System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3574
- **State**: PUBLISHED
- **Published Date**: September 19, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 04:50 UTC
- **Reserved Date**: December 19, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, userspace can request ION cache maintenance on a secure ION buffer for which the ION_FLAG_SECURE ion flag is not set and cause the kernel to attempt to perform cache maintenance on memory which does not belong to HLOS.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin)
2. [](https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000049462)
3. [](https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=09874396dfbf546e5a628d810fcf5ea51a4d5785)
4. [](https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=53261410da625aaa2e070555aaa150a8533e5be4)
5. [](https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=3286b75d91519073d2f20bee85f22e294d5f1a18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4482
- **State**: PUBLISHED
- **Published Date**: December 30, 2009 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: December 30, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in MediaServer.exe in TVersity 1.6 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by the vd_tversity module in VulnDisco Pack Professional 8.11. NOTE: as of 20091229, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57761](http://osvdb.org/57761)
2. [36588](http://secunia.com/advisories/36588)
3. [](http://www.intevydis.com/blog/?p=57)
4. [](http://intevydis.com/vd-list.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-20220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-20220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-20220
- **State**: PUBLISHED
- **Published Date**: May 18, 2021 at 19:09 UTC
- **Last Updated**: August 04, 2024 at 14:15 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mikrotik.com/)
2. [20210511 Four vulnerabilities found in MikroTik's RouterOS](http://seclists.org/fulldisclosure/2021/May/23)
3. [](http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11984
- **State**: PUBLISHED
- **Published Date**: August 07, 2020 at 15:27 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 21, 2020 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
### Affected Products
**n/a - Apache HTTP Server**
Affected versions:
- 2.4.32 to 2.4.44 (Status: affected)
### References
1. [](https://httpd.apache.org/security/vulnerabilities_24.html)
2. [[oss-security] 20200808 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/08/1)
3. [GLSA-202008-04](https://security.gentoo.org/glsa/202008-04)
4. [[oss-security] 20200808 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/08/10)
5. [[oss-security] 20200808 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/08/8)
6. [[oss-security] 20200808 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/08/9)
7. [[oss-security] 20200810 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/10/5)
8. [[httpd-dev] 20200811 Which version fixed the CVE-2020-9490, CVE-2020-11984 and CVE-2020-11993 vulnerabilities?](https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d601cfb4579f38bf1%40%3Cdev.httpd.apache.org%3E)
9. [[httpd-dev] 20200811 Re: Which version fixed the CVE-2020-9490, CVE-2020-11984 and CVE-2020-11993 vulnerabilities?](https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b26936dfea4060f672%40%3Cdev.httpd.apache.org%3E)
10. [[oss-security] 20200817 Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow](http://www.openwall.com/lists/oss-security/2020/08/17/2)
11. [USN-4458-1](https://usn.ubuntu.com/4458-1/)
12. [openSUSE-SU-2020:1285](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html)
13. [openSUSE-SU-2020:1293](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html)
14. [FEDORA-2020-189a1e6c3e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/)
15. [DSA-4757](https://www.debian.org/security/2020/dsa-4757)
16. [[debian-lts-announce] 20200902 [SECURITY] [DLA 2362-1] uwsgi security update](https://lists.debian.org/debian-lts-announce/2020/09/msg00001.html)
17. [FEDORA-2020-0d3d3f5072](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/)
18. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
19. [](https://security.netapp.com/advisory/ntap-20200814-0005/)
20. [](http://packetstormsecurity.com/files/159009/Apache2-mod_proxy_uwsgi-Incorrect-Request-Handling.html)
21. [](https://www.oracle.com/security-alerts/cpujan2021.html)
22. [[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E)
23. [[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/](https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E)
24. [[httpd-cvs] 20210330 svn commit: r1888194 [13/13] - /httpd/site/trunk/content/security/json/](https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E)
25. [[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E)
26. [[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/](https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E)
27. [[httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml](https://lists.apache.org/thread.html/r34753590ae8e3f2b6af689af4fe84269b592f5fda9f3244fd9abbce8%40%3Ccvs.httpd.apache.org%3E)
28. [[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E)
29. [[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/](https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E)
30. [[httpd-cvs] 20210330 svn commit: r1073171 - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-11984.json security/json/CVE-2020-11993.json security/vulnerabilities_24.html](https://lists.apache.org/thread.html/rf71eb428714374a6f9ad68952e23611ec7807b029fd6a1b4f5f732d9%40%3Ccvs.httpd.apache.org%3E)
31. [[httpd-cvs] 20210330 svn commit: r1888228 - in /httpd/site/trunk/content/security/json: CVE-2020-11984.json CVE-2020-11993.json](https://lists.apache.org/thread.html/r2c6083f6a2027914a0f5b54e2a1f4fa98c03f8693b58460911818255%40%3Ccvs.httpd.apache.org%3E)
32. [[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html](https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32547
- **State**: PUBLISHED
- **Published Date**: August 11, 2023 at 02:37 UTC
- **Last Updated**: October 10, 2024 at 15:06 UTC
- **Reserved Date**: June 02, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Incorrect default permissions in the MAVinci Desktop Software for Intel(R) Falcon 8+ before version 6.2 may allow authenticated user to potentially enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**n/a - MAVinci Desktop Software for Intel(R) Falcon 8+**
Affected versions:
- before version 6.2 (Status: affected)
### References
1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00934.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00934.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41798
- **State**: PUBLISHED
- **Published Date**: October 11, 2021 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: September 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T285515)
2. [FEDORA-2021-eee8b7514f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/)
3. [FEDORA-2021-56d8173b5e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/)
4. [FEDORA-2021-3dd1b66cbf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/)
5. [GLSA-202305-24](https://security.gentoo.org/glsa/202305-24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12793
- **State**: PUBLISHED
- **Published Date**: July 20, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
### Affected Products
**n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions**
Affected versions:
- Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html)
2. [1041250](http://www.securitytracker.com/id/1041250)
3. [104701](http://www.securityfocus.com/bid/104701) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1206
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 19:43 UTC
- **Last Updated**: August 04, 2024 at 06:31 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vulnerability'.
