System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2317
- **State**: PUBLISHED
- **Published Date**: April 22, 2021 at 21:54 UTC
- **Last Updated**: September 26, 2024 at 14:08 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Cloud Infrastructure Storage Gateway product of Oracle Storage Gateway (component: Management Console). The supported version that is affected is Prior to 1.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Cloud Infrastructure Storage Gateway. While the vulnerability is in Oracle Cloud Infrastructure Storage Gateway, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Cloud Infrastructure Storage Gateway. Note: Updating the Oracle Cloud Infrastructure Storage Gateway to version 1.4 or later will address these vulnerabilities. Download the latest version of Oracle Cloud Infrastructure Storage Gateway from <a href=" https://www.oracle.com/downloads/cloud/oci-storage-gateway-downloads.html">here. Refer to Document <a href="https://support.oracle.com/rs?type=doc&id=2768897.1">2768897.1 for more details. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - Cloud Infrastructure**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3355
- **State**: PUBLISHED
- **Published Date**: April 25, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:07 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized read access to a subset of Oracle Marketing accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N).
### Affected Products
**Oracle Corporation - Marketing**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [98059](http://www.securityfocus.com/bid/98059)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7277
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 11:20 UTC
- **Last Updated**: September 17, 2024 at 00:05 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Protection mechanism failure in all processes in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows local users to stop certain McAfee ENS processes, reducing the protection offered.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-693: Security Weakness
### Affected Products
**McAfee LLC - McAfee Endpoint Security (ENS)**
Affected versions:
- 10.x (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10309) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16774
- **State**: PUBLISHED
- **Published Date**: December 12, 2019 at 23:05 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**PHPSocialNetwork - phpfastcache**
Affected versions:
- < 5.1.3 (Status: affected)
### References
1. [](https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2)
2. [](https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4)
3. [](https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33258
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 04:46 UTC
- **Last Updated**: August 03, 2024 at 08:01 UTC
- **Reserved Date**: June 14, 2022 at 10:44 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Information disclosure due to buffer over-read in modem while reading configuration parameters.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 9205 LTE Modem (Status: affected)
- 9206 LTE Modem (Status: affected)
- 9207 LTE Modem (Status: affected)
- MDM8207 (Status: affected)
- QCA4004 (Status: affected)
- QTS110 (Status: affected)
- Snapdragon 1100 Wearable Platform (Status: affected)
- Snapdragon 1200 Wearable Platform (Status: affected)
- Snapdragon Wear 1300 Platform (Status: affected)
- Snapdragon X5 LTE Modem (Status: affected)
- WCD9306 (Status: affected)
- WCD9330 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30214
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 15:05 UTC
- **Last Updated**: March 25, 2025 at 15:52 UTC
- **Reserved Date**: March 18, 2025 at 18:15 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
- CWE-287: Improper Authentication
### Affected Products
**frappe - frappe**
Affected versions:
- < 14.89.0 (Status: affected)
- >= 15.0.0, < 15.51.0 (Status: affected)
### References
1. [https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6](https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4036
- **State**: PUBLISHED
- **Published Date**: August 27, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 20:21 UTC
- **Reserved Date**: July 20, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in admin.php in PBBoard 2.1.4 allows remote administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in the addons directory. NOTE: this vulnerability can be leveraged by remote attackers using CVE-2012-1216.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB23101)
2. [](http://www.pbboard.com/forums/t10353.html)
3. [pbboard-admin-security-bypass(77508)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77508)
4. [54916](http://www.securityfocus.com/bid/54916)
5. [](http://www.pbboard.com/forums/t10352.html)
6. [84479](http://osvdb.org/84479)
7. [50153](http://secunia.com/advisories/50153) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5505
- **State**: PUBLISHED
- **Published Date**: March 22, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 16:23 UTC
- **Reserved Date**: January 12, 2018 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On F5 BIG-IP versions 13.1.0 - 13.1.0.3, when ASM and AVR are both provisioned, TMM may restart while processing DNS requests when the virtual server is configured with a DNS profile and the Protocol setting is set to TCP.
### Affected Products
**F5 Networks, Inc. - BIG-IP (ASM and Analytics)**
Affected versions:
- 13.1.0 - 13.1.0.3 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K23520761)
2. [103505](http://www.securityfocus.com/bid/103505)
3. [1040559](http://www.securitytracker.com/id/1040559) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0114, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0114 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0114
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 18:20 UTC
- **Last Updated**: March 12, 2025 at 18:34 UTC
- **Reserved Date**: December 20, 2024 at 23:23 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.
This issue does not apply to Cloud NGFWs or Prisma Access software.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Palo Alto Networks - PAN-OS**
Affected versions:
- 11.2.0 (Status: unaffected)
- 11.1.0 (Status: unaffected)
- 11.0.0 (Status: affected)
- 10.2.0 (Status: affected)
- 10.1.0 (Status: affected)
**Palo Alto Networks - Cloud NGFW**
Affected versions:
- All (Status: unaffected)
**Palo Alto Networks - Prisma Access**
Affected versions:
- All (Status: unaffected)
### References
1. [](https://security.paloaltonetworks.com/CVE-2025-0114)
### Credits
- an external reporter |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1156
- **State**: PUBLISHED
- **Published Date**: May 01, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 03:18 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Directory traversal vulnerability in Cisco Prime Central for Hosted Collaboration Solution allows remote attackers to read arbitrary files via a crafted URL, aka Bug ID CSCud51034.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130430 Cisco Prime Central for Hosted Collaboration Solution Directory Traversal Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1156) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5074, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5074
- **State**: PUBLISHED
- **Published Date**: July 13, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 21:03 UTC
- **Reserved Date**: May 17, 2024 at 19:29 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - wp-eMember**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/174a2ba8-0215-480f-93ec-83ebc4a3200e/)
### Credits
- kauenavarro
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0877, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0877 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0877
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the FTP server for Shambala 4.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the (1) LIST (ls) or (2) GET commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [shambala-dotdot-directory-traversal(9224)](http://www.iss.net/security_center/static/9224.php)
2. [4896](http://www.securityfocus.com/bid/4896)
3. [20020530 [[ TH 026 Inc. ]] SA #3 - Shambala Server 4.5, Directory Traversal and DoS](http://archives.neohapsis.com/archives/bugtraq/2002-05/0282.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11122
- **State**: PUBLISHED
- **Published Date**: September 08, 2020 at 09:31 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'Null Pointer exception while playing crafted mkv file as data stream get deleted on secondary invalid configuration' in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8098, Bitra, Kamorta, SA6155P, Saipan, SM6150, SM7150, SM8150, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile**
