System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5111
- **State**: PUBLISHED
- **Published Date**: December 03, 2019 at 21:37 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_cat was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - Forma**
Affected versions:
- Forma LMS 2.2.1 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29820
- **State**: PUBLISHED
- **Published Date**: April 28, 2022 at 09:55 UTC
- **Last Updated**: August 03, 2024 at 06:33 UTC
- **Reserved Date**: April 27, 2022 at 00:00 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains PyCharm before 2022.1 exposure of the debugger port to the internal network was possible
### CVSS Metrics
- **CVSS Base Score**: 3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-1327: Security Weakness
### Affected Products
**JetBrains - PyCharm**
Affected versions:
- 2022.1 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7933
- **State**: PUBLISHED
- **Published Date**: June 06, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 16:19 UTC
- **Reserved Date**: April 18, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
In ABB IP GATEWAY 3.39 and prior, some configuration files contain passwords stored in plain-text, which may allow an attacker to gain unauthorized access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [104388](http://www.securityfocus.com/bid/104388)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-156-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3811
- **State**: PUBLISHED
- **Published Date**: May 26, 2020 at 13:04 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
qmail-verify as used in netqmail 1.06 is prone to a mail-address verification bypass vulnerability.
### Affected Products
**Debian - netqmail**
Affected versions:
- 1.06 (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2020/05/19/8)
2. [](https://bugs.debian.org/961060)
3. [](https://www.debian.org/security/2020/dsa-4692)
4. [[debian-lts-announce] 20200604 [SECURITY] [DLA 2234-1] netqmail security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html)
5. [USN-4556-1](https://usn.ubuntu.com/4556-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2853
- **State**: PUBLISHED
- **Published Date**: May 02, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: March 06, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96839](http://www.securityfocus.com/bid/96839)
2. [](http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/)
3. [[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces](http://www.openwall.com/lists/oss-security/2016/02/24/9)
4. [[aufs] 20160219 aufs3 and aufs4 GIT release](https://sourceforge.net/p/aufs/mailman/message/34864744/)
5. [[oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up](http://www.openwall.com/lists/oss-security/2021/10/18/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13393
- **State**: PUBLISHED
- **Published Date**: May 22, 2020 at 16:06 UTC
- **Last Updated**: August 04, 2024 at 12:18 UTC
- **Reserved Date**: May 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/saveParentControlInfo deviceId and time parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://joel-malwarebenchmark.github.io)
2. [](https://joel-malwarebenchmark.github.io/blog/2020/04/28/cve-2020-13393-Tenda-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18863
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 15:56 UTC
- **Last Updated**: August 05, 2024 at 21:37 UTC
- **Reserved Date**: April 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command execution via a PHP form. This affects WN604 3.3.3 and earlier, WNAP210v2 3.5.20.0 and earlier, WNAP320 3.5.20.0 and earlier, WNDAP350 3.5.20.0 and earlier, WNDAP360 3.5.20.0 and earlier, WNDAP620 2.0.11 and earlier, WNDAP660 3.5.20.0 and earlier, WND930 2.0.11 and earlier, and WAC120 2.0.7 and earlier.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000037827/Security-Advisory-for-PHP-Vulnerabilities-on-Wireless-Access-Points-PSV-2017-0517-and-PSV-2016-0258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51520
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 09:10 UTC
- **Last Updated**: November 05, 2024 at 15:06 UTC
- **Reserved Date**: October 29, 2024 at 01:43 UTC
- **Assigned By**: huawei
### Vulnerability Description
Vulnerability of input parameters not being verified in the HDC module
Impact: Successful exploitation of this vulnerability may affect availability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 5.0.0 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2024/11/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0398, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0398 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0398
- **State**: PUBLISHED
- **Published Date**: January 12, 2025 at 14:00 UTC
- **Last Updated**: January 13, 2025 at 15:15 UTC
- **Reserved Date**: January 11, 2025 at 19:26 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**longpi1 - warehouse**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-291271 | longpi1 warehouse Backend updateInport cross site scripting](https://vuldb.com/?id.291271)
2. [VDB-291271 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.291271)
3. [Submit #473316 | longpi1 warehouse 1.0 storage XSS](https://vuldb.com/?submit.473316)
4. [](https://github.com/longpi1/warehouse/issues/4)
5. [](https://github.com/longpi1/warehouse/issues/4#issue-2765524047)
### Credits
- LVZC4 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13200, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13200 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13200
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 18:06 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: July 03, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Reflected XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-kyocera-printers/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5789
- **State**: PUBLISHED
- **Published Date**: February 05, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 05:47 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Extreme Networks ExtremeWireless WiNG 5.x before 5.8.6.9 and 5.9.x before 5.9.1.3. There is a Remote, Unauthenticated XML Entity Expansion Denial of Service on the WiNG Access Point / Controller via crafted XML entities to the Web User Interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2018-003) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20932, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20932
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 15:48 UTC
- **Last Updated**: August 05, 2024 at 12:12 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 70.0.23 exposes Apache HTTP Server logs after creation of certain domains (SEC-406).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/70+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3741
- **State**: PUBLISHED
- **Published Date**: July 11, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:03 UTC
- **Reserved Date**: March 30, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The H.264 decoder in mediaserver in Android 6.x before 2016-07-01 does not initialize certain slice data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28165661.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-07-01.html)
2. [](https://android.googlesource.com/platform/external/libavc/+/e629194c62a9a129ce378e08cb1059a8a53f1795)
3. [](https://android.googlesource.com/platform/external/libavc/+/cc676ebd95247646e67907ccab150fb77a847335) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2703
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:34 UTC
- **Last Updated**: September 30, 2024 at 15:52 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36 and prior to 6.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
2. [GLSA-202004-02](https://security.gentoo.org/glsa/202004-02)
3. [GLSA-202101-09](https://security.gentoo.org/glsa/202101-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11296
- **State**: PUBLISHED
- **Published Date**: September 18, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:01 UTC