### Affected Products
**Microsoft - Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows 10 Version 2004 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Windows Server, version 2004 (Server Core installation)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1206)
2. [](http://packetstormsecurity.com/files/158053/SMBleed-Uninitialized-Kernel-Memory-Read-Proof-Of-Concept.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39550, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39550
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 15:26 UTC
- **Last Updated**: August 04, 2024 at 02:06 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.cpp has a heap-based buffer overflow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sahaRatul/sela/issues/30) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0649, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0649
- **State**: PUBLISHED
- **Published Date**: August 14, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:58 UTC
- **Reserved Date**: August 04, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in xpcd-svga for xpcd 2.08 and earlier allows local users to execute arbitrary code via a long HOME environment variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-368](http://www.debian.org/security/2003/dsa-368)
2. [MDKSA-2004:053](http://www.mandriva.com/security/advisories?name=MDKSA-2004:053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4366
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 01:51 UTC
- **Last Updated**: December 20, 2024 at 23:51 UTC
- **Reserved Date**: June 06, 2023 at 13:04 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The PWA for WP & AMP plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the pwaforwp_update_features_options function in versions up to, and including, 1.7.32. This makes it possible for authenticated attackers to change the otherwise restricted settings within the plugin.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**magazine3 - PWA for WP & AMP**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a9892dd1-3939-41a9-a828-fa1bf7d96eb8?source=cve)
2. [](https://blog.nintechnet.com/wordpress-pwa-for-wp-and-amp-plugin-fixed-vulnerabilities/)
3. [](https://wpscan.com/vulnerability/b38a51d7-375e-4cca-88ba-ccab796ac134)
### Credits
- Jerome Bruandet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0244
- **State**: PUBLISHED
- **Published Date**: February 29, 2016 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 22:15 UTC
- **Reserved Date**: December 08, 2015 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF20, and 8.5.x before 8.5.0.0 CF09 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2016-0243.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21975358)
2. [PI55327](http://www-01.ibm.com/support/docview.wss?uid=swg1PI55327) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33536
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 00:00 UTC
- **Last Updated**: March 25, 2025 at 16:10 UTC
- **Reserved Date**: April 24, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.8#Security_Fixes)
2. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P40#Security_Fixes) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6227
- **State**: PUBLISHED
- **Published Date**: February 20, 2009 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 11:20 UTC
- **Reserved Date**: February 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in buyer_detail.php in Pre Multi-Vendor Shopping Malls allows remote attackers to execute arbitrary SQL commands via the (1) sid and (2) cid parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-3018](http://www.vupen.com/english/advisories/2008/3018)
2. [pmvsm-buyerdetail-sql-injection(46387)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46387)
3. [32127](http://www.securityfocus.com/bid/32127)
4. [6999](https://www.exploit-db.com/exploits/6999) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7319
- **State**: REJECTED
- **Published Date**: April 10, 2017 at 10:56 UTC
- **Last Updated**: April 11, 2017 at 11:57 UTC
- **Reserved Date**: March 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3347
- **State**: PUBLISHED
- **Published Date**: September 24, 2009 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 04:29 UTC
- **Reserved Date**: September 24, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow on the D-Link DIR-400 wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36237](http://www.securityfocus.com/bid/36237)
2. [57791](http://www.osvdb.org/57791)
3. [1022826](http://www.securitytracker.com/id?1022826)
4. [36454](http://secunia.com/advisories/36454)
5. [](http://intevydis.com/vd-list.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2279
- **State**: PUBLISHED
- **Published Date**: March 02, 2016 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 09, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley CompactLogix 1769-L* before 28.011+ allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035190](http://www.securitytracker.com/id/1035190)
2. [44626](https://www.exploit-db.com/exploits/44626/)
3. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-061-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7581
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "Safari" component, which allows remote web servers to cause a denial of service via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207271)
2. [94432](http://www.securityfocus.com/bid/94432) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18249
- **State**: PUBLISHED
- **Published Date**: March 26, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 21:13 UTC
- **Reserved Date**: March 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1041432](http://www.securitytracker.com/id/1041432)
2. [](https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3)
3. [[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html)
4. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3)
5. [USN-3932-1](https://usn.ubuntu.com/3932-1/)
6. [USN-3932-2](https://usn.ubuntu.com/3932-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4890, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4890
- **State**: PUBLISHED
- **Published Date**: September 10, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 20:50 UTC
- **Reserved Date**: September 10, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in FlatnuX CMS 2011 08.09.2 and earlier allow remote attackers to inject arbitrary web script or HTML via a (1) comment to the news, (2) title to the news, or (3) the folder names in a gallery.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html)
2. [flatnux-index-xss(74566)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74566)
3. [80877](http://www.osvdb.org/80877)
4. [48656](http://secunia.com/advisories/48656)
5. [48676](http://secunia.com/advisories/48676)
6. [52846](http://www.securityfocus.com/bid/52846)
7. [](http://www.vulnerability-lab.com/get_content.php?id=487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8621
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 08:20 UTC
- **Reserved Date**: December 23, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