Affected versions:
- APQ8098, Bitra, Kamorta, SA6155P, Saipan, SM6150, SM7150, SM8150, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32229
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:59 UTC
- **Last Updated**: April 04, 2025 at 20:11 UTC
- **Reserved Date**: April 04, 2025 at 10:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Bowo Variable Inspector allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Variable Inspector: from n/a through 2.6.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Bowo - Variable Inspector**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/variable-inspector/vulnerability/wordpress-variable-inspector-plugin-2-6-3-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Trương Hữu Phúc (truonghuuphuc) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7538
- **State**: PUBLISHED
- **Published Date**: March 12, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: February 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20180309 Tuleap SQL Injection](http://seclists.org/fulldisclosure/2018/Mar/20)
2. [](https://tuleap.net/plugins/tracker/?aid=11192)
3. [](https://github.com/cmaruti/reports/blob/master/tuleap.pdf)
4. [44286](https://www.exploit-db.com/exploits/44286/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2129
- **State**: PUBLISHED
- **Published Date**: March 09, 2025 at 20:00 UTC
- **Last Updated**: March 10, 2025 at 17:59 UTC
- **Reserved Date**: March 09, 2025 at 06:53 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Mage AI 0.9.75. It has been classified as problematic. This affects an unknown part. The manipulation leads to insecure default initialization of resource. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. After 7 months of repeated follow-ups by the researcher, Mage AI has decided to not accept this issue as a valid security vulnerability and has confirmed that they will not be addressing it.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-1188: Security Weakness
### Affected Products
**n/a - Mage AI**
Affected versions:
- 0.9.75 (Status: affected)
### References
1. [VDB-299049 | Mage AI insecure default initialization of resource](https://vuldb.com/?id.299049)
2. [VDB-299049 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.299049)
3. [Submit #510690 | Mage AI Mage AI Framwork 0.9.75 Insecure Default Initialization of Resource](https://vuldb.com/?submit.510690)
4. [](https://github.com/zn9988/publications/blob/main/2.Mage-AI%20-%20Insecure%20Default%20Authentication%20Setup%20Leading%20to%20Zero-Click%20RCE/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6406
- **State**: PUBLISHED
- **Published Date**: December 17, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in CA (formerly Computer Associates) eTrust Threat Management Console allow remote attackers to inject arbitrary web script or HTML via the IP Address field and other unspecified fields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019047](http://securitytracker.com/id?1019047)
2. [20071205 [ELEYTT] Public Advisory 05-12-2007](http://www.securityfocus.com/archive/1/484607/100/0/threaded)
3. [threatmanagement-ipaddress-xss(38868)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38868)
4. [3458](http://securityreason.com/securityalert/3458) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53791, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53791 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53791
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 12:57 UTC
- **Last Updated**: December 09, 2024 at 18:37 UTC
- **Reserved Date**: November 22, 2024 at 13:53 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ogun Labs Lenxel Core for Lenxel(LNX) LMS allows Stored XSS.This issue affects Lenxel Core for Lenxel(LNX) LMS: from n/a through 1.2.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ogun Labs - Lenxel Core for Lenxel(LNX) LMS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/lenxel-core/vulnerability/wordpress-lenxel-core-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2458
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:12 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.3 (Status: affected)
- 8.5.4 (Status: affected)
### References
1. [106579](http://www.securityfocus.com/bid/106579)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7049
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 07:15 UTC
- **Last Updated**: October 10, 2024 at 14:45 UTC
- **Reserved Date**: July 23, 2024 at 19:15 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.
### Weakness Classification (CWE)
- CWE-488: Security Weakness
### Affected Products
**open-webui - open-webui/open-webui**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/ee9e3532-8ef1-4599-bb59-b8e2ba43a1fc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3566
- **State**: PUBLISHED
- **Published Date**: July 13, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
search.results.php in HiveMail 3.1 and earlier allows remote attackers to obtain the installation path via certain manipulations related to the (1) searchdate and (2) folderids parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27104](http://www.osvdb.org/27104)
2. [1016531](http://securitytracker.com/id?1016531)
3. [hivemail-searchresults-path-disclosure(27696)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27696)
4. [](http://pridels0.blogspot.com/2006/07/hivemail-vuln.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56069
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 09:12 UTC
- **Last Updated**: January 03, 2025 at 19:14 UTC
- **Reserved Date**: December 14, 2024 at 19:43 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Azzaroco WP SuperBackup allows Reflected XSS.This issue affects WP SuperBackup: from n/a through 2.3.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Azzaroco - WP SuperBackup**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/indeed-wp-superbackup/vulnerability/wordpress-wp-superbackup-plugin-2-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dave Jong (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6693
- **State**: PUBLISHED
- **Published Date**: November 22, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 07, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The MLDP implementation in Cisco IOS 15.3(3)S and earlier on 7600 routers, when many VRFs are configured, allows remote attackers to cause a denial of service (chunk corruption and device reload) by establishing many multicast flows, aka Bug ID CSCue22345.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=31861)
2. [20131121 Cisco IOS Software MLDP Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6693) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14749
- **State**: PUBLISHED
- **Published Date**: August 07, 2019 at 16:38 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. CSV (aka Formula) injection exists in the export spreadsheets functionality. These spreadsheets are generated dynamically from unvalidated or unfiltered user input in the Name and Internal Notes fields in the Users tab, and the Issue Summary field in the tickets tab. This allows other agents to download data in a .csv file format or .xls file format. This is used as input for spreadsheet applications such as Excel and OpenOffice Calc, resulting in a situation where cells in the spreadsheets can contain input from an untrusted source. As a result, the end user who is accessing the exported spreadsheet can be affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/osTicket/osTicket/releases/tag/v1.12.1)
2. [](https://github.com/osTicket/osTicket/releases/tag/v1.10.7)
3. [](https://github.com/osTicket/osTicket/commit/99818486c5b1d8aa445cee232825418d6834f249)
4. [](http://packetstormsecurity.com/files/154004/osTicket-1.12-Formula-Injection.html)
5. [47225](https://www.exploit-db.com/exploits/47225) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31265
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 17:12 UTC
- **Last Updated**: August 03, 2024 at 07:11 UTC
- **Reserved Date**: May 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The replay feature in the client in Wargaming World of Warships 0.11.4 allows remote attackers to execute code when a user launches a replay from an untrusted source.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://imgur.com/a/cm5E0jb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51965
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 26, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3909
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 11:31 UTC
- **Last Updated**: August 01, 2024 at 20:26 UTC
- **Reserved Date**: April 17, 2024 at 05:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Tenda AC500 2.0.1.9(1307). Affected by this vulnerability is the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261145 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - AC500**