- **Reserved Date**: May 18, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing a message from firmware in WLAN handler, a buffer overwrite can occur.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0b0c18b45d1a39f9f33172d3c22f5b8031fe564e)
2. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin)
3. [](https://source.android.com/security/bulletin/pixel/2018-09-01#qualcomm-components) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6621
- **State**: PUBLISHED
- **Published Date**: May 18, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 15:33 UTC
- **Reserved Date**: March 09, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web interface of Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to insufficient protection of sensitive data when responding to an HTTP request on the web interface. An attacker could exploit the vulnerability by sending a crafted HTTP request to the application to access specific system files. An exploit could allow the attacker to obtain sensitive information about the application which could include user credentials. This vulnerability affects Cisco Prime Collaboration Provisioning Software Releases 10.6 through 11.5. Cisco Bug IDs: CSCvc99626.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco Prime Collaboration**
Affected versions:
- Cisco Prime Collaboration (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp2)
2. [1038508](http://www.securitytracker.com/id/1038508)
3. [98522](http://www.securityfocus.com/bid/98522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28732
- **State**: PUBLISHED
- **Published Date**: August 04, 2022 at 06:15 UTC
- **Last Updated**: August 03, 2024 at 06:03 UTC
- **Reserved Date**: April 05, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
### Affected Products
**Apache Software Foundation - Apache JSPWiki**
Affected versions:
- Apache JSPWiki (Status: affected)
### References
1. [](https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732)
### Credits
- This issue was discovered by Wang Ran, from JDArmy, @jd.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9581
- **State**: PUBLISHED
- **Published Date**: January 08, 2015 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 13:47 UTC
- **Reserved Date**: January 08, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in components/filemanager/download.php in Codiad 2.4.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter. NOTE: this issue was originally incorrectly mapped to CVE-2014-1137; see CVE-2014-1137 for more information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35585](http://www.exploit-db.com/exploits/35585) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47565
- **State**: PUBLISHED
- **Published Date**: May 24, 2024 at 15:12 UTC
- **Last Updated**: May 04, 2025 at 07:13 UTC
- **Reserved Date**: May 24, 2024 at 15:11 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix kernel panic during drive powercycle test
While looping over shost's sdev list it is possible that one
of the drives is getting removed and its sas_target object is
freed but its sdev object remains intact.
Consequently, a kernel panic can occur while the driver is trying to access
the sas_address field of sas_target object without also checking the
sas_target object for NULL.
### Affected Products
**Linux - Linux**
Affected versions:
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
- f92363d12359498f9a9960511de1a550f0ec41c2 (Status: affected)
**Linux - Linux**
Affected versions:
- 3.8 (Status: affected)
- 0 (Status: unaffected)
- 4.4.294 (Status: unaffected)
- 4.9.292 (Status: unaffected)
- 4.14.257 (Status: unaffected)
- 4.19.219 (Status: unaffected)
- 5.4.163 (Status: unaffected)
- 5.10.83 (Status: unaffected)
- 5.15.6 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe)
2. [](https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937)
3. [](https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c)
4. [](https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824)
5. [](https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5)
6. [](https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b)
7. [](https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184)
8. [](https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9319
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 15:19 UTC
- **Last Updated**: August 06, 2024 at 08:43 UTC
- **Reserved Date**: August 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The gregs-high-performance-seo plugin before 1.6.2 for WordPress has XSS in the context of an old browser.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/gregs-high-performance-seo/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31042
- **State**: PUBLISHED
- **Published Date**: October 02, 2023 at 22:39 UTC
- **Last Updated**: September 23, 2024 at 13:48 UTC
- **Reserved Date**: April 23, 2023 at 18:57 UTC
- **Assigned By**: PureStorage
### Vulnerability Description
A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Pure Storage - FlashBlade Purity**
Affected versions:
- 3.3.6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.1.1 (Status: affected)
### References
1. [](https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-29743, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-29743 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29743
- **State**: PUBLISHED
- **Published Date**: April 22, 2025 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 20:41 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in /goform/delRouting.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/n0wstr/IOTVuln/blob/main/DIR-816/DelRouting/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16553
- **State**: PUBLISHED
- **Published Date**: June 20, 2019 at 13:11 UTC
- **Last Updated**: August 05, 2024 at 10:24 UTC
- **Reserved Date**: September 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Jspxcms 9.0.0, a vulnerable URL routing implementation allows remote code execution after logging in as web admin.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/jspxcms/Jspxcms/releases)
2. [](http://www.jspxcms.com/jspbb/question/770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35803
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 18:41 UTC
- **Last Updated**: March 11, 2025 at 16:10 UTC
- **Reserved Date**: July 13, 2022 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
### References
1. [Windows Common Log File System Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35803) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4084
- **State**: PUBLISHED
- **Published Date**: April 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:17 UTC
- **Reserved Date**: April 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer signedness error in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 allows remote attackers to cause a denial of service (integer overflow and application crash) via a crafted packet that triggers an unexpected array size.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035685](http://www.securitytracker.com/id/1035685)
2. [](http://www.wireshark.org/security/wnpa-sec-2016-27.html)
3. [](https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2)
4. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1371, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1371
- **State**: PUBLISHED
- **Published Date**: October 17, 2007 at 01:00 UTC
- **Last Updated**: August 08, 2024 at 02:28 UTC
- **Reserved Date**: October 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nuked-Klan 1.3b, and possibly earlier versions, allows remote attackers to obtain sensitive server information via an op parameter set to phpinfo for the (1) Team, (2) News, or (3) Liens modules.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [nukedklan-information-disclosure(11424)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11424)
2. [20030221 [SCSA-006] XSS & Function Execution Vulnerabilities in Nuked-Klan](http://archives.neohapsis.com/archives/bugtraq/2003-02/0276.html)