t-coffee before 11.00.8cbe486-2 allows local users to write to ~/.t_coffee globally.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751579)
2. [](https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8621.html)
3. [[oss-security] 20151223 Re: CVE-request: ~/.t_coffee/ is world-writable](http://www.openwall.com/lists/oss-security/2015/12/23/4)
4. [](http://cve.killedkenny.io/cve/CVE-2015-8621)
5. [](https://security-tracker.debian.org/tracker/CVE-2015-8621/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5628, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5628
- **State**: PUBLISHED
- **Published Date**: May 04, 2018 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
gofer before 0.68 uses world-writable permissions for /var/lib/gofer/journal/watchdog, which allows local users to cause a denial of service by removing journal entries.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=884854) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5225
- **State**: PUBLISHED
- **Published Date**: October 05, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: October 04, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer signedness error in FIFO filesystems (named pipes) on Sun Solaris 8 through 10 allows local users to read the contents of unspecified memory locations via a negative maximum length value to the I_PEEK ioctl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071004 Re: iDefense Security Advisory 10.02.07: Sun Microsystems Solaris FIFO FS Information Disclosure Vulnerability](http://www.securityfocus.com/archive/1/481501/100/0/threaded)
2. [27654](http://secunia.com/advisories/27654)
3. [5227](https://www.exploit-db.com/exploits/5227)
4. [27024](http://secunia.com/advisories/27024)
5. [](http://support.avaya.com/elmodocs2/security/ASA-2007-463.htm)
6. [25905](http://www.securityfocus.com/bid/25905)
7. [ADV-2007-3339](http://www.vupen.com/english/advisories/2007/3339)
8. [solaris-namedpipes-information-disclosure(36918)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36918)
9. [4516](https://www.exploit-db.com/exploits/4516)
10. [oval:org.mitre.oval:def:2170](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2170)
11. [103061](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103061-1)
12. [1018766](http://www.securitytracker.com/id?1018766)
13. [20071002 Sun Microsystems Solaris FIFO FS Information Disclosure Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=603) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0748
- **State**: PUBLISHED
- **Published Date**: January 13, 2013 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 14:33 UTC
- **Reserved Date**: January 02, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2013:0048](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html)
2. [openSUSE-SU-2013:0131](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html)
3. [](http://www.mozilla.org/security/announce/2013/mfsa2013-11.html)
4. [RHSA-2013:0145](http://rhn.redhat.com/errata/RHSA-2013-0145.html)
5. [USN-1681-4](http://www.ubuntu.com/usn/USN-1681-4)
6. [RHSA-2013:0144](http://rhn.redhat.com/errata/RHSA-2013-0144.html)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=806031)
8. [SUSE-SU-2013:0049](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html)
9. [USN-1681-1](http://www.ubuntu.com/usn/USN-1681-1)
10. [openSUSE-SU-2013:0149](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html)
11. [USN-1681-2](http://www.ubuntu.com/usn/USN-1681-2)
12. [oval:org.mitre.oval:def:17109](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17109) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0345
- **State**: PUBLISHED
- **Published Date**: January 21, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 21, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in SaralBlog 1.0 allow remote attackers to execute arbitrary SQL commands via the search parameter to search.php. NOTE: the id/viewprofile.php issue is already covered by CVE-2005-4058.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16306](http://www.securityfocus.com/bid/16306)
2. [22740](http://www.osvdb.org/22740)
3. [1015517](http://securitytracker.com/id?1015517)
4. [saralblog-search-sql-injection(24218)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24218)
5. [20060118 [eVuln] SaralBlog XSS & Multiple SQL Injection Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2006-01/0372.html)
6. [](http://evuln.com/vulns/40/summary.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4583
- **State**: PUBLISHED
- **Published Date**: February 20, 2020 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 22:03 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Maximo Asset Management 7.6.0.10 and 7.6.1.1 could allow an authenticated user to obtain sensitive information from a stack trace that could be used to aid future attacks. IBM X-Force ID: 167289.
### Affected Products
**IBM - Maximo Asset Management**
Affected versions:
- 7.6.1.1 (Status: affected)
- 7.6.0.10 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/3002121)
2. [ibm-maximo-cve20194583-info-disc (167289)](https://exchange.xforce.ibmcloud.com/vulnerabilities/167289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20321
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 17:50 UTC
- **Last Updated**: August 03, 2024 at 17:37 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.
### Weakness Classification (CWE)
- CWE-362: Security Weakness
### Affected Products
**n/a - kernel**
Affected versions:
- kernel 5.15-rc5 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2013242)
2. [](https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/)
3. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html)
4. [DSA-5096](https://www.debian.org/security/2022/dsa-5096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1192
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 20:00 UTC
- **Last Updated**: August 14, 2024 at 20:07 UTC
- **Reserved Date**: February 02, 2024 at 07:06 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in South River WebDrive 18.00.5057. It has been declared as problematic. This vulnerability affects unknown code of the component New Secure WebDAV. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-252682 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**South River - WebDrive**
Affected versions:
- 18.00.5057 (Status: affected)
### References
1. [](https://vuldb.com/?id.252682)
2. [](https://vuldb.com/?ctiid.252682)
3. [](https://fitoxs.com/vuldb/22-exploit-perl.txt)
### Credits
- fernando.mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57677
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 19:31 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2Wan.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35383
- **State**: REJECTED
- **Published Date**: July 11, 2022 at 19:40 UTC
- **Last Updated**: July 11, 2022 at 19:40 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3737
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 16:32 UTC
- **Last Updated**: April 17, 2025 at 19:40 UTC
- **Reserved Date**: April 16, 2025 at 14:00 UTC
- **Assigned By**: drupal
### Vulnerability Description
Vulnerability in Drupal Google Maps: Store Locator.This issue affects Google Maps: Store Locator: *.*.