Affected versions:
- 2.0.1.9(1307) (Status: affected)
### References
1. [VDB-261145 | Tenda AC500 execCommand formexeCommand stack-based overflow](https://vuldb.com/?id.261145)
2. [VDB-261145 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261145)
3. [Submit #313804 | Tenda AC500 V2.0.1.9(1307) buffer overflow](https://vuldb.com/?submit.313804)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md)
### Credits
- yhryhryhr_tu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5404
- **State**: PUBLISHED
- **Published Date**: December 09, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure method vulnerability in the FlexCell.Grid ActiveX control in FlexCell.ocx 5.7.0.1 in FlexCell Grid ActiveX Component allows remote attackers to create and overwrite arbitrary files via the HttpDownloadFile method. NOTE: this could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32829](http://secunia.com/advisories/32829)
2. [flexcell-grid-file-overwrite(46809)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46809)
3. [32443](http://www.securityfocus.com/bid/32443) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0418
- **State**: PUBLISHED
- **Published Date**: November 10, 2020 at 12:47 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15862
- **State**: PUBLISHED
- **Published Date**: August 19, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://salsa.debian.org/debian/net-snmp/-/commit/fad8725402752746daf0a751dcff19eb6aeab52e)
2. [](https://github.com/net-snmp/net-snmp/commit/77f6c60f57dba0aaea5d8ef1dd94bcd0c8e6d205)
3. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166)
4. [](https://security-tracker.debian.org/tracker/CVE-2020-15862)
5. [GLSA-202008-12](https://security.gentoo.org/glsa/202008-12)
6. [USN-4471-1](https://usn.ubuntu.com/4471-1/)
7. [](https://security.netapp.com/advisory/ntap-20200904-0001/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1057
- **State**: PUBLISHED
- **Published Date**: February 08, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 02:12 UTC
- **Reserved Date**: February 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in CDE Print Viewer (dtprintinfo) for Sun Solaris 2.6 through 9 may allow local users to execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ESB-2003.0844](http://www.auscert.org.au/render.html?it=3675)
2. [10384](http://secunia.com/advisories/10384)
3. [9170](http://www.securityfocus.com/bid/9170)
4. [O-035](http://www.ciac.org/ciac/bulletins/o-035.shtml)
5. [cde-dtprintinfo-gain-privileges(13914)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13914)
6. [2924](http://www.osvdb.org/2924)
7. [57441](http://sunsolve.sun.com/search/document.do?assetkey=1-26-57441-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0280
- **State**: PUBLISHED
- **Published Date**: July 15, 2021 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 22:40 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyond the default DDoS (Distributed Denial of Service) settings in the Packet Forwarding Engine (PFE). This may cause BFD sessions to flap when a high rate of specific packets are received. Flapping of BFD sessions in turn may impact routing protocols and network stability, leading to a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects only the following platforms with Paradise (PE) chipset-based line cards: PTX1000, PTX3000 (NextGen), PTX5000, PTX10008, PTX10016 Series and QFX10002 Series. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R3-S5 on PTX Series, QFX10K Series; 18.2 versions prior to 18.2R3-S8 on PTX Series, QFX10K Series; 18.3 versions prior to 18.3R3-S5 on PTX Series, QFX10K Series; 18.4 versions prior to 18.4R2-S8 on PTX Series, QFX10K Series; 19.1 versions prior to 19.1R3-S5 on PTX Series, QFX10K Series; 19.2 versions prior to 19.2R3-S2 on PTX Series, QFX10K Series; 19.3 versions prior to 19.3R3-S2 on PTX Series, QFX10K Series; 19.4 versions prior to 19.4R3-S2 on PTX Series, QFX10K Series; 20.1 versions prior to 20.1R3 on PTX Series, QFX10K Series; 20.2 versions prior to 20.2R2-S3, 20.2R3 on PTX Series, QFX10K Series; 20.3 versions prior to 20.3R2 on PTX Series, QFX10K Series; 20.4 versions prior to 20.4R2 on PTX Series, QFX10K Series.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-665: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 17.4 (Status: affected)
- 18.2 (Status: affected)
- 18.3 (Status: affected)
- 18.4 (Status: affected)
- 19.1 (Status: affected)
- 19.2 (Status: affected)
- 19.3 (Status: affected)
- 19.4 (Status: affected)
- 20.1 (Status: affected)
- 20.2 (Status: affected)
- 20.3 (Status: affected)
- 20.4 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33359
- **State**: PUBLISHED
- **Published Date**: May 23, 2023 at 00:00 UTC
- **Last Updated**: January 31, 2025 at 17:29 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Piwigo/Piwigo/issues/1908) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1002000, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1002000 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1002000
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 22:00 UTC
- **Reserved Date**: September 14, 2017 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
Vulnerability in wordpress plugin mobile-friendly-app-builder-by-easytouch v3.0, The code in file ./mobile-friendly-app-builder-by-easytouch/server/images.php doesn't require authentication or check that the user is allowed to upload content.
### Affected Products
**jenova12345 - mobile-friendly-app-builder-by-easytouch**
Affected versions:
- unspecified (Status: affected)
### References
1. [96905](http://www.securityfocus.com/bid/96905)
2. [96899](http://www.securityfocus.com/bid/96899)
3. [](https://wordpress.org/plugins-wp/mobile-friendly-app-builder-by-easytouch/)
4. [41540](https://www.exploit-db.com/exploits/41540/)
5. [](http://www.vapidlabs.com/advisory.php?v=179) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40186
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 18:09 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 29, 2021 at 00:00 UTC
- **Assigned By**: AppCheck
### Vulnerability Description
The AppCheck research team identified a Server-Side Request Forgery (SSRF) vulnerability within the DNN CMS platform, formerly known as DotNetNuke. SSRF vulnerabilities allow the attacker to exploit the target system to make network requests on their behalf, allowing a range of possible attacks. In the most common scenario, the attacker exploits SSRF vulnerabilities to attack systems behind the firewall and access sensitive information from Cloud Provider metadata services.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**DNNSoftware - DNN Platform**
Affected versions:
- 9.0 (Status: affected)
### References
1. [](https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14648
- **State**: PUBLISHED
- **Published Date**: September 28, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: July 27, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**[UNKNOWN] - 389-ds-base:**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20181025 [SECURITY] [DLA 1554-1] 389-ds-base security update](https://lists.debian.org/debian-lts-announce/2018/10/msg00015.html)
2. [RHSA-2018:3507](https://access.redhat.com/errata/RHSA-2018:3507)
3. [RHSA-2018:3127](https://access.redhat.com/errata/RHSA-2018:3127)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0976
- **State**: PUBLISHED
- **Published Date**: February 02, 2012 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 02, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin/EditForm in SilverStripe 2.4.6 allows remote authenticated users with Content Authors privileges to inject arbitrary web script or HTML via the Title parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://doc.silverstripe.org/framework/en/trunk/changelogs/2.4.7)
2. [](https://github.com/silverstripe/sapphire/commit/475e077)
3. [78677](http://osvdb.org/78677)
4. [51761](http://www.securityfocus.com/bid/51761)
5. [47812](http://secunia.com/advisories/47812)
6. [[oss-security] 20120430 Re: CVE-request: SilverStripe before 2.4.4](http://www.openwall.com/lists/oss-security/2012/04/30/3)
7. [](https://github.com/silverstripe/sapphire/commit/5fe7091)
8. [](http://doc.silverstripe.org/framework/en/trunk/changelogs/2.3.13)
9. [silverstripe-editform-xss(72820)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72820)
10. [](http://packetstormsecurity.org/files/view/109210/silverstripecmspage-xss.txt)
11. [](https://github.com/silverstripe/sapphire/commit/252e187) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47643
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:54 UTC
- **Last Updated**: May 04, 2025 at 07:15 UTC
- **Reserved Date**: February 26, 2025 at 01:48 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: ir_toy: free before error exiting
Fix leak in error path.