3. [6917](http://www.securityfocus.com/bid/6917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0642
- **State**: PUBLISHED
- **Published Date**: February 18, 2009 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 18, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35937](http://secunia.com/advisories/35937)
2. [](http://redmine.ruby-lang.org/issues/show/1091)
3. [ruby-ocspbasicverify-spoofing(48761)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48761)
4. [RHSA-2009:1140](http://www.redhat.com/support/errata/RHSA-2009-1140.html)
5. [USN-805-1](http://www.ubuntu.com/usn/USN-805-1)
6. [33769](http://www.securityfocus.com/bid/33769)
7. [1022505](http://www.securitytracker.com/id?1022505)
8. [oval:org.mitre.oval:def:11450](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11450)
9. [35699](http://secunia.com/advisories/35699)
10. [MDVSA-2009:193](http://www.mandriva.com/security/advisories?name=MDVSA-2009:193)
11. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528)
12. [33750](http://secunia.com/advisories/33750) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5722
- **State**: PUBLISHED
- **Published Date**: December 26, 2008 at 17:08 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in SAWStudio 3.9i allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long SAWSTUDIO PREFERENCES STRUCT value in a .prf (preferences) file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33011](http://www.securityfocus.com/bid/33011)
2. [4808](http://securityreason.com/securityalert/4808)
3. [51025](http://osvdb.org/51025)
4. [7578](https://www.exploit-db.com/exploits/7578) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36787
- **State**: PUBLISHED
- **Published Date**: August 21, 2023 at 19:04 UTC
- **Last Updated**: January 01, 2025 at 01:58 UTC
- **Reserved Date**: June 27, 2023 at 15:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Microsoft Edge (Chromium-based)**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30033
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:06 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Search Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
### References
1. [Windows Search Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45558, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45558 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45558
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 00:50 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000064078/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2756
- **State**: PUBLISHED
- **Published Date**: May 17, 2023 at 00:00 UTC
- **Last Updated**: January 22, 2025 at 18:08 UTC
- **Reserved Date**: May 17, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**pimcore - pimcore/customer-data-framework**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44)
2. [](https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21373, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21373 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21373
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 17:58 UTC
- **Last Updated**: March 12, 2025 at 01:42 UTC
- **Reserved Date**: December 11, 2024 at 00:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Installer Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Installer Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21373) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6674, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6674
- **State**: PUBLISHED
- **Published Date**: September 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Amazighmusic (aka nl.appsandroo.Amazighmusic) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#825993](http://www.kb.cert.org/vuls/id/825993)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40903
- **State**: PUBLISHED
- **Published Date**: November 14, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 19:07 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aiphone GT-DMB-N 3-in-1 Video Entrance Station with NFC Reader 1.0.3 does not mitigate against repeated failed access attempts, which allows an attacker to gain administrative privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN75437943/index.html)
2. [](https://www.aiphone.net/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3714
- **State**: PUBLISHED
- **Published Date**: July 03, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple OS X before 10.10.4 does not properly consider custom resource rules during app signature verification, which allows attackers to bypass intended launch restrictions via a modified app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2015-06-30-2](http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html)
2. [75493](http://www.securityfocus.com/bid/75493)
3. [1032760](http://www.securitytracker.com/id/1032760)
4. [](http://support.apple.com/kb/HT204942) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13753
- **State**: PUBLISHED
- **Published Date**: February 20, 2025 at 09:21 UTC
- **Last Updated**: February 20, 2025 at 15:31 UTC
- **Reserved Date**: January 27, 2025 at 22:13 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Ultimate Classified Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the update_profile function. This makes it possible for unauthenticated attackers to modify victim's email via a forged request, which might lead to account takeover, granted they can trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**webcodingplace - Ultimate Classified Listings**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/61365b95-da97-425d-a314-648b3d00236f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/ultimate-classified-listings/tags/1.4/classes/class-shortcodes.php#L701)
### Credits
- Rob Banks |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45133
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 09:58 UTC
- **Last Updated**: October 10, 2024 at 14:19 UTC
- **Reserved Date**: August 21, 2024 at 23:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An admin attacker could leverage this vulnerability to have a low impact on confidentiality which may aid in further attacks. Exploitation of this issue does not require user interaction.
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Adobe - Adobe Commerce**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb24-73.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30458
- **State**: PUBLISHED
- **Published Date**: April 09, 2021 at 06:06 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Wikimedia Parsoid before 0.11.1 and 0.12.x before 0.12.2. An attacker can send crafted wikitext that Utils/WTUtils.php will transform by using a <meta> tag, bypassing sanitization steps, and potentially allowing for XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T279451)
2. [](https://www.mediawiki.org/wiki/Parsoid)
3. [GLSA-202107-40](https://security.gentoo.org/glsa/202107-40) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0890
- **State**: PUBLISHED
- **Published Date**: March 26, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:28 UTC
- **Reserved Date**: March 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Dream4 Koobi CMS 4.2.3 allows remote attackers to execute arbitrary SQL commands via the area parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12896](http://www.securityfocus.com/bid/12896)
2. [1013558](http://securitytracker.com/id?1013558)
3. [14696](http://secunia.com/advisories/14696) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38403
- **State**: PUBLISHED
- **Published Date**: November 04, 2024 at 10:04 UTC
- **Last Updated**: November 04, 2024 at 14:26 UTC
- **Reserved Date**: June 16, 2024 at 00:50 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Transient DOS while parsing BTM ML IE when per STA profile is not included.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- AR8035 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- QAM8255P (Status: affected)
- QAM8650P (Status: affected)
- QAM8775P (Status: affected)