### Affected Products
**Drupal - Google Maps: Store Locator**
Affected versions:
- *.* (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2025-038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6657
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 13:52 UTC
- **Last Updated**: November 04, 2024 at 14:16 UTC
- **Reserved Date**: July 10, 2024 at 14:18 UTC
- **Assigned By**: Silabs
### Vulnerability Description
A denial of service may be caused to a single peripheral device in a BLE network when multiple central
devices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-821: Security Weakness
### Affected Products
**silabs.com - EFR32 BLE SDK**
Affected versions:
- 7.1.0 (Status: affected)
- 8.0.0 (Status: affected)
### References
1. [](https://community.silabs.com/068Vm00000FfVNN) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2378
- **State**: PUBLISHED
- **Published Date**: June 13, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 17:51 UTC
- **Reserved Date**: May 15, 2006 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Buffer overflow in the ART Image Rendering component (jgdw400.dll) in Microsoft Windows XP SP1 and Sp2, Server 2003 SP1 and earlier, and Windows 98 and Me allows remote attackers to execute arbitrary code via a crafted ART image that causes heap corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [win-art-image-bo(26809)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26809)
2. [oval:org.mitre.oval:def:1640](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1640)
3. [26432](http://www.osvdb.org/26432)
4. [oval:org.mitre.oval:def:1756](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1756)
5. [oval:org.mitre.oval:def:1668](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1668)
6. [TA06-164A](http://www.us-cert.gov/cas/techalerts/TA06-164A.html)
7. [20605](http://secunia.com/advisories/20605)
8. [MS06-022](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-022)
9. [VU#923236](http://www.kb.cert.org/vuls/id/923236)
10. [18394](http://www.securityfocus.com/bid/18394)
11. [20060613 Microsoft Internet Explorer ART File Heap Corruption Vulnerability](http://www.idefense.com/intelligence/vulnerabilities/display.php?id=407)
12. [ADV-2006-2320](http://www.vupen.com/english/advisories/2006/2320)
13. [oval:org.mitre.oval:def:1866](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1866)
14. [1016292](http://securitytracker.com/id?1016292)
15. [oval:org.mitre.oval:def:1590](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1590) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25472
- **State**: PUBLISHED
- **Published Date**: November 24, 2020 at 14:28 UTC
- **Last Updated**: August 04, 2024 at 15:33 UTC
- **Reserved Date**: September 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SimplePHPscripts News Script PHP Pro 2.3 is affected by a Cross Site Request Forgery (CSRF) vulnerability, which allows attackers to add new users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://websec.nl)
2. [](https://news.websec.nl)
3. [](https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37315
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:58 UTC
- **Last Updated**: September 18, 2024 at 18:29 UTC
- **Reserved Date**: June 30, 2023 at 17:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-2622 DDP Set IPv6 Address Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20093.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**D-Link - DAP-2622**
Affected versions:
- 1.00 dated 16-12-2020 (Status: affected)
### References
1. [ZDI-23-1269](https://www.zerodayinitiative.com/advisories/ZDI-23-1269/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56965, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56965 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56965
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 19:41 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Shanghai Shizhi Information Technology Co., Ltd Shihuo iOS 8.16.0 allows attackers to access sensitive user information via supplying a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/241230-Shihuo/241230-Shihuo.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7945
- **State**: PUBLISHED
- **Published Date**: August 20, 2024 at 01:00 UTC
- **Last Updated**: August 20, 2024 at 13:16 UTC
- **Reserved Date**: August 19, 2024 at 15:10 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in itsourcecode Laravel Property Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/notes/create of the component Notes Page. The manipulation of the argument Note text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**itsourcecode - Laravel Property Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-275137 | itsourcecode Laravel Property Management System Notes Page create cross site scripting](https://vuldb.com/?id.275137)
2. [VDB-275137 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275137)
3. [Submit #393373 | itsourcecode Laravel Property Management System 1.0 XSS](https://vuldb.com/?submit.393373)
4. [](https://github.com/DeepMountains/zzz/blob/main/CVE2-3.md)
### Credits
- wanglun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3867
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20219
- **State**: PUBLISHED
- **Published Date**: January 02, 2020 at 14:10 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/miniupnp/ngiflib/issues/15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34359
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 17:07 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 02, 2024 at 06:36 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructor built in the `Llama` takes several parameters to configure the loading and running of the model. Other than `NUMA, LoRa settings`, `loading tokenizers,` and `hardware settings`, `__init__` also loads the `chat template` from targeted `.gguf` 's Metadata and furtherly parses it to `llama_chat_format.Jinja2ChatFormatter.to_chat_handler()` to construct the `self.chat_handler` for this model. Nevertheless, `Jinja2ChatFormatter` parse the `chat template` within the Metadate with sandbox-less `jinja2.Environment`, which is furthermore rendered in `__call__` to construct the `prompt` of interaction. This allows `jinja2` Server Side Template Injection which leads to remote code execution by a carefully constructed payload.
### CVSS Metrics
- **CVSS Base Score**: 9.7/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-76: Security Weakness
### Affected Products
**abetlen - llama-cpp-python**
Affected versions:
- >= 0.2.30, <= 0.2.71 (Status: affected)
### References
1. [https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829](https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829)
2. [https://github.com/abetlen/llama-cpp-python/commit/b454f40a9a1787b2b5659cd2cb00819d983185df](https://github.com/abetlen/llama-cpp-python/commit/b454f40a9a1787b2b5659cd2cb00819d983185df) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2825
- **State**: REJECTED
- **Published Date**: March 26, 2025 at 15:58 UTC
- **Last Updated**: April 04, 2025 at 19:48 UTC
- **Reserved Date**: March 26, 2025 at 15:49 UTC
- **Assigned By**: VulnCheck
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5416
- **State**: PUBLISHED
- **Published Date**: June 08, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 01:01 UTC
- **Reserved Date**: June 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the default Access Control Instructions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99097](http://www.securityfocus.com/bid/99097)
2. [RHSA-2016:2594](http://rhn.redhat.com/errata/RHSA-2016-2594.html)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1349540)
4. [RHSA-2016:2765](http://rhn.redhat.com/errata/RHSA-2016-2765.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1534, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1534
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 19:35 UTC
- **Last Updated**: November 07, 2024 at 21:51 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Email Security Appliance (ESA)**
Affected versions:
- n/a (Status: affected)
### References
1. [20211006 Cisco Email Security Appliance URL Filtering Bypass Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4528
- **State**: PUBLISHED