### Affected Products
**Linux - Linux**
Affected versions:
- 261463dbc34ff0acafe4d84df04535b48a15afea (Status: affected)
- 261463dbc34ff0acafe4d84df04535b48a15afea (Status: affected)
- 261463dbc34ff0acafe4d84df04535b48a15afea (Status: affected)
- 261463dbc34ff0acafe4d84df04535b48a15afea (Status: affected)
- 261463dbc34ff0acafe4d84df04535b48a15afea (Status: affected)
**Linux - Linux**
Affected versions:
- 5.9 (Status: affected)
- 0 (Status: unaffected)
- 5.10.110 (Status: unaffected)
- 5.15.33 (Status: unaffected)
- 5.16.19 (Status: unaffected)
- 5.17.2 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/99e3f83539cac6884a4df02cb204a57a184ea12b)
2. [](https://git.kernel.org/stable/c/2011363c196846c083649c91ed30aeef64358d52)
3. [](https://git.kernel.org/stable/c/382e0f6958ef34eb093127b6d74c12f3b8fd0904)
4. [](https://git.kernel.org/stable/c/93ef3fdf3b6633c58f049e5a6be755777dde4340)
5. [](https://git.kernel.org/stable/c/52cdb013036391d9d87aba5b4fc49cdfc6ea4b23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5816
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 17:31 UTC
- **Last Updated**: September 17, 2024 at 00:26 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2 allows remote attackers to affect availability via unknown vectors related to Metro.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28414
- **State**: PUBLISHED
- **Published Date**: April 21, 2022 at 19:05 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_member.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Home-Owners-Collection-Management/SQLi-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1934
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:59 UTC
- **Last Updated**: August 01, 2024 at 18:56 UTC
- **Reserved Date**: February 27, 2024 at 14:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Compress – Image Optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wps_local_compress::__construct' function in all versions up to, and including, 6.11.10. This makes it possible for unauthenticated attackers to reset the CDN region and set a malicious URL to deliver images.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**smartersite - WP Compress – Image Optimizer [All-In-One]**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/88a46a24-6d46-44cc-ac01-70a1c329cb51?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.10.35/addons/legacy/compress.php)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054445@wp-compress-image-optimizer/trunk&old=3048575@wp-compress-image-optimizer/trunk&sfp_email=&sfph_mail=#file2)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6507
- **State**: PUBLISHED
- **Published Date**: March 24, 2017 at 06:56 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 07, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3648)
2. [97223](http://www.securityfocus.com/bid/97223)
3. [](https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6507.html)
4. [](https://bugs.launchpad.net/apparmor/+bug/1668892)
5. [](http://bazaar.launchpad.net/~apparmor-dev/apparmor/master/revision/3647) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2559
- **State**: PUBLISHED
- **Published Date**: July 21, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 05:52 UTC
- **Reserved Date**: July 21, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the IPMI dissector in Wireshark 1.2.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an array index error. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.wireshark.org/security/wnpa-sec-2009-04.html)
2. [ADV-2009-1970](http://www.vupen.com/english/advisories/2009/1970)
3. [oval:org.mitre.oval:def:6379](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6379)
4. [35748](http://www.securityfocus.com/bid/35748)
5. [35884](http://secunia.com/advisories/35884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3467, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3467 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3467
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:56 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Application Express component in Oracle Database Server before 5.0.4 allows remote attackers to affect availability via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
2. [1036363](http://www.securitytracker.com/id/1036363)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [91894](http://www.securityfocus.com/bid/91894) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4591
- **State**: PUBLISHED
- **Published Date**: August 29, 2007 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 15:01 UTC
- **Reserved Date**: August 29, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
vstor-ws60.sys in VMWare Workstation 6.0 allows local users to cause a denial of service (host operating system crash) and possibly gain privileges by sending a small file buffer size value to the FsSetVolumeInformation IOCTL handler with an FsSetFileInformation subcode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1018609](http://www.securitytracker.com/id?1018609)
2. [26606](http://secunia.com/advisories/26606)
3. [vmware-vmstor-privilege-escalation(36277)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36277)
4. [25441](http://www.securityfocus.com/bid/25441)
5. [](http://tarrysingh.blogspot.com/2007/08/security-vmware-workstation-6.html)
6. [ADV-2007-2992](http://www.vupen.com/english/advisories/2007/2992)
7. [20070824 security vulnerability in VMware](http://marc.info/?l=bugtraq&m=118805138626360&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13126
- **State**: PUBLISHED
- **Published Date**: July 29, 2019 at 16:07 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: July 01, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An integer overflow in NATS Server before 2.0.2 allows a remote attacker to crash the server by sending a crafted request. If authentication is enabled, then the remote attacker must have first authenticated.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/)
2. [](https://github.com/nats-io/nats-server/pull/1053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51606
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 14:19 UTC
- **Last Updated**: November 12, 2024 at 15:06 UTC
- **Reserved Date**: October 30, 2024 at 15:04 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Blrt Blrt WP Embed allows SQL Injection.This issue affects Blrt WP Embed: from n/a through 1.6.9.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Blrt - Blrt WP Embed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/blrt-wp-embed/wordpress-blrt-wp-embed-plugin-1-6-9-sql-injection-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0626
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 18:58 UTC
- **Last Updated**: August 01, 2024 at 20:01 UTC
- **Reserved Date**: January 16, 2024 at 19:43 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Affected Products
**elbanyaoui - WooCommerce Clover Payment Gateway**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/57aacffa-0f49-4a33-ae40-d1c151363284?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/woo-clover-gateway-by-zaytech/trunk/zaytech-woo-commerce-clover-integration.php?rev=2998654#L218)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3055678%40woo-clover-gateway-by-zaytech%2Ftrunk&old=2998658%40woo-clover-gateway-by-zaytech%2Ftrunk&sfp_email=&sfph_mail=#file3)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4309
- **State**: PUBLISHED
- **Published Date**: August 23, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VNC server on the AK-Systems Windows Terminal 1.2.5 ExVLP is not password protected, which allows remote attackers to login and view RDP or Citrix sessions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [windows-terminal-vnc-unauth-access(28532)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28532)
2. [20060822 unauthorized VNC access in AK-Systems Windows Terminals](http://www.securityfocus.com/archive/1/444060/100/0/threaded)
3. [19659](http://www.securityfocus.com/bid/19659)
4. [1438](http://securityreason.com/securityalert/1438) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21495
- **State**: PUBLISHED
- **Published Date**: January 04, 2021 at 02:05 UTC
- **Last Updated**: August 03, 2024 at 18:16 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://mk-auth.com.br/)
2. [](https://gist.github.com/alacerda/98853283be6009e75b7d94968d50b88e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4704, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4704 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4704
- **State**: PUBLISHED
- **Published Date**: September 16, 2013 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 17:39 UTC
- **Reserved Date**: June 26, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in ChamaNet ChamaCargo 7.0000 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.chama.ne.jp/cart.htm)
2. [JVNDB-2013-000088](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000088)
3. [JVN#77455005](http://jvn.jp/en/jp/JVN77455005/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5237
- **State**: PUBLISHED
- **Published Date**: August 08, 2019 at 16:49 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei PCManager with the versions before 9.0.1.66 (Oversea) and versions before 9.0.1.70 (China) have a code execution vulnerability. Successful exploitation may cause the attacker to execute code and read/write information.
### Affected Products
**Huawei - PCManager**
Affected versions:
- versions before PCManager 9.0.1.66 (Oversea) (Status: affected)
- versions before PCManager 9.0.1.70 (China) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190710-01-pcmanager-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1269, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1269 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1269
- **State**: PUBLISHED
- **Published Date**: March 06, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME](http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html)
2. [2353](http://securityreason.com/securityalert/2353)
3. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/30/7710/threaded)
4. [](http://www.coresecurity.com/?action=item&id=1687)
5. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/100/0/threaded)
6. [24417](http://secunia.com/advisories/24417)
7. [1017727](http://www.securitytracker.com/id?1017727)
8. [22779](http://www.securityfocus.com/bid/22779)
9. [ADV-2007-0835](http://www.vupen.com/english/advisories/2007/0835) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46951
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 18:40 UTC
- **Last Updated**: May 04, 2025 at 07:01 UTC
- **Reserved Date**: February 25, 2024 at 13:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tpm: efi: Use local variable for calculating final log size
When tpm_read_log_efi is called multiple times, which happens when
one loads and unloads a TPM2 driver multiple times, then the global
variable efi_tpm_final_log_size will at some point become a negative
number due to the subtraction of final_events_preboot_size occurring
each time. Use a local variable to avoid this integer underflow.