- QCA6554A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6777AQ (Status: affected)
- QCA6787AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCC2073 (Status: affected)
- QCC2076 (Status: affected)
- QCC710 (Status: affected)
- QCM8550 (Status: affected)
- QCN6224 (Status: affected)
- QCN6274 (Status: affected)
- QFW7114 (Status: affected)
- QFW7124 (Status: affected)
- SA7255P (Status: affected)
- SA7775P (Status: affected)
- SA8255P (Status: affected)
- SA8620P (Status: affected)
- SA8650P (Status: affected)
- SA8775P (Status: affected)
- SA9000P (Status: affected)
- SC8380XP (Status: affected)
- SDM429W (Status: affected)
- SM8550P (Status: affected)
- SM8635 (Status: affected)
- SM8750 (Status: affected)
- SM8750P (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 2 Mobile Platform (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Wear 4100+ Platform (Status: affected)
- Snapdragon X72 5G Modem-RF System (Status: affected)
- Snapdragon X75 5G Modem-RF System (Status: affected)
- SSG2115P (Status: affected)
- SSG2125P (Status: affected)
- SXR1230P (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9340 (Status: affected)
- WCD9370 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WCN3610 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680B (Status: affected)
- WCN3980 (Status: affected)
- WCN6755 (Status: affected)
- WCN7860 (Status: affected)
- WCN7861 (Status: affected)
- WCN7880 (Status: affected)
- WCN7881 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16484, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16484
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: November 01, 2017 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32465, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32465
- **State**: PUBLISHED
- **Published Date**: August 04, 2021 at 18:29 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 07, 2021 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
### Affected Products
**Trend Micro - Trend Micro Apex One**
Affected versions:
- 2019, SaaS (Status: affected)
**Trend Micro - Trend Micro OfficeScan**
Affected versions:
- XG SP1 (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/000287819)
2. [](https://success.trendmicro.com/jp/solution/000287796)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-21-911/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20302
- **State**: PUBLISHED
- **Published Date**: August 11, 2022 at 15:21 UTC
- **Last Updated**: August 03, 2024 at 02:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457
### Affected Products
**n/a - Android**
Affected versions:
- Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0296
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Solaris volrmmount program allows attackers to read any file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [00162](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4649
- **State**: PUBLISHED
- **Published Date**: June 28, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the photo-edit subsystem in Piwigo 2.6.x and 2.7.x before 2.7.0beta2 allows remote authenticated administrators to execute arbitrary SQL commands via the associate[] field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://piwigo.org/bugs/view.php?id=3089)
2. [](http://piwigo.org/bugs/changelog_page.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11341, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11341
- **State**: PUBLISHED
- **Published Date**: July 16, 2017 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 20:06 UTC
- **Reserved Date**: July 15, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a heap based buffer over-read in lexer.hpp of LibSass 3.4.5. A crafted input will lead to a remote denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1470714) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1729
- **State**: PUBLISHED
- **Published Date**: July 14, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 04:54 UTC
- **Reserved Date**: February 17, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 9 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032894](http://www.securitytracker.com/id/1032894)
2. [MS15-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39472
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:10 UTC
- **Last Updated**: August 02, 2024 at 18:10 UTC
- **Reserved Date**: August 02, 2023 at 21:37 UTC
- **Assigned By**: zdi
### Vulnerability Description
Inductive Automation Ignition SimpleXMLReader XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability.
The specific flaw exists within the SimpleXMLReader class. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the SYSTEM.
. Was ZDI-CAN-17571.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Inductive Automation - Ignition**
Affected versions:
- 8.1.17 LTS (Status: affected)
### References
1. [ZDI-23-1048](https://www.zerodayinitiative.com/advisories/ZDI-23-1048/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44142
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:24 UTC
- **Last Updated**: December 16, 2024 at 16:41 UTC
- **Reserved Date**: September 26, 2023 at 07:47 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Inactive Logout Inactive Logout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Inactive Logout: from n/a through 3.2.2.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Inactive Logout - Inactive Logout**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/inactive-logout/vulnerability/wordpress-inactive-logout-plugin-3-2-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Elliot (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8130
- **State**: PUBLISHED
- **Published Date**: August 24, 2024 at 16:31 UTC
- **Last Updated**: August 26, 2024 at 16:24 UTC
- **Reserved Date**: August 23, 2024 at 18:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this vulnerability is the function cgi_s3 of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_a_key leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**D-Link - DNS-120**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-202L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-315L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-320LW**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-321**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-322L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-323**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-325**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-326**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-327L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNR-326**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-340L**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-343**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-345**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-726-4**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1100-4**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1200-05**
Affected versions:
- 20240814 (Status: affected)
**D-Link - DNS-1550-04**
Affected versions:
- 20240814 (Status: affected)
### References
1. [VDB-275701 | D-Link DNS-1550-04 HTTP POST Request s3.cgi cgi_s3 command injection](https://vuldb.com/?id.275701)
2. [VDB-275701 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275701)
3. [Submit #396291 | D-Link DNS 320/320L/321/323/325/327L Command Injection](https://vuldb.com/?submit.396291)
4. [](https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3.md)
5. [](https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383)
6. [](https://www.dlink.com/)
### Credits
- Buaa1otTeam (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-40660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-40660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-40660
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 10:06 UTC
- **Last Updated**: June 10, 2025 at 14:04 UTC
- **Reserved Date**: April 16, 2025 at 08:38 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/select node/data.asp?mode=catalogue&id1=1&id2=1session=&cod=1&networks=0.