- **Published Date**: December 31, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: December 31, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Organic Groups (OG) Vocabulary module 6.x before 6.x-1.0 for Drupal allows remote authenticated group members to bypass intended access restrictions, and create, modify, or read a vocabulary, via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-2920](http://www.vupen.com/english/advisories/2009/2920)
2. [](http://drupal.org/node/604354)
3. [36685](http://www.securityfocus.com/bid/36685)
4. [58947](http://osvdb.org/58947)
5. [](http://drupal.org/node/604514)
6. [ogvocab-membership-security-bypass(53780)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53780)
7. [37060](http://secunia.com/advisories/37060) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0576
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Qualcomm crypto engine driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33544431. References: QC-CR#1103089.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://github.com/derrekr/android_security/commit/0dd1a733e60cf5239c0a185d4219ba2ef1118a8b)
2. [](https://source.android.com/security/bulletin/2017-04-01)
3. [97395](http://www.securityfocus.com/bid/97395)
4. [1038201](http://www.securitytracker.com/id/1038201) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49669
- **State**: PUBLISHED
- **Published Date**: October 23, 2024 at 15:35 UTC
- **Last Updated**: October 23, 2024 at 17:21 UTC
- **Reserved Date**: October 17, 2024 at 09:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Alexander De Ridder INK Official allows Upload a Web Shell to a Web Server.This issue affects INK Official: from n/a through 4.1.2.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Alexander De Ridder - INK Official**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ink-official/wordpress-ink-official-plugin-4-1-2-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- ghsinfosec (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1448
- **State**: PUBLISHED
- **Published Date**: August 13, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 21, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1020679](http://www.securitytracker.com/id?1020679)
2. [30585](http://www.securityfocus.com/bid/30585)
3. [TA08-225A](http://www.us-cert.gov/cas/techalerts/TA08-225A.html)
4. [](http://www.coresecurity.com/content/internet-explorer-zone-elevation)
5. [MS08-048](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-048)
6. [1020680](http://www.securitytracker.com/id?1020680)
7. [HPSBST02360](http://marc.info/?l=bugtraq&m=121915960406986&w=2)
8. [SSRT080117](http://marc.info/?l=bugtraq&m=121915960406986&w=2)
9. [20080813 CORE-2008-0103: Internet Explorer Zone Elevation Restrictions Bypass and Security Zone Restrictions Bypass](http://www.securityfocus.com/archive/1/495458/100/0/threaded)
10. [31415](http://secunia.com/advisories/31415)
11. [ADV-2008-2352](http://www.vupen.com/english/advisories/2008/2352)
12. [oval:org.mitre.oval:def:5886](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5886) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36364
- **State**: PUBLISHED
- **Published Date**: May 29, 2024 at 13:28 UTC
- **Last Updated**: August 02, 2024 at 03:37 UTC
- **Reserved Date**: May 24, 2024 at 10:46 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 improper access control in Pull Requests and Commit status publisher build features was possible
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**JetBrains - TeamCity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13980
- **State**: PUBLISHED
- **Published Date**: July 19, 2019 at 14:18 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Directus 7 API through 2.3.0, uploading of PHP files is blocked only when the Apache HTTP Server is used, leading to uploads/_/originals remote code execution with nginx.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/directus/api/issues/979) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3509
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 23:56 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: April 20, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - ceph-dashboard**
Affected versions:
- as shipped in Red Hat Ceph Storage 4 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1950116)
2. [](https://github.com/ceph/ceph/blob/f1557e8f62d31883d3d34ae241a1a26af11d923f/src/pybind/mgr/dashboard/controllers/docs.py#L394-L409)
3. [](https://github.com/ceph/ceph/commit/adda853e64bdba1288d46bc7d462d23d8f2f10ca)
4. [](https://github.com/ceph/ceph/commit/7a1ca8d372da3b6a4fc3d221a0e5f72d1d61c27b)
5. [](https://github.com/ceph/ceph/commit/af3fffab3b0f13057134d96e5d481e400d8bfd27) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2146
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 21:17 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cgitest.exe in Savant Web Server 3.1 and earlier allows remote attackers to cause a denial of service (crash) via a long HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020913 Savant 3.1 multiple vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2002-09/0151.html)
2. [5706](http://www.securityfocus.com/bid/5706)
3. [savant-cgitest-bo(10102)](http://www.iss.net/security_center/static/10102.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3475
- **State**: PUBLISHED
- **Published Date**: October 15, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: August 04, 2008 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html)
2. [oval:org.mitre.oval:def:13151](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13151)
3. [ie-uninitialized-objects-code-execution(45563)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45563)
4. [20081015 Internet Explorer 6 componentFromPoint() remote memory disclosure and remote code execution](http://www.securityfocus.com/archive/1/497380/100/0/threaded)
5. [SSRT080143](http://marc.info/?l=bugtraq&m=122479227205998&w=2)
6. [MS08-058](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058)
7. [ADV-2008-2809](http://www.vupen.com/english/advisories/2008/2809)
8. [1021047](http://www.securitytracker.com/id?1021047)
9. [HPSBST02379](http://marc.info/?l=bugtraq&m=122479227205998&w=2)
10. [](http://www.zerodayinitiative.com/advisories/ZDI-08-069/)
11. [TA08-288A](http://www.us-cert.gov/cas/techalerts/TA08-288A.html)
12. [win-ms08kb956390-update(45565)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45565)
13. [31617](http://www.securityfocus.com/bid/31617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6469, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6469
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 03:46 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html)
2. [](https://crbug.com/1067382)
3. [GLSA-202006-02](https://security.gentoo.org/glsa/202006-02)
4. [openSUSE-SU-2020:0823](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html)
5. [openSUSE-SU-2020:0832](http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html)
6. [FEDORA-2020-08561721ad](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/)
7. [DSA-4714](https://www.debian.org/security/2020/dsa-4714)
8. [FEDORA-2020-77f89ab772](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13813
- **State**: PUBLISHED
- **Published Date**: June 04, 2020 at 15:33 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: June 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Foxit Studio Photo before 3.6.6.922. It allows local users to gain privileges via a crafted DLL in the current working directory when FoxitStudioPhoto366_3.6.6.916.exe is used.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48618
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: October 07, 2024 at 13:50 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10604
- **State**: PUBLISHED
- **Published Date**: July 24, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 22:40 UTC
- **Reserved Date**: May 01, 2018 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
SEL Compass version 3.0.5.1 and prior allows all users full access to the SEL Compass directory, which may allow modification or overwriting of files within the Compass installation folder, resulting in escalation of privilege and/or malicious code execution.