The following issue is now resolved:
Mar 8 15:35:12 hibinst kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
Mar 8 15:35:12 hibinst kernel: Workqueue: tpm-vtpm vtpm_proxy_work [tpm_vtpm_proxy]
Mar 8 15:35:12 hibinst kernel: RIP: 0010:__memcpy+0x12/0x20
Mar 8 15:35:12 hibinst kernel: Code: 00 b8 01 00 00 00 85 d2 74 0a c7 05 44 7b ef 00 0f 00 00 00 c3 cc cc cc 66 66 90 66 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 f3 a4
Mar 8 15:35:12 hibinst kernel: RSP: 0018:ffff9ac4c0fcfde0 EFLAGS: 00010206
Mar 8 15:35:12 hibinst kernel: RAX: ffff88f878cefed5 RBX: ffff88f878ce9000 RCX: 1ffffffffffffe0f
Mar 8 15:35:12 hibinst kernel: RDX: 0000000000000003 RSI: ffff9ac4c003bff9 RDI: ffff88f878cf0e4d
Mar 8 15:35:12 hibinst kernel: RBP: ffff9ac4c003b000 R08: 0000000000001000 R09: 000000007e9d6073
Mar 8 15:35:12 hibinst kernel: R10: ffff9ac4c003b000 R11: ffff88f879ad3500 R12: 0000000000000ed5
Mar 8 15:35:12 hibinst kernel: R13: ffff88f878ce9760 R14: 0000000000000002 R15: ffff88f77de7f018
Mar 8 15:35:12 hibinst kernel: FS: 0000000000000000(0000) GS:ffff88f87bd00000(0000) knlGS:0000000000000000
Mar 8 15:35:12 hibinst kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Mar 8 15:35:12 hibinst kernel: CR2: ffff9ac4c003c000 CR3: 00000001785a6004 CR4: 0000000000060ee0
Mar 8 15:35:12 hibinst kernel: Call Trace:
Mar 8 15:35:12 hibinst kernel: tpm_read_log_efi+0x152/0x1a7
Mar 8 15:35:12 hibinst kernel: tpm_bios_log_setup+0xc8/0x1c0
Mar 8 15:35:12 hibinst kernel: tpm_chip_register+0x8f/0x260
Mar 8 15:35:12 hibinst kernel: vtpm_proxy_work+0x16/0x60 [tpm_vtpm_proxy]
Mar 8 15:35:12 hibinst kernel: process_one_work+0x1b4/0x370
Mar 8 15:35:12 hibinst kernel: worker_thread+0x53/0x3e0
Mar 8 15:35:12 hibinst kernel: ? process_one_work+0x370/0x370
### Affected Products
**Linux - Linux**
Affected versions:
- 166a2809d65b282272c474835ec22c882a39ca1b (Status: affected)
- 166a2809d65b282272c474835ec22c882a39ca1b (Status: affected)
- 166a2809d65b282272c474835ec22c882a39ca1b (Status: affected)
- 166a2809d65b282272c474835ec22c882a39ca1b (Status: affected)
- 166a2809d65b282272c474835ec22c882a39ca1b (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.4.118 (Status: unaffected)
- 5.10.36 (Status: unaffected)
- 5.11.20 (Status: unaffected)
- 5.12.3 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/2f12258b5224cfaa808c54fd29345f3c1cbfca76)
2. [](https://git.kernel.org/stable/c/60a01ecc9f68067e4314a0b55148e39e5d58a51b)
3. [](https://git.kernel.org/stable/c/3818b753277f5ca0c170bf5b98e0a5a225542fcb)
4. [](https://git.kernel.org/stable/c/ac07c557ca12ec9276c0375517bac7ae5be4e50c)
5. [](https://git.kernel.org/stable/c/48cff270b037022e37835d93361646205ca25101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1664
- **State**: PUBLISHED
- **Published Date**: May 20, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the admin panel in osCMax before 2.5.1 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter in a process action to admin/login.php; (2) pageTitle, (3) current_product_id, or (4) cPath parameter to admin/new_attributes_include.php; (5) sb_id, (6) sb_key, (7) gc_id, (8) gc_key, or (9) path parameter to admin/htaccess.php; (10) title parameter to admin/information_form.php; (11) search parameter to admin/xsell.php; (12) gross or (13) max parameter to admin/stats_products_purchased.php; (14) status parameter to admin/stats_monthly_sales.php; (15) sorted parameter to admin/stats_customers.php; (16) information_id parameter to /admin/information_manager.php; or (17) zID parameter to /admin/geo_zones.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [80906](http://www.osvdb.org/80906)
2. [](https://www.htbridge.com/advisory/HTB23081)
3. [80912](http://www.osvdb.org/80912)
4. [80905](http://www.osvdb.org/80905)
5. [80908](http://www.osvdb.org/80908)
6. [20120404 Multiple vulnerabilities in osCmax](http://archives.neohapsis.com/archives/bugtraq/2012-04/0021.html)
7. [80910](http://www.osvdb.org/80910)
8. [80911](http://www.osvdb.org/80911)
9. [](http://bugtrack.oscmax.com/view.php?id=1165)
10. [](http://www.oscmax.com/blog/michael_s/oscmax_v251_has_been_released_security_update)
11. [80904](http://www.osvdb.org/80904)
12. [80909](http://www.osvdb.org/80909)
13. [80907](http://www.osvdb.org/80907)
14. [80903](http://www.osvdb.org/80903) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0357
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 21:00 UTC
- **Last Updated**: November 29, 2024 at 15:03 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web framework of Cisco WebEx could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Cisco Bug IDs: CSCvi71274.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Cisco WebEx unknown**
Affected versions:
- Cisco WebEx unknown (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss1)
2. [104420](http://www.securityfocus.com/bid/104420)
3. [1041063](http://www.securitytracker.com/id/1041063) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14770
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:26 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Hyperion BI+**
Affected versions:
- 11.1.2.4 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6334
- **State**: PUBLISHED
- **Published Date**: December 08, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 20:19 UTC
- **Reserved Date**: December 06, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the SendChannelData function in wfica.ocx in Citrix Presentation Server Client before 9.230 for Windows allows remote malicious web sites to execute arbitrary code via a DataSize parameter that is less than the length of the Data buffer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [23246](http://secunia.com/advisories/23246)
2. [1995](http://securityreason.com/securityalert/1995)
3. [ADV-2006-4865](http://www.vupen.com/english/advisories/2006/4865)
4. [citrix-wfica-bo(30740)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30740)
5. [21458](http://www.securityfocus.com/bid/21458)
6. [5106](https://www.exploit-db.com/exploits/5106)
7. [VU#210969](http://www.kb.cert.org/vuls/id/210969)
8. [](http://www.tippingpoint.com/security/advisories/TSRT-06-15.html)
9. [](http://support.citrix.com/article/CTX111827)
10. [](http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf)
11. [1017343](http://securitytracker.com/id?1017343)
12. [](http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755)
13. [20061207 TSRT-06-15: Citrix Presentation Server Client ActiveX Heap Overflow Vulnerability](http://www.securityfocus.com/archive/1/453760/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50677
- **State**: PUBLISHED
- **Published Date**: March 14, 2024 at 00:00 UTC
- **Last Updated**: August 14, 2024 at 18:56 UTC
- **Reserved Date**: December 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in NETGEAR-DGND4000 v.1.1.00.15_1.00.15 allows a remote attacker to escalate privileges via the next_file parameter to the /setup.cgi component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/DMIND-NLL/b61b8d8d20271adf60fc717b3b48faff) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6739
- **State**: PUBLISHED
- **Published Date**: April 27, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 08, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM SPSS Modeler before 16 on UNIX allows remote authenticated users to bypass intended access restrictions via an SSO token. IBM X-Force ID: 89855.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-spss-cve20136739-sec-bypass(89855)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89855)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21663960) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3254
- **State**: PUBLISHED
- **Published Date**: June 27, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 19, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Xythos Enterprise Document Manager (XEDM) before 5.0.25.8, and 6.x before 6.0.46.1, allow remote authenticated users to inject arbitrary web script or HTML via (1) a saved Workflow name; (2) a Workflow name, related to deletion of a Workflow template; (3) the Content-Type HTTP header; or (4) the name of an uploaded file. NOTE: items 3 and 4 also affect the same version numbers of Xythos Digital Locker (XDL). Some or all vectors might also affect Xythos WebFile Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070622 SYMSA-2007-004: Multiple Vulnerabilities in Xythos Server Products](http://www.securityfocus.com/archive/1/472275/100/0/threaded)
2. [37624](http://osvdb.org/37624)
3. [24521](http://www.securityfocus.com/bid/24521)