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Dmacroweb - DM Corporative CMS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb)
### Credits
- Oscar Atienza |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8441
- **State**: PUBLISHED
- **Published Date**: September 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
### Affected Products
**Microsoft - Windows 10**
Affected versions:
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8441)
2. [1041641](http://www.securitytracker.com/id/1041641)
3. [105271](http://www.securityfocus.com/bid/105271) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22394
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 15:43 UTC
- **Reserved Date**: December 27, 2022 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled. Successful exploitation of this vulnerability prevents additional SIP calls and applications from succeeding. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.1 versions 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-911: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- unspecified (Status: unaffected)
- unspecified (Status: affected)
- 19.4 (Status: affected)
- 20.1R1 (Status: affected)
- 20.2 (Status: affected)
- 20.3 (Status: affected)
- 20.4 (Status: affected)
- 21.1 (Status: affected)
- 21.2 (Status: affected)
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA70190) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24420
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 00:00 UTC
- **Last Updated**: March 20, 2025 at 20:30 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reachable assertion in the decode_linked_ti_ie function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cellularsecurity.org/ransacked) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4919
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 23:26 UTC
- **Last Updated**: February 13, 2025 at 16:38 UTC
- **Reserved Date**: February 12, 2023 at 21:29 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Base Internals in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 101.0.4951.41 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html)
2. [](https://crbug.com/1312450)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1879, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1879
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 20:39 UTC
- **Reserved Date**: April 05, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**thorsten - thorsten/phpmyfaq**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334)
2. [](https://github.com/thorsten/phpmyfaq/commit/0dc8e527c375007cd4b8dbf61f7167393a6f6e91) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4477
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 06, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1517
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 22:15 UTC
- **Last Updated**: August 06, 2024 at 22:28 UTC
- **Reserved Date**: March 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securityfocus.com/bid/53424)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/75452)
3. [](http://archives.neohapsis.com/archives/bugtraq/2012-05/0061.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2806
- **State**: PUBLISHED
- **Published Date**: April 10, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 30, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2015:193](http://www.mandriva.com/security/advisories?name=MDVSA-2015:193)
2. [GLSA-201509-04](https://security.gentoo.org/glsa/201509-04)
3. [FEDORA-2015-5199](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html)
4. [USN-2559-1](http://www.ubuntu.com/usn/USN-2559-1)
5. [FEDORA-2015-5308](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html)
6. [FEDORA-2015-5390](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html)
7. [FEDORA-2015-5245](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html)
8. [[oss-security] 20150330 Re: Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)](http://www.openwall.com/lists/oss-security/2015/03/31/2)
9. [1032080](http://www.securitytracker.com/id/1032080)
10. [73436](http://www.securityfocus.com/bid/73436)
11. [RHSA-2017:1860](https://access.redhat.com/errata/RHSA-2017:1860)
12. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
13. [FEDORA-2015-5114](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html)
14. [DSA-3220](http://www.debian.org/security/2015/dsa-3220)
15. [FEDORA-2015-5182](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html)
16. [[oss-security] 20150329 Fw: GNU Libtasn1 4.4 released ( fixes stack overflow in asn1_der_decoding)](http://www.openwall.com/lists/oss-security/2015/03/29/4)
17. [](http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41611, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41611 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41611
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 14:24 UTC
- **Last Updated**: April 29, 2025 at 20:09 UTC
- **Reserved Date**: October 07, 2022 at 00:00 UTC
- **Assigned By**: HW
### Vulnerability Description
Cross-site Scripting (XSS) vulnerability in BlueSpiceDiscovery skin of BlueSpice allows user with admin privileges to inject arbitrary HTML into the main navigation of the application.
### CVSS Metrics
- **CVSS Base Score**: 2.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Hallo Welt! GmbH - BlueSpice**
Affected versions:
- 4 (Status: affected)
### References
1. [](https://en.wiki.bluespice.com/wiki/Security:Security_Advisories/BSSA-2022-03) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3844
- **State**: PUBLISHED
- **Published Date**: July 23, 2023 at 05:31 UTC
- **Last Updated**: August 02, 2024 at 07:08 UTC
- **Reserved Date**: July 22, 2023 at 13:57 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in mooSocial mooDating 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /friends of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235195. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**mooSocial - mooDating**
Affected versions:
- 1.2 (Status: affected)
### References
1. [](https://vuldb.com/?id.235195)
2. [](https://vuldb.com/?ctiid.235195)
3. [](http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25451
- **State**: PUBLISHED
- **Published Date**: April 23, 2023 at 10:41 UTC
- **Last Updated**: January 10, 2025 at 18:44 UTC
- **Reserved Date**: February 06, 2023 at 12:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPChill CPO Content Types plugin <= 1.1.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WPChill - CPO Content Types**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/cpo-content-types/wordpress-cpo-content-types-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1782, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1782
- **State**: PUBLISHED
- **Published Date**: May 31, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:59 UTC
- **Reserved Date**: May 31, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in BookReview beta 1.0 allow remote attackers to inject arbitrary web script or HTML via the node parameter to (1) add_review.htm, (2) suggest_review.htm, (3) suggest_category.htm, (4) add_booklist.htm, or (5) add_url.htm, the isbn parameter to (6) add_review.htm, (7) add_contents.htm, (8) add_classification.htm, the (9) chapters parameter to the add_contents page in index.php (aka add_contents.htm), (10) the user parameter to contact.htm, or (11) the submit[string] parameter to search.htm. NOTE: it is not clear whether BookReview is available to the public. If not, then it should not be included in CVE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13783](http://www.securityfocus.com/bid/13783)