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**Schweitzer Engineering Laboratories, Inc. - Compass**
Affected versions:
- 3.0.5.1 and prior (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3391
- **State**: PUBLISHED
- **Published Date**: July 02, 2020 at 04:20 UTC
- **Last Updated**: November 15, 2024 at 16:57 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to insecure storage of certain unencrypted credentials on an affected device. An attacker could exploit this vulnerability by viewing the network device configuration and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Cisco - Cisco Digital Network Architecture Center (DNA Center)**
Affected versions:
- n/a (Status: affected)
### References
1. [20200701 Cisco Digital Network Architecture Center Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-info-disc-6xsCyDYy) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35328
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 17:02 UTC
- **Last Updated**: January 01, 2025 at 01:52 UTC
- **Reserved Date**: June 14, 2023 at 23:09 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Transaction Manager Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-197: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Transaction Manager Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8113
- **State**: REJECTED
- **Published Date**: July 07, 2022 at 16:04 UTC
- **Last Updated**: July 07, 2022 at 16:04 UTC
- **Reserved Date**: October 10, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54958
- **State**: PUBLISHED
- **Published Date**: February 20, 2025 at 00:00 UTC
- **Last Updated**: February 21, 2025 at 21:29 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios XI 2024R1.2.2 is susceptible to a stored Cross-Site Scripting (XSS) vulnerability in the Tools page. This flaw allows an attacker to inject malicious scripts into the Tools interface, which are then stored and executed in the context of other users accessing the page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54958) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4299
- **State**: PUBLISHED
- **Published Date**: January 16, 2023 at 15:38 UTC
- **Last Updated**: April 04, 2025 at 20:25 UTC
- **Reserved Date**: December 06, 2022 at 09:36 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Metricool WordPress plugin before 1.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Metricool**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303)
### Credits
- qerogram(at Kakao Style Corp.)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43264
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 20:12 UTC
- **Last Updated**: August 28, 2024 at 14:27 UTC
- **Reserved Date**: August 09, 2024 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mediavine Create by Mediavine.This issue affects Create by Mediavine: from n/a through 1.9.8.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Mediavine - Create by Mediavine**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/mediavine-create/wordpress-create-by-mediavine-plugin-1-9-7-sensitive-data-exposure-vulnerability?_s_id=cve)
### Credits
- Peng Zhou (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22814
- **State**: PUBLISHED
- **Published Date**: June 30, 2023 at 23:05 UTC
- **Last Updated**: November 26, 2024 at 16:09 UTC
- **Reserved Date**: January 06, 2023 at 20:23 UTC
- **Assigned By**: WDC PSIRT
### Vulnerability Description
An authentication bypass issue via spoofing was discovered in the token-based authentication mechanism that could allow an attacker to carry out an impersonation attack.
This issue affects My Cloud OS 5 devices: before 5.26.202.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**Western Digital - My Cloud OS 5**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.westerndigital.com/support/product-security/wdc-23006-my-cloud-firmware-version-5-26-202) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3832
- **State**: PUBLISHED
- **Published Date**: November 26, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:26 UTC
- **Reserved Date**: October 07, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Heap-based buffer overflow in the GSM mobility management implementation in Telephony in Apple iOS before 4.2 on the iPhone and iPad allows remote attackers to execute arbitrary code on the baseband processor via a crafted Temporary Mobile Subscriber Identity (TMSI) field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [appleios-tmsi-bo(63421)](https://exchange.xforce.ibmcloud.com/vulnerabilities/63421)
2. [ADV-2010-3046](http://www.vupen.com/english/advisories/2010/3046)
3. [1024770](http://www.securitytracker.com/id?1024770)
4. [42314](http://secunia.com/advisories/42314)
5. [](http://support.apple.com/kb/HT4456)
6. [APPLE-SA-2010-11-22-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0523
- **State**: PUBLISHED
- **Published Date**: May 14, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 20, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0522, CVE-2014-0524, and CVE-2014-0526.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141210 Adobe Reader U3D Processinng Memory Corruption Vulnerability](https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1074)
2. [](http://helpx.adobe.com/security/products/reader/apsb14-15.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29803
- **State**: PUBLISHED
- **Published Date**: July 12, 2021 at 16:05 UTC
- **Last Updated**: September 17, 2024 at 04:04 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204164.
### Affected Products
**IBM - Tivoli Netcool/OMNIbus**
Affected versions:
- 8.1.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6471067)
2. [ibm-tivoli-cve202129803-xss (204164)](https://exchange.xforce.ibmcloud.com/vulnerabilities/204164) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4401, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4401 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4401
- **State**: PUBLISHED
- **Published Date**: October 05, 2023 at 17:12 UTC
- **Last Updated**: September 19, 2024 at 18:52 UTC
- **Reserved Date**: August 17, 2023 at 10:11 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell SmartFabric Storage Software v1.4 (and earlier) contains an OS Command Injection Vulnerability in the CLI use of the ‘more’ command. A local or remote authenticated attacker could potentially exploit this vulnerability, leading to the ability to gain root-level access.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Dell - Dell SmartFabric Storage Software**
Affected versions:
- v1.4.0 and prior (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21790
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 13:55 UTC
- **Last Updated**: August 03, 2024 at 02:53 UTC
- **Reserved Date**: November 26, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In camera isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479306; Issue ID: ALPS06479306.
### Affected Products
**MediaTek, Inc. - MT6833, MT6853, MT6873, MT6877, MT6893**
Affected versions:
- Android 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/August-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5443
- **State**: PUBLISHED
- **Published Date**: October 12, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:50 UTC
- **Reserved Date**: July 07, 2015 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP 3PAR Service Processor SP 4.2.0.GA-29 (GA) SPOCC, SP 4.3.0.GA-17 (GA) SPOCC, and SP 4.3.0-GA-24 (MU1) SPOCC allows remote authenticated users to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04822249) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1561
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 12:47 UTC
- **Last Updated**: September 17, 2024 at 02:16 UTC
- **Reserved Date**: May 03, 2022 at 00:00 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-471: Security Weakness
### Affected Products
**KrakenD - Lura Project**
Affected versions:
- v2.0.2 (Status: affected)
**KrakenD - KrakenD-CE**
Affected versions:
- v2.0.2 (Status: affected)
**KrakenD - KrakenD-EE**
Affected versions:
- v2.0.0 (Status: affected)
### References
1. [](https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project)
2. [](https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/)
### Credits
- Discovered by Github user Fepame |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23865
- **State**: PUBLISHED
- **Published Date**: January 26, 2024 at 09:07 UTC
- **Last Updated**: May 29, 2025 at 15:16 UTC
- **Reserved Date**: January 23, 2024 at 10:55 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructurelist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cups Easy - Cups Easy (Purchase & Inventory)**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy)
### Credits
- Rafael Pedrero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25019
- **State**: PUBLISHED
- **Published Date**: June 03, 2025 at 15:14 UTC
- **Last Updated**: June 03, 2025 at 15:37 UTC
- **Reserved Date**: January 31, 2025 at 16:26 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**IBM - QRadar Suite Software**
Affected versions:
- 1.10.12.0 (Status: affected)
**IBM - Cloud Pak for Security**
Affected versions:
- 1.10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7235432)
### Credits
- John Zuccato, Rodney Ryan, Chris Shepherd, Vince Dragnea, Ben Goodspeed, Dawid Bak |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39091
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 00:00 UTC
- **Last Updated**: August 13, 2024 at 20:18 UTC
- **Reserved Date**: June 21, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An OS command injection vulnerability in the ccm_debug component of MIPC Camera firmware prior to v5.4.1.240424171021 allows attackers within the same network to execute arbitrary code via a crafted HTML request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://joerngermany.github.io/mipc_vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2386
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: March 19, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26055
- **State**: REJECTED
- **Last Updated**: March 07, 2023 at 22:24 UTC
- **Reserved Date**: March 04, 2022 at 06:16 UTC
- **Assigned By**: Gallagher
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8146
- **State**: PUBLISHED
- **Published Date**: November 22, 2017 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 20:21 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The call module of P10 and P10 Plus smartphones with software versions before VTR-AL00C00B167, versions before VTR-TL00C01B167, versions before VKY-AL00C00B167, versions before VKY-TL00C01B167 has a DoS vulnerability. An attacker may trick a user into installing a malicious application, and the application can send given parameter to call module to crash the call and data communication process.
