8862)
2. [https://github.com/Kovah/LinkAce/commit/8cf3670d71a8629d33408da76f9d441a1aa933f6](https://github.com/Kovah/LinkAce/commit/8cf3670d71a8629d33408da76f9d441a1aa933f6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23063
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14228
- **State**: PUBLISHED
- **Published Date**: July 26, 2019 at 12:35 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Xavier PHP Management Panel 3.0 is vulnerable to Reflected POST-based XSS via the username parameter when registering a new user at admin/includes/adminprocess.php. If there is an error when registering the user, the unsanitized username will reflect via the error page. Due to the lack of CSRF protection on the admin/includes/adminprocess.php endpoint, an attacker is able to chain the XSS with CSRF in order to cause remote exploitation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://codecanyon.net/item/xavier-php-login-script-user-management/9146226)
2. [](https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3292
- **State**: PUBLISHED
- **Published Date**: June 07, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 07, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The GridFTP in Globus Toolkit (GT) before 5.2.2, when certain autoconf macros are defined, does not properly check the return value from the getpwnam_r function, which might allow remote attackers to gain privileges by logging in with a user that does not exist, which causes GridFTP to run as the last user in the password file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2012-8488](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081787.html)
2. [DSA-2523](http://www.debian.org/security/2012/dsa-2523)
3. [](http://jira.globus.org/browse/GT-195)
4. [FEDORA-2012-8445](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081797.html)
5. [FEDORA-2012-8461](http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081791.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39897
- **State**: PUBLISHED
- **Published Date**: November 04, 2021 at 23:07 UTC
- **Last Updated**: August 04, 2024 at 02:20 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred
### CVSS Metrics
- **CVSS Base Score**: 2.6/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=12.9, <12.9.8 (Status: affected)
- >=12.10, <12.10.7 (Status: affected)
- >=13.0, <13.0.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/341017)
2. [](https://hackerone.com/reports/1330806)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39897.json)
### Credits
- Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31704
- **State**: PUBLISHED
- **Published Date**: January 25, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 13:26 UTC
- **Reserved Date**: May 25, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution.
### Affected Products
**n/a - vRealize Log Insight (vRLI)**
Affected versions:
- vRealize Log Insight 8.10.1 and prior (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2023-0001.html)
2. [](http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1825
- **State**: PUBLISHED
- **Published Date**: April 16, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:40 UTC
- **Reserved Date**: April 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 9.0.4.3 has unknown impact and remote attack vectors, aka AS03.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oracle-appserver-portal-unspecified5(42051)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42051)
2. [oracle-cpu-april-2008(41858)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41858)
3. [ADV-2008-1267](http://www.vupen.com/english/advisories/2008/1267/references)
4. [ADV-2008-1233](http://www.vupen.com/english/advisories/2008/1233/references)
5. [1019855](http://www.securitytracker.com/id?1019855)
6. [29829](http://secunia.com/advisories/29829)
7. [HPSBMA02133](http://www.securityfocus.com/archive/1/491024/100/0/threaded)
8. [](http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html)
9. [29874](http://secunia.com/advisories/29874)
10. [SSRT061201](http://www.securityfocus.com/archive/1/491024/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11443
- **State**: PUBLISHED
- **Published Date**: May 04, 2020 at 13:44 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: April 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\Zoom before installing an updated version of the client. Standard users are able to write to this directory, and can write links to other directories on the machine. As the installer runs with SYSTEM privileges and follows these links, a user can cause the installer to delete files that otherwise cannot be deleted by the user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.zoom.us/hc/en-us/articles/360043036451-Security-CVE-2020-11443)
2. [](https://support.zoom.us/hc/en-us/articles/201361953-New-Updates-for-Windows)
3. [](https://support.zoom.us/hc/en-us/articles/360043036451) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4839
- **State**: PUBLISHED
- **Published Date**: May 25, 2021 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 20:31 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Host firmware for LC-class Systems is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A remote privileged attacker could exploit this vulnerability and cause a denial of service. IBM X-Force ID: 190037.
### Affected Products
**IBM - 8335-GTB**
Affected versions:
- OP820 (Status: affected)
**IBM - 8335-GTA**
Affected versions:
- OP820 (Status: affected)
**IBM - 8335-GCA**
Affected versions:
- OP820 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6454303)
2. [ibm-bmc-cve20204839-bo (190037)](https://exchange.xforce.ibmcloud.com/vulnerabilities/190037) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4945
- **State**: PUBLISHED
- **Published Date**: July 22, 2010 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 07:24 UTC
- **Reserved Date**: July 21, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AdPeeps 8.5d1 has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via requests to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090527 [InterN0T] AdPeeps 8.5d1 - XSS and HTML Injection Vulnerabilities](http://www.securityfocus.com/archive/1/503855/100/0/threaded)
2. [20090528 Re: [InterN0T] AdPeeps 8.5d1 - XSS and HTML Injection Vulnerabilities](http://www.securityfocus.com/archive/1/503911/100/0/threaded)
3. [](http://forum.intern0t.net/intern0t-advisories/1049-intern0t-adpeeps-8-5d1-cross-site-scripting-html-injection-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28074
- **State**: PUBLISHED
- **Published Date**: July 31, 2024 at 07:56 UTC
- **Last Updated**: August 20, 2024 at 16:31 UTC
- **Reserved Date**: March 10, 2023 at 05:07 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Dell - Dell BSAFE Micro Edition Suite**
Affected versions:
- 5.0 (Status: affected)
**Dell - Dell BSAFE Micro Edition Suite**
Affected versions:
- 4.0 (Status: affected)
**Dell - Dell BSAFE Crypto-C Micro Edition**
Affected versions:
- 4.0 (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.