2. [1014058](http://securitytracker.com/id?1014058)
3. [16873](http://www.osvdb.org/16873)
4. [16876](http://www.osvdb.org/16876)
5. [16874](http://www.osvdb.org/16874)
6. [16878](http://www.osvdb.org/16878)
7. [16879](http://www.osvdb.org/16879)
8. [16871](http://www.osvdb.org/16871)
9. [16872](http://www.osvdb.org/16872)
10. [16875](http://www.osvdb.org/16875)
11. [16877](http://www.osvdb.org/16877)
12. [](http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12841, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12841 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12841
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 18:31 UTC
- **Last Updated**: December 24, 2024 at 16:59 UTC
- **Reserved Date**: December 20, 2024 at 12:35 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**n/a - Emlog Pro**
Affected versions:
- 2.4.0 (Status: affected)
- 2.4.1 (Status: affected)
### References
1. [VDB-289077 | Emlog Pro tag.php cross site scripting](https://vuldb.com/?id.289077)
2. [VDB-289077 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.289077)
3. [](https://github.com/emlog/emlog/issues/305) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37745
- **State**: PUBLISHED
- **Published Date**: July 13, 2023 at 00:00 UTC
- **Last Updated**: November 05, 2024 at 15:47 UTC
- **Reserved Date**: July 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in Maid Hiring Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Description of the /admin/aboutus.php component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phpgurukul.com/maid-hiring-management-system-using-php-and-mysql/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25022
- **State**: PUBLISHED
- **Published Date**: September 04, 2020 at 03:34 UTC
- **Last Updated**: August 04, 2024 at 15:26 UTC
- **Reserved Date**: August 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Noise-Java through 2020-08-27. AESGCMFallbackCipherState.encryptWithAd() allows out-of-bounds access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rweather/noise-java/commit/18e86b6f8bea7326934109aa9ffa705ebf4bde90)
2. [](https://github.com/rweather/noise-java/pull/12)
3. [20200904 Noise-Java AESGCMFallbackCipherState.encryptWithAd() insufficient boundary checks](http://seclists.org/fulldisclosure/2020/Sep/11)
4. [](http://packetstormsecurity.com/files/159055/Noise-Java-AESGCMFallbackCipherState.encryptWithAd-Insufficient-Boundary-Checks.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1680, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1680 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1680
- **State**: PUBLISHED
- **Published Date**: June 19, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:20 UTC
- **Reserved Date**: May 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Safari in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly clear the search history when it is cleared from the Settings application, which allows physically proximate attackers to obtain the search history.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT3639)
2. [ADV-2009-1621](http://www.vupen.com/english/advisories/2009/1621)
3. [35414](http://www.securityfocus.com/bid/35414)
4. [APPLE-SA-2009-06-17-1](http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html)
5. [35448](http://www.securityfocus.com/bid/35448)
6. [55240](http://osvdb.org/55240) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1164
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 21:36 UTC
- **Last Updated**: November 12, 2024 at 20:43 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4178
- **State**: PUBLISHED
- **Published Date**: December 10, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 06:54 UTC
- **Reserved Date**: December 03, 2009 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Heap-based buffer overflow in OvWebHelp.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long Topic parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20091209 TPTI-09-11: HP OpenView NNM OvWebHelp.exe CGI Topic Heap Overflow Vulnerability](http://www.securityfocus.com/archive/1/508354/100/0/threaded)
2. [37340](http://www.securityfocus.com/bid/37340)
3. [SSRT090133](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01950877)
4. [37261](http://www.securityfocus.com/bid/37261)
5. [SSRT090257](http://marc.info/?l=bugtraq&m=126046355120442&w=2)
6. [](http://dvlabs.tippingpoint.com/advisory/TPTI-09-11)
7. [HPSBMA02483](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01950877)
8. [hp-ovnnm-ovwebhelp-bo(54659)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54659) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28849, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28849 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28849
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 17:41 UTC
- **Last Updated**: February 10, 2025 at 16:35 UTC
- **Reserved Date**: March 24, 2023 at 16:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 10.0.0, < 10.0.7 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6](https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6)
2. [https://github.com/glpi-project/glpi/releases/tag/10.0.7](https://github.com/glpi-project/glpi/releases/tag/10.0.7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4004
- **State**: PUBLISHED
- **Published Date**: November 20, 2020 at 19:06 UTC
- **Last Updated**: August 04, 2024 at 07:52 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
### Affected Products
**n/a - VMware ESXi**
Affected versions:
- 7.0 before ESXi70U1b-17168206 (Status: affected)
- 6.7 before ESXi670-202011101-SG (Status: affected)
- 6.5 before ESXi650-202011301-SG (Status: affected)
**n/a - Workstation**
Affected versions:
- 15.x before 15.5.7 (Status: affected)
**n/a - Fusion**
Affected versions:
- 11.x before 11.5.7 (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2020-0026.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17591
- **State**: PUBLISHED
- **Published Date**: October 02, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/149592/Airties-AIR5343v2-1.0.0.18-Cross-Site-Scripting.html)
2. [45525](https://www.exploit-db.com/exploits/45525/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1018
- **State**: PUBLISHED
- **Published Date**: April 04, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:08 UTC
- **Reserved Date**: February 26, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via an MP4A movie with a malformed Channel Compositor (aka chan) atom.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019762](http://securitytracker.com/id?1019762)
2. [](http://support.apple.com/kb/HT1241)
3. [TA08-094A](http://www.us-cert.gov/cas/techalerts/TA08-094A.html)
4. [ADV-2008-1078](http://www.vupen.com/english/advisories/2008/1078)
5. [ADV-2008-2064](http://www.vupen.com/english/advisories/2008/2064/references)
6. [28583](http://www.securityfocus.com/bid/28583)
7. [31034](http://secunia.com/advisories/31034)
8. [APPLE-SA-2008-07-10](http://lists.apple.com/archives/security-announce/2008//Jul/msg00000.html)
9. [quicktime-chan-bo(41606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41606)
10. [20080403 ZDI-08-016: Apple QuickTime MP4A Atom Parsing Heap Corruption Vulnerability](http://www.securityfocus.com/archive/1/490467/100/0/threaded)
11. [29650](http://secunia.com/advisories/29650)
12. [](http://www.zerodayinitiative.com/advisories/ZDI-08-016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0126
- **State**: PUBLISHED
- **Published Date**: March 17, 2017 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0127, and CVE-2017-0128.