### Affected Products
**Huawei Technologies Co., Ltd. - P10, P10 Plus**
Affected versions:
- The versions before VTR-AL00C00B167, The versions before VTR-TL00C01B167, The versions before VKY-AL00C00B167, The vertions before VKY-TL00C01B167 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170725-02-smartphone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41259
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 15:23 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use of insecure hashing algorithm in the Gravatar's service in Navidrome v0.52.3 allows attackers to manipulate a user's account information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/nyxfqq/d192af10b53a363e2d9e430068333e04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34732
- **State**: PUBLISHED
- **Published Date**: September 02, 2021 at 03:05 UTC
- **Last Updated**: November 07, 2024 at 22:01 UTC
- **Reserved Date**: June 15, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Prime Collaboration Provisioning**
Affected versions:
- n/a (Status: affected)
### References
1. [20210901 Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-collab-xss-fQMDE5GO) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20829
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 02:27 UTC
- **Last Updated**: October 10, 2024 at 15:24 UTC
- **Reserved Date**: October 28, 2022 at 02:03 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148.
### Affected Products
**MediaTek, Inc. - MT2735, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6980, MT6983, MT6985, MT6990, MT8167, MT8167S, MT8168, MT8175, MT8362A, MT8365**
Affected versions:
- Android 12.0, 13.0 / OpenWrt 1907, 2102 / Yocto 2.6 / RDK-B 22Q3 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/September-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0310
- **State**: PUBLISHED
- **Published Date**: February 10, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:05 UTC
- **Reserved Date**: February 10, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Exponent 0.95 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) search.info.php, (2) permissions.info.php, (3) security.info.php, (4) formcontrol.php, or (5) file_modules.php, which reveals the path in an error message because the pathos_core_version variable is undefined.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [exponent-pathoscoreversion-path-disclosure(19064)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19064)
2. [20050125 Vulnerabilities in eXponent 0.95](http://marc.info/?l=bugtraq&m=110666998407073&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10778, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10778 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10778
- **State**: PUBLISHED
- **Published Date**: August 06, 2019 at 12:48 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 60.0.25 allows self stored XSS in the listftpstable API (SEC-178).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/60+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0185
- **State**: PUBLISHED
- **Published Date**: October 14, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 21:43 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Format string vulnerability in the debug-logging feature in Application Firewall in Apple Mac OS X before 10.7.2 allows local users to gain privileges via a crafted name of an executable file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50092](http://www.securityfocus.com/bid/50092)
2. [APPLE-SA-2011-10-12-3](http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html)
3. [](http://support.apple.com/kb/HT5002)
4. [50085](http://www.securityfocus.com/bid/50085) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0588
- **State**: PUBLISHED
- **Published Date**: June 23, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: June 21, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the web mail module for Usermin 1.070 allows remote attackers to insert arbitrary HTML and script via e-mail messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-200406-15](http://www.gentoo.org/security/en/glsa/glsa-200406-15.xml)
2. [20040611 [SNS Advisory No.73] Usermin Cross-site Scripting Vulnerability](http://marc.info/?l=bugtraq&m=108781564518287&w=2)
3. [10521](http://www.securityfocus.com/bid/10521)
4. [](http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/73_e.html)
5. [usermin-email-xss(16494)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16494) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46537
- **State**: PUBLISHED
- **Published Date**: May 23, 2025 at 12:43 UTC
- **Last Updated**: May 23, 2025 at 15:55 UTC
- **Reserved Date**: April 24, 2025 at 14:23 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ctltwp Section Widget allows Reflected XSS. This issue affects Section Widget: from n/a through 3.3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ctltwp - Section Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/section-widget/vulnerability/wordpress-section-widget-plugin-3-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nabil Irawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23706
- **State**: PUBLISHED
- **Published Date**: May 23, 2023 at 12:41 UTC
- **Last Updated**: January 08, 2025 at 22:05 UTC
- **Reserved Date**: January 17, 2023 at 15:49 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <= 7.5.14 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**miniOrange - WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn)**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/miniorange-login-openid/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-5-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20882
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 03:54 UTC
- **Last Updated**: November 06, 2024 at 16:08 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20220720 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0916
- **State**: PUBLISHED
- **Published Date**: March 22, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
WebTrends software stores account names and passwords in a file which does not have restricted access permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0916) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28711
- **State**: PUBLISHED
- **Published Date**: January 05, 2022 at 16:10 UTC
- **Last Updated**: August 03, 2024 at 21:47 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
### Affected Products
**Linux - Linux**
Affected versions:
- consult Xen advisory XSA-391 (Status: unknown)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-391.txt)
2. [DSA-5050](https://www.debian.org/security/2022/dsa-5050)
3. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html)
4. [[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html)
5. [DSA-5096](https://www.debian.org/security/2022/dsa-5096)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Jürgen Groß of SUSE.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2720, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2720 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2720
- **State**: PUBLISHED
- **Published Date**: July 13, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 02:39 UTC