4. [37623](http://osvdb.org/37623)
5. [25783](http://secunia.com/advisories/25783)
6. [37622](http://osvdb.org/37622)
7. [37621](http://osvdb.org/37621)
8. [1018292](http://securitytracker.com/id?1018292)
9. [](http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-004.txt)
10. [2845](http://securityreason.com/securityalert/2845)
11. [xedm-multiple-xss(35083)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35083)
12. [1018291](http://securitytracker.com/id?1018291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3659
- **State**: PUBLISHED
- **Published Date**: September 13, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html)
2. [](http://support.apple.com/kb/HT5485)
3. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
4. [](http://support.apple.com/kb/HT5503)
5. [apple-itunes-webkit-cve20123659(78515)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78515)
6. [](http://support.apple.com/kb/HT5502)
7. [55534](http://www.securityfocus.com/bid/55534)
8. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html)
9. [oval:org.mitre.oval:def:17562](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17562) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2083
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 09:22 UTC
- **Last Updated**: April 15, 2025 at 13:08 UTC
- **Reserved Date**: March 07, 2025 at 00:25 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Logo Carousel Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘sliderId’ parameter in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**binsaifullah - Logo Carousel Gutenberg Block**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/604123f4-9247-489a-8fc8-478bfc697c7f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/awesome-logo-carousel-block/tags/2.1.3/inc/classes/style.php#L86)
3. [](https://wordpress.org/plugins/awesome-logo-carousel-block/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3271660/)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49107, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49107
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 01:54 UTC
- **Last Updated**: May 04, 2025 at 08:30 UTC
- **Reserved Date**: February 26, 2025 at 01:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
Reset the last_readdir at the same time, and add a comment explaining
why we don't free last_readdir when dir_emit returns false.
### Affected Products
**Linux - Linux**
Affected versions:
- 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected)
- 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected)
- 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected)
- 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected)
- 9030aaf9bf0a1eee47a154c316c789e959638b0f (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.34 (Status: affected)
- 0 (Status: unaffected)
- 5.10.111 (Status: unaffected)
- 5.15.34 (Status: unaffected)
- 5.16.20 (Status: unaffected)
- 5.17.3 (Status: unaffected)
- 5.18 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f4429786129648a8f4bb1e5faa143c4478cc5c4a)
2. [](https://git.kernel.org/stable/c/2fe82d3254029ef9ec4e7be890125d5ef4f537de)
3. [](https://git.kernel.org/stable/c/e792575b902a3939ca482491ee9fb3a236f99640)
4. [](https://git.kernel.org/stable/c/7f740ede35132d3d5d19747cad56a511d21bb156)
5. [](https://git.kernel.org/stable/c/f639d9867eea647005dc824e0e24f39ffc50d4e4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7492
- **State**: PUBLISHED
- **Published Date**: February 26, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: February 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-4187](https://www.debian.org/security/2018/dsa-4187)
2. [103185](http://www.securityfocus.com/bid/103185)
3. [USN-3619-2](https://usn.ubuntu.com/3619-2/)
4. [USN-3674-1](https://usn.ubuntu.com/3674-1/)
5. [USN-3677-1](https://usn.ubuntu.com/3677-1/)
6. [USN-3674-2](https://usn.ubuntu.com/3674-2/)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1527393)
8. [](https://patchwork.kernel.org/patch/10096441/)
9. [USN-3677-2](https://usn.ubuntu.com/3677-2/)
10. [](https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.7)
11. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca)
12. [](https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/)
13. [[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update](https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html)
14. [USN-3619-1](https://usn.ubuntu.com/3619-1/)
15. [](https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26350, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26350 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26350
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 16:16 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.
### Affected Products
**AMD - EPYC™ Processors**
Affected versions:
- various (Status: affected)
### References
1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34437
- **State**: PUBLISHED
- **Published Date**: October 21, 2022 at 18:05 UTC
- **Last Updated**: May 07, 2025 at 15:53 UTC
- **Reserved Date**: June 23, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell PowerScale OneFS, versions 8.2.2-9.3.0, contain an OS command injection vulnerability. A privileged local malicious user could potentially exploit this vulnerability, leading to a full system compromise. This impacts compliance mode clusters.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - PowerScale OneFS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000204053/dsa-2022-245-dell-emc-powerscale-onefs-security-update-for-multiple-security-updates) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32383
- **State**: PUBLISHED
- **Published Date**: April 10, 2025 at 13:07 UTC
- **Last Updated**: April 10, 2025 at 13:35 UTC
- **Reserved Date**: April 06, 2025 at 19:46 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
MaxKB (Max Knowledge Base) is an open source knowledge base question-answering system based on a large language model and retrieval-augmented generation (RAG). A reverse shell vulnerability exists in the module of function library. The vulnerability allow privileged users to create a reverse shell. This vulnerability is fixed in v1.10.4-lts.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**1Panel-dev - MaxKB**
Affected versions:
- < 1.10.4-lts (Status: affected)
### References
1. [https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-fjf6-6cvf-xr72](https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-fjf6-6cvf-xr72)
2. [https://github.com/1Panel-dev/MaxKB/commit/4ae02c8d3eb65542c88ef58c0abd94c52c949d8f](https://github.com/1Panel-dev/MaxKB/commit/4ae02c8d3eb65542c88ef58c0abd94c52c949d8f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11088
- **State**: PUBLISHED
- **Published Date**: May 29, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 11:21 UTC
- **Reserved Date**: March 30, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**FreeRDP - FreeRDP**
Affected versions:
- <= 2.0.0 (Status: affected)
### References
1. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp)
2. [](https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae)
3. [openSUSE-SU-2020:1090](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html)
4. [[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update](https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17967
- **State**: PUBLISHED
- **Published Date**: October 03, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 20:57 UTC
- **Reserved Date**: October 03, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ImageMagick 7.0.7-28 has a memory leak vulnerability in ReadBGRImage in coders/bgr.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/1051) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25777
- **State**: PUBLISHED
- **Published Date**: February 14, 2024 at 13:37 UTC
- **Last Updated**: August 22, 2024 at 14:09 UTC
- **Reserved Date**: February 24, 2023 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 7.9/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**n/a - Intel(R) Thunderbolt(TM) DCH drivers for Windows**
Affected versions:
- before version 88 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39837
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 14:05 UTC
- **Last Updated**: August 01, 2024 at 20:47 UTC
- **Reserved Date**: July 23, 2024 at 17:55 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly restrict channel creation which allows a malicious remote to create arbitrary channels, when shared channels were enabled.