### Affected Products
**Microsoft Corporation - Windows Uniscribe**
Affected versions:
- Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0126)
2. [1037992](http://www.securitytracker.com/id/1037992)
3. [96673](http://www.securityfocus.com/bid/96673)
4. [41655](https://www.exploit-db.com/exploits/41655/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49239
- **State**: PUBLISHED
- **Published Date**: October 18, 2024 at 09:46 UTC
- **Last Updated**: October 18, 2024 at 13:05 UTC
- **Reserved Date**: October 14, 2024 at 10:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nikhil Vaghela Add Categories Post Footer allows Reflected XSS.This issue affects Add Categories Post Footer: from n/a through 2.2.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nikhil Vaghela - Add Categories Post Footer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/add-categories-post-footer/wordpress-add-categories-post-footer-plugin-2-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Le Ngoc Anh (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20649
- **State**: PUBLISHED
- **Published Date**: April 15, 2020 at 17:27 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: April 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NETGEAR MR1100 devices before 12.06.08.00 are affected by disclosure of sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000061493/Security-Advisory-for-Sensitive-Information-Disclosure-on-MR1100-PSV-2019-0204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2904
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 17:40 UTC
- **Last Updated**: October 15, 2024 at 18:50 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Enterprise Repository**
Affected versions:
- 11.1.1.7.0 (Status: affected)
**Oracle Corporation - Rapid Planning**
Affected versions:
- 12.1.3 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
2. [](https://www.oracle.com/security-alerts/cpujul2020.html)
3. [](https://www.oracle.com/security-alerts/cpujan2020.html)
4. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html)
5. [](https://www.zerodayinitiative.com/advisories/ZDI-19-1024/)
6. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
7. [](https://www.oracle.com/security-alerts/cpuapr2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7864
- **State**: REJECTED
- **Published Date**: March 09, 2018 at 19:00 UTC
- **Last Updated**: March 09, 2018 at 18:57 UTC
- **Reserved Date**: March 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34709
- **State**: PUBLISHED
- **Published Date**: May 13, 2024 at 19:39 UTC
- **Last Updated**: August 02, 2024 at 02:59 UTC
- **Reserved Date**: May 07, 2024 at 13:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.0, session tokens function like the other JWT tokens where they are not actually invalidated when logging out. The `directus_session` gets destroyed and the cookie gets deleted but if the cookie value is captured, it will still work for the entire expiry time which is set to 1 day by default. Making it effectively a long lived unrevokable stateless token instead of the stateful session token it was meant to be. This vulnerability is fixed in 10.11.0.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**directus - directus**
Affected versions:
- >= 10.10.0, < 10.11.0 (Status: affected)
### References
1. [https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3](https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3)
2. [https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf](https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41262
- **State**: PUBLISHED
- **Published Date**: December 16, 2021 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 03:08 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to SQL injection attacks by users with "member" privilege. Users are advised to upgrade to version 0.9.6 as soon as possible. There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**galette - galette**
Affected versions:
- < 0.9.6 (Status: affected)
### References
1. [](https://github.com/galette/galette/security/advisories/GHSA-936f-xvgq-fg74)
2. [](https://github.com/galette/galette/commit/8e940641b5ed46c3f471332827df388ea00a85d3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3159
- **State**: PUBLISHED
- **Published Date**: July 23, 2021 at 14:48 UTC
- **Last Updated**: August 03, 2024 at 16:45 UTC
- **Reserved Date**: January 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross site scripting (XSS) vulnerability in the /sys/attachment/uploaderServlet component of Landray EKP V12.0.9.R.20160325 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG, SHTML, or MHT file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/fa1c0n1/m01e-wiki/blob/main/my-vulns/landray-ekp.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3025
- **State**: PUBLISHED
- **Published Date**: July 07, 2008 at 18:20 UTC
- **Last Updated**: August 07, 2024 at 09:21 UTC
- **Reserved Date**: July 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in ad.php in plx Ad Trader 3.2 allows remote attackers to execute arbitrary SQL commands via the adid parameter in a redir action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30046](http://www.securityfocus.com/bid/30046)
2. [30897](http://secunia.com/advisories/30897)
3. [5988](https://www.exploit-db.com/exploits/5988)
4. [plxadtrader-ad-sql-injection(43525)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43525) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0939
- **State**: REJECTED
- **Published Date**: January 24, 2020 at 21:14 UTC
- **Last Updated**: January 24, 2020 at 21:14 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1807
- **State**: PUBLISHED
- **Published Date**: April 18, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:27 UTC
- **Reserved Date**: April 17, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in index.php in Musicbox 2.3.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) start parameter in a search action or (2) type parameter in a top action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [musicbox-index-sql-injection(25836)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25836)
2. [20060724 MusicBox <= 2.3.4 XSS SQL injection Vulnerability](http://www.securityfocus.com/archive/1/441000/100/0/threaded)
3. [](http://pridels0.blogspot.com/2006/04/musicbox-vuln.html)
4. [17545](http://www.securityfocus.com/bid/17545)
5. [musicbox-multiple-sql-injection(27926)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27926)
6. [ADV-2006-1373](http://www.vupen.com/english/advisories/2006/1373)
7. [19672](http://secunia.com/advisories/19672) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5859
- **State**: PUBLISHED
- **Published Date**: July 06, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 18:39 UTC
- **Reserved Date**: January 19, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Due to a race condition in the MDSS MDP driver in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05, a Use After Free condition can occur.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin)
2. [](https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=36400a7fa3753028a3bf89a9cdb28c5e25693c59)
3. [](https://source.android.com/security/bulletin/pixel/2018-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36734
- **State**: PUBLISHED
- **Published Date**: June 06, 2024 at 18:44 UTC
- **Last Updated**: February 13, 2025 at 15:59 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Improper input validation in OneFlow-Inc. Oneflow v0.9.1 allows attackers to cause a Denial of Service (DoS) via inputting a negative value into the dim parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Redmept1on/7420cd59f30defda07cf7bb4bf4a92cd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4967
- **State**: PUBLISHED
- **Published Date**: September 19, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 15:17 UTC
- **Reserved Date**: September 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Online Armor Personal Firewall 2.0.1.215 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via unspecified kernel SSDT hooks for Windows Native API functions including (1) NtAllocateVirtualMemory, (2) NtConnectPort, (3) NtCreateFile, (4) NtCreateKey, (5) NtCreatePort, (6) NtDeleteFile, (7) NtDeleteValueKey, (8) NtLoadKey, (9) NtOpenFile, (10) NtOpenProcess, (11) NtOpenThread, (12) NtResumeThread, (13) NtSetContextThread, (14) NtSetValueKey, (15) NtSuspendProcess, (16) NtSuspendThread, and (17) NtTerminateThread.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25711](http://www.securityfocus.com/bid/25711)
2. [45951](http://osvdb.org/45951)
3. [](http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php)
4. [](http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php)
5. [20070918 Plague in (security) software drivers & BSDOhook utility](http://www.securityfocus.com/archive/1/479830/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35778
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 11:11 UTC
- **Last Updated**: October 07, 2024 at 17:33 UTC