- **Reserved Date**: July 13, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in list.php in phpaaCms 0.3.1 UTF-8, and possibly other versions, allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [14201](http://www.exploit-db.com/exploits/14201)
2. [65995](http://osvdb.org/65995)
3. [ADV-2010-1690](http://www.vupen.com/english/advisories/2010/1690)
4. [phpaacms-list-sql-injection(60076)](https://exchange.xforce.ibmcloud.com/vulnerabilities/60076)
5. [40450](http://secunia.com/advisories/40450)
6. [41341](http://www.securityfocus.com/bid/41341) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27575
- **State**: PUBLISHED
- **Published Date**: April 04, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 00:34 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
INOTEC Sicherheitstechnik WebServer CPS220/64 3.3.19 allows a remote attacker to read arbitrary files via absolute path traversal, such as with the /cgi-bin/display?file=/etc/passwd URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.inotec-licht.de/)
2. [](https://gist.github.com/s4fv4n/098bd368bf054d008078e369108c2ebd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0072
- **State**: PUBLISHED
- **Published Date**: January 15, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:01 UTC
- **Reserved Date**: January 15, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Accipiter Direct Server 6.0 allows remote attackers to read arbitrary files via encoded \.. (backslash .., "%5c%2e%2e") sequences in an HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9389](http://www.securityfocus.com/bid/9389)
2. [accipterdirectserver-directory-traversal(14198)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14198)
3. [20040109 Directory Traversal in Accipiter Direct Server 6.0](http://marc.info/?l=bugtraq&m=107392576215418&w=2)
4. [20040109 Directory Traversal in Accipiter Direct Server 6.0](http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0274.html)
5. [3433](http://www.osvdb.org/3433)
6. [10600](http://secunia.com/advisories/10600) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18765
- **State**: REJECTED
- **Published Date**: November 04, 2019 at 20:17 UTC
- **Last Updated**: November 04, 2019 at 20:17 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13929
- **State**: PUBLISHED
- **Published Date**: May 22, 2025 at 17:53 UTC
- **Last Updated**: May 22, 2025 at 18:45 UTC
- **Reserved Date**: March 17, 2025 at 14:39 UTC
- **Assigned By**: ABB
### Vulnerability Description
Servlet injection vulnerabilities in ASPECT allow remote code execution if session administrator credentials become compromised.
This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**ABB - ASPECT-Enterprise**
Affected versions:
- 0 (Status: affected)
**ABB - NEXUS Series**
Affected versions:
- 0 (Status: affected)
**ABB - MATRIX Series**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch)
### Credits
- ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24539, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24539
- **State**: PUBLISHED
- **Published Date**: May 11, 2023 at 15:29 UTC
- **Last Updated**: January 24, 2025 at 16:41 UTC
- **Reserved Date**: January 25, 2023 at 21:19 UTC
- **Assigned By**: Go
### Vulnerability Description
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
### Affected Products
**Go standard library - html/template**
Affected versions:
- 0 (Status: affected)
- 1.20.0-0 (Status: affected)
### References
1. [](https://go.dev/issue/59720)
2. [](https://go.dev/cl/491615)
3. [](https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU)
4. [](https://pkg.go.dev/vuln/GO-2023-1751)
### Credits
- Juho Nurminen of Mattermost |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10282
- **State**: PUBLISHED
- **Published Date**: May 12, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: March 28, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-33939045. References: M-ALPS03149189.
### Affected Products
**Google Inc. - Android**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-05-01)
2. [98159](http://www.securityfocus.com/bid/98159) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9529
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In ixheaacd_individual_ch_stream of ixheaacd_channel.c there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112551874
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9058
- **State**: PUBLISHED
- **Published Date**: December 03, 2024 at 06:50 UTC
- **Last Updated**: December 03, 2024 at 11:23 UTC
- **Reserved Date**: September 20, 2024 at 20:17 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Lightbox widget in all versions up to, and including, 5.10.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bdthemes - Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid, Carousel and Remote Arrows)**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3e343ea3-996c-47c7-9480-e6264cbded98?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3189994/bdthemes-element-pack-lite)
### Credits
- D.Sim |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11914
- **State**: PUBLISHED
- **Published Date**: December 12, 2024 at 03:23 UTC
- **Last Updated**: December 12, 2024 at 15:09 UTC
- **Reserved Date**: November 27, 2024 at 17:17 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gutenberg Blocks and Page Layouts – Attire Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'attire-blocks/post-carousel' block in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**shafayat-alam - Gutenberg Blocks and Page Layouts – Attire Blocks**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5c7973be-cf39-4452-9e41-19d2e6aa5e97?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/attire-blocks/trunk/blocks/dynamic/post-carousel/index.php#L445)
3. [](https://wordpress.org/plugins/attire-blocks/)
### Credits
- Djaidja Moundjid |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2442
- **State**: PUBLISHED
- **Published Date**: September 15, 2011 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 23:00 UTC
- **Reserved Date**: June 06, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb11-24.html)
2. [oval:org.mitre.oval:def:14042](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14042)
3. [SUSE-SU-2011:1239](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00013.html)
4. [SUSE-SA:2011:044](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html)
5. [openSUSE-SU-2011:1238](http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0911
- **State**: PUBLISHED
- **Published Date**: March 20, 2023 at 15:52 UTC
- **Last Updated**: February 25, 2025 at 20:28 UTC
- **Reserved Date**: February 18, 2023 at 09:44 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WordPress Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 5.12.8 does not validate the user meta to be retrieved via the user shortcode, allowing any authenticated users such as subscriber to retrieve arbitrary user meta (except the user_pass), such as the user email and activation key by default.
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
### Affected Products
**Unknown - WordPress Shortcodes Plugin — Shortcodes Ultimate**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/35404d16-7213-4293-ac0d-926bd6c17444)
### Credits
- Erwan LR (WPScan)
- WPScan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.