### CVSS Metrics
- **CVSS Base Score**: 3.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 9.9.0 (Status: affected)
- 9.5.0 (Status: affected)
- 9.10.0 (Status: unaffected)
- 9.9.1 (Status: unaffected)
- 9.5.7 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- Juho Forsén |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47283, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47283 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47283
- **State**: PUBLISHED
- **Published Date**: May 19, 2025 at 18:46 UTC
- **Last Updated**: May 20, 2025 at 13:10 UTC
- **Reserved Date**: May 05, 2025 at 16:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**gardener - gardener**
Affected versions:
- < 1.116.4 (Status: affected)
- >= 1.117.0, < 1.117.5 (Status: affected)
- >= 1.118.0, < 1.118.2 (Status: affected)
### References
1. [https://github.com/gardener/gardener/security/advisories/GHSA-3hw7-qj9h-r835](https://github.com/gardener/gardener/security/advisories/GHSA-3hw7-qj9h-r835) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41537
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 15:01 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /user_operations/profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/SmallDarkRoom1/bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/RCE-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4751
- **State**: PUBLISHED
- **Published Date**: March 01, 2011 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:55 UTC
- **Reserved Date**: March 01, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in LightNEasy.php in LightNEasy 3.2.1, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary SQL commands via the id parameter in an edituser action, a different vector than CVE-2008-6593, CVE-2010-3484, and CVE-2010-3485.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://holisticinfosec.org/content/view/168/45/)
2. [lightneasy-id-sql-injection(63723)](https://exchange.xforce.ibmcloud.com/vulnerabilities/63723)
3. [](http://www.lightneasy.org/punbb/viewtopic.php?id=1207)
4. [45230](http://www.securityfocus.com/bid/45230)
5. [42391](http://secunia.com/advisories/42391) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38846, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38846 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38846
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 14:32 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Marbre Lapin Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://liff.line.me/1657925980-KmmGkje5)
2. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38846.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24706
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 16:50 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: January 26, 2024 at 23:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Forum One WP-CFM wp-cfm.This issue affects WP-CFM: from n/a through 1.7.8.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Forum One - WP-CFM**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-cfm/wordpress-wp-cfm-plugin-1-7-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
2. [](https://github.com/forumone/wp-cfm/security/advisories/GHSA-2449-jmfc-gc7f)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3499
- **State**: PUBLISHED
- **Published Date**: November 04, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 03, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Frisk F-Prot Antivirus allows remote attackers to bypass protection via a ZIP file with a version header greater than 15, which prevents F-Prot from decompressing and analyzing the file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15293](http://www.securityfocus.com/bid/15293)
2. [20051102 [ TZO-012005 ] F-Prot/Frisk Anti Virus bypass - ZIP Version Header](http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0073.html)
3. [fprotantivirus-zip-bypass-protection(22967)](https://exchange.xforce.ibmcloud.com/vulnerabilities/22967)
4. [20865](http://www.osvdb.org/20865)
5. [20090402 [TZO-07-2009] F-PROT ZIP Method evasion](http://www.securityfocus.com/archive/1/502370/100/0/threaded)
6. [1015148](http://securitytracker.com/id?1015148)
7. [](http://thierry.sniff-em.com/research/fprot.html)
8. [20051103 [ TZO-012005 ] F-Prot/Frisk Anti Virus bypass - ZIP Version Header](http://www.securityfocus.com/archive/1/415637/30/0/threaded)
9. [](http://www.zoller.lu/research/fprot.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33851, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33851 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33851
- **State**: PUBLISHED
- **Published Date**: March 09, 2022 at 16:54 UTC
- **Last Updated**: August 04, 2024 at 00:05 UTC
- **Reserved Date**: June 04, 2021 at 00:00 UTC
- **Assigned By**: CSW
### Vulnerability Description
A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Custom logo link" executes whenever the user opens the Settings Page of the "Customize Login Image" Plugin.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - WordPress Customize Login Image Plugin**
Affected versions:
- Version 3.4 (Status: affected)
### References
1. [](https://cybersecurityworks.com/zerodays/cve-2021-33851-stored-cross-site-scripting-in-wordpress-customize-login-image.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3094
- **State**: PUBLISHED
- **Published Date**: September 21, 2010 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: August 20, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.18 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via (1) an action description, (2) an action message, (3) a node, or (4) a taxonomy term, related to the actions feature and the trigger module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2113](http://www.debian.org/security/2010/dsa-2113)
2. [[oss-security] 20100913 Re: CVE id requests: drupal](http://marc.info/?l=oss-security&m=128440896914512&w=2)
3. [](http://drupal.org/node/880476)
4. [[oss-security] 20100911 CVE id requests: drupal](http://marc.info/?l=oss-security&m=128418560705305&w=2)
5. [42391](http://www.securityfocus.com/bid/42391) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8767
- **State**: PUBLISHED
- **Published Date**: March 18, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 07:02 UTC
- **Reserved Date**: March 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
joyplus-cms 1.6.0 has XSS in manager/admin_ajax.php?action=save&tab={pre}vod_type via the t_name parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/joyplus/joyplus-cms/issues/420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8216
- **State**: PUBLISHED
- **Published Date**: August 27, 2024 at 20:31 UTC
- **Last Updated**: August 27, 2024 at 20:48 UTC
- **Reserved Date**: August 27, 2024 at 12:25 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file editPayment.php of the component Payment Handler. The manipulation of the argument recipt_no leads to improper access controls. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**nafisulbari - Insurance Management System**
Affected versions:
- 1.0 (Status: affected)
**itsourcecode - Insurance Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-275924 | nafisulbari/itsourcecode Insurance Management System Payment editPayment.php access control](https://vuldb.com/?id.275924)
2. [VDB-275924 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275924)
3. [Submit #393532 | GitHub Insurance Management System 1.0 Improper Access Controls](https://vuldb.com/?submit.393532)
### Credits
- fahadletsleep (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0988
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Arkeia backup server 4.2.8-2 and earlier creates its database files with world-writable permissions, which could allow local users to overwrite the files or obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3085](http://www.securityfocus.com/bid/3085)
2. [arkeia-insecure-file-permissions(6885)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6885)
3. [20010723 permission probs with Arkeia](http://archives.neohapsis.com/archives/bugtraq/2001-07/0521.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44264
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 10:06 UTC
- **Last Updated**: September 20, 2024 at 17:24 UTC
- **Reserved Date**: September 27, 2023 at 12:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Arrow Plugins - The Awesome Feed – Custom Feed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-facebook-feed/wordpress-the-awesome-feed-custom-feed-plugin-2-2-5-cross-site-scripting-xss?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1002
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 24, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
POP3 daemon in Stalker CommuniGate Pro 3.3.2 generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to determine valid email addresses on the server for SPAM attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [communigate-email-verify(5363)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5363)
2. [1792](http://www.securityfocus.com/bid/1792)
3. [20001012 Re: Netscape Messaging server 4.15 poor error strings](http://www.securityfocus.com/archive/1/139523) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11067
- **State**: PUBLISHED
- **Published Date**: October 10, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: July 07, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, the Athdiag procfs entry does not have a proper address sanity check which may potentially lead to the use of an out-of-range pointer offset.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-10-01)
2. [101160](http://www.securityfocus.com/bid/101160) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20024
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: August 03, 2024 at 01:55 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In system service, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219064; Issue ID: ALPS06219064.