- **Reserved Date**: June 16, 2023 at 08:57 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Neha Goel Recent Posts Slider plugin <= 1.1 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Neha Goel - Recent Posts Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/recent-posts-slider/wordpress-recent-posts-slider-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- LEE SE HYOUNG (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21863
- **State**: PUBLISHED
- **Published Date**: August 05, 2021 at 20:00 UTC
- **Last Updated**: August 03, 2024 at 18:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**n/a - CODESYS**
Affected versions:
- CODESYS GmbH CODESYS Development System 3.5.16 ,CODESYS GmbH CODESYS Development System 3.5.17 (Status: affected)
### References
1. [](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16805&token=ee583c498941d9fda86490bca98ff21928eec08a&download=) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8543
- **State**: PUBLISHED
- **Published Date**: November 05, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 13:18 UTC
- **Reserved Date**: October 30, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libavcodec/mmvideo.c in FFmpeg before 2.4.2 does not consider all lines of HHV Intra blocks during validation of image height, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted MM video data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2534-1](http://www.ubuntu.com/usn/USN-2534-1)
2. [](http://www.ffmpeg.org/security.html)
3. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06)
4. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8b0e96e1f21b761ca15dbb470cd619a1ebf86c3e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10254
- **State**: PUBLISHED
- **Published Date**: April 21, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 07:32 UTC
- **Reserved Date**: April 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwide Assembler (NASM) 2.13 has a stack-based buffer over-read in the disasm function of the disasm/disasm.c file. Remote attackers could leverage this vulnerability to cause a denial of service or possibly have unspecified other impact via a crafted ELF file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/nasm/bugs/561/)
2. [openSUSE-SU-2020:0952](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html)
3. [openSUSE-SU-2020:0954](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48248
- **State**: PUBLISHED
- **Published Date**: January 10, 2024 at 10:41 UTC
- **Last Updated**: August 02, 2024 at 21:23 UTC
- **Reserved Date**: November 13, 2023 at 13:44 UTC
- **Assigned By**: bosch
### Vulnerability Description
The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**Rexroth - Nexo cordless nutrunner NXA015S-36V (0608842001)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V (0608842002)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V (0608842003)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V (0608842005)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA015S-36V-B (0608842006)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA030S-36V-B (0608842007)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA050S-36V-B (0608842008)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXP012QD-36V-B (0608842010)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V (0608842011)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA011S-36V-B (0608842012)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V (0608842013)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXA065S-36V-B (0608842014)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V (0608842015)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo cordless nutrunner NXV012T-36V-B (0608842016)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2272)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2301)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2514)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2515)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2666)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
**Rexroth - Nexo special cordless nutrunner (0608PE2673)**
Affected versions:
- NEXO-OS V1000-Release (Status: affected)
### References
1. [https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html](https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29838
- **State**: PUBLISHED
- **Published Date**: April 14, 2024 at 23:47 UTC
- **Last Updated**: August 02, 2024 at 01:17 UTC
- **Reserved Date**: March 21, 2024 at 00:52 UTC
- **Assigned By**: directcyber
### Vulnerability Description
The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-457: Security Weakness
- CWE-20: Improper Input Validation
### Affected Products
**CS Technologies Australia - Evolution Controller**
Affected versions:
- 2.x (Status: affected)
### References
1. [](https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2783
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 28, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Avaya Fabric Connect Virtual Services Platform (VSP) Operating System Software (VOSS) before 4.2.3.0 and 5.x before 5.0.1.0 does not properly handle VLAN and I-SIS indexes, which allows remote attackers to obtain unauthorized access via crafted Ethernet frames.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92157](http://www.securityfocus.com/bid/92157)
2. [](https://packetstormsecurity.com/files/138082/Avaya-VOSS-4.1.0.0-SPB-Traffic-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5675
- **State**: PUBLISHED
- **Published Date**: October 24, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 15:39 UTC
- **Reserved Date**: October 24, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the DebugPrint function in MultiXTpm Application Server before 4.0.2d allows remote attackers to execute arbitrary code via a long string argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=548209&group_id=196021)
2. [27323](http://secunia.com/advisories/27323)
3. [40386](http://osvdb.org/40386)
4. [26173](http://www.securityfocus.com/bid/26173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37826
- **State**: PUBLISHED
- **Published Date**: August 09, 2024 at 00:00 UTC
- **Last Updated**: August 12, 2024 at 20:22 UTC
- **Reserved Date**: June 10, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NULL pointer dereference in vercot Serva v4.6.0 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Evian-Zhang/4453e7ac0da7cfa421c76c5ab514dba4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5278
- **State**: PUBLISHED
- **Published Date**: November 07, 2012 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 20:58 UTC
- **Reserved Date**: October 04, 2012 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allow attackers to bypass intended access restrictions and execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2013:0134](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html)
2. [RHSA-2012:1431](http://rhn.redhat.com/errata/RHSA-2012-1431.html)
3. [51245](http://secunia.com/advisories/51245)
4. [1027730](http://www.securitytracker.com/id?1027730)
5. [openSUSE-SU-2013:0367](http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html)
6. [51186](http://secunia.com/advisories/51186)
7. [openSUSE-SU-2012:1480](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html)
8. [adobe-cve20125278-code-exec(79851)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79851)
9. [](http://www.adobe.com/support/security/bulletins/apsb12-24.html)
10. [SUSE-SU-2012:1485](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html)
11. [51213](http://secunia.com/advisories/51213)
12. [51207](http://secunia.com/advisories/51207) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0715
- **State**: PUBLISHED
- **Published Date**: February 15, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:48 UTC
- **Reserved Date**: February 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in sNews 1.3 allows remote attackers to inject arbitrary web script or HTML via the comment field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060214 XSS bugs and SQL injection in sNews](http://www.securityfocus.com/archive/1/424958/100/0/threaded)
2. [20060214 XSS and SQL injection in sNews](http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0297.html)
3. [snews-comment-xss(24674)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24674)
4. [16647](http://www.securityfocus.com/bid/16647) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0318
- **State**: PUBLISHED
- **Published Date**: March 27, 2013 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 16:58 UTC
- **Reserved Date**: December 06, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The admin page in the Banckle Chat module for Drupal does not properly restrict access, which allows remote attackers to bypass intended restrictions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130220 Re: CVE request for Drupal Core and contributed modules](http://www.openwall.com/lists/oss-security/2013/02/21/5)
2. [](http://drupal.org/node/1916370) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.