### Affected Products
**MediaTek, Inc. - MT6580, MT6739, MT6750, MT6761, MT6762, MT6763, MT6765, MT6768, MT6771, MT6779, MT8167, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/February-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1297, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1297
- **State**: PUBLISHED
- **Published Date**: April 02, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, does not properly validate WebProcess IPC messages, which allows remote attackers to bypass a sandbox protection mechanism and read arbitrary files by leveraging WebProcess access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2014-04-01-1](http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26858
- **State**: PUBLISHED
- **Published Date**: March 31, 2023 at 00:00 UTC
- **Last Updated**: February 18, 2025 at 16:58 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability found in PrestaSHp faqs v.3.1.6 allows a remote attacker to escalate privileges via the faqsBudgetModuleFrontController::displayAjaxGenerateBudget component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://addons.prestashop.com/en/faq-frequently-asked-questions/16036-frequently-asked-questions-faq-page.html)
2. [](https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19580
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 16:04 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
All versions of GitLab prior to 11.5.1, 11.4.8, and 11.3.11 do not send an email to the old email address when an email address change is made.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/39809)
2. [](https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32743
- **State**: PUBLISHED
- **Published Date**: July 15, 2021 at 16:05 UTC
- **Last Updated**: August 03, 2024 at 23:33 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-202: Improper Input Validation
### Affected Products
**Icinga - icinga2**
Affected versions:
- < 2.11.10 (Status: affected)
- >= 2.12.0, <= 2.12.4 (Status: affected)
### References
1. [](https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7)
2. [](https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/)
3. [[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22019
- **State**: PUBLISHED
- **Published Date**: May 10, 2022 at 20:33 UTC
- **Last Updated**: January 02, 2025 at 18:58 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Remote Procedure Call Runtime Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Remote Procedure Call Runtime Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38725
- **State**: PUBLISHED
- **Published Date**: July 20, 2024 at 07:19 UTC
- **Last Updated**: August 02, 2024 at 04:19 UTC
- **Reserved Date**: June 19, 2024 at 11:16 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webstix Admin Dashboard RSS Feed allows Stored XSS.This issue affects Admin Dashboard RSS Feed: from n/a through 3.1.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Webstix - Admin Dashboard RSS Feed**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/admin-dashboard-rss-feed/wordpress-admin-dashboard-rss-feed-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- younsoung kim (Patchstack Alliance)
- SeoHyeon Lee (Patchstack Alliance)
- MyungJu Kim (Patchstack Alliance)
- SeoHee Kang (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24865
- **State**: PUBLISHED
- **Published Date**: March 14, 2023 at 16:55 UTC
- **Last Updated**: February 28, 2025 at 20:04 UTC
- **Reserved Date**: January 31, 2023 at 20:32 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24865) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8028
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 08:45 UTC
- **Last Updated**: September 17, 2024 at 03:54 UTC
- **Reserved Date**: January 27, 2020 at 00:00 UTC
- **Assigned By**: suse
### Vulnerability Description
A Improper Access Control vulnerability in the configuration of salt of SUSE Linux Enterprise Module for SUSE Manager Server 4.1, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Manager Server 3.2, SUSE Manager Server 4.0 allows local users to escalate to root on every system managed by SUSE manager. On the managing node itself code can be executed as user salt, potentially allowing for escalation to root there. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.1 google-gson versions prior to 2.8.5-3.4.3, httpcomponents-client-4.5.6-3.4.2, httpcomponents-. SUSE Manager Proxy 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Retail Branch Server 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Server 3.2 salt-netapi-client versions prior to 0.16.0-4.14.1, spacewalk-. SUSE Manager Server 4.0 release-notes-susemanager versions prior to 4.0.9-3.54.1.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**SUSE - SUSE Linux Enterprise Module for SUSE Manager Server 4.1**
Affected versions:
- salt-netapi-client (Status: affected)
**SUSE - SUSE Manager Server 3.2**
Affected versions:
- salt-netapi-client (Status: affected)
**SUSE - SUSE Manager Server 4.0**
Affected versions:
- salt-netapi-client (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=1175884) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13475
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 09:22 UTC
- **Last Updated**: February 12, 2025 at 15:56 UTC
- **Reserved Date**: January 16, 2025 at 18:45 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Small Package Quotes – UPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 4.5.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**enituretechnology - Small Package Quotes – UPS Edition**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c62680b5-e9e0-497f-b957-9b223a623917?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3237693/)
### Credits
- Colin Xu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35086
- **State**: PUBLISHED
- **Published Date**: June 14, 2022 at 09:50 UTC
- **Last Updated**: August 04, 2024 at 00:33 UTC
- **Reserved Date**: June 21, 2021 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible buffer over read due to improper validation of SIB type when processing a NR system Information message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile**
Affected versions:
- AR8035, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCS6490, SA515M, SD 8 Gen1 5G, SD480, SD690 5G, SD695, SD750G, SD765, SD765G, SD768G, SD778G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDX65, SDXR2 5G, SM7250P, SM7315, SM7325P, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46259
- **State**: PUBLISHED
- **Published Date**: December 19, 2023 at 15:43 UTC
- **Last Updated**: August 02, 2024 at 20:37 UTC
- **Reserved Date**: October 20, 2023 at 01:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
### Affected Products
**Ivanti - Avalanche**
Affected versions:
- 6.4.1 (Status: affected)
### References
1. [](https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0923
- **State**: PUBLISHED
- **Published Date**: February 09, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 08, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp)
2. [SSRT100441](http://marc.info/?l=bugtraq&m=130391284726795&w=2)
3. [8261](http://securityreason.com/securityalert/8261)
4. [ADV-2011-0308](http://www.vupen.com/english/advisories/2011/0308)
5. [HPSBMA02654](http://marc.info/?l=bugtraq&m=130391284726795&w=2)
6. [8323](http://securityreason.com/securityalert/8323)
7. [](http://zerodayinitiative.com/advisories/ZDI-11-055/)
8. [8329](http://securityreason.com/securityalert/8329)
9. [46234](http://www.securityfocus.com/bid/46234) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27829
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 23:00 UTC
- **Last Updated**: February 13, 2025 at 17:46 UTC
- **Reserved Date**: February 26, 2024 at 15:32 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.5. Processing a file may lead to unexpected app termination or arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT214106)
2. [](https://support.apple.com/kb/HT214106)
3. [](http://seclists.org/fulldisclosure/2024/May/12) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.