System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2576 - **State**: PUBLISHED - **Published Date**: March 26, 2025 at 02:23 UTC - **Last Updated**: March 26, 2025 at 14:43 UTC - **Reserved Date**: March 20, 2025 at 21:32 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Ayyash Studio — The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **themerox - Ayyash Studio — The kick-start kit** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/634fa1ed-ad6b-4875-b6f9-f20add39dc80?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/ayyash-studio/tags/1.0.3/includes/Importer/Wxr/StudioImporter.php#L351) 3. [](https://plugins.trac.wordpress.org/browser/ayyash-studio/tags/1.0.3/includes/Importer/Wxr/StudioImporter.php#L37) 4. [](https://wordpress.org/plugins/ayyash-studio/#developers) ### Credits - Avraham Shemesh
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7978, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7978 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7978 - **State**: PUBLISHED - **Published Date**: May 23, 2017 at 03:56 UTC - **Last Updated**: August 06, 2024 at 02:13 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-3691](http://www.debian.org/security/2016/dsa-3691) 2. [95336](http://www.securityfocus.com/bid/95336) 3. [RHSA-2017:0013](http://rhn.redhat.com/errata/RHSA-2017-0013.html) 4. [](https://bugs.ghostscript.com/show_bug.cgi?id=697179) 5. [[oss-security] 20161005 Re: CVE Request - multiple ghostscript -dSAFER sandbox problems](http://www.openwall.com/lists/oss-security/2016/10/05/15) 6. [GLSA-201702-31](https://security.gentoo.org/glsa/201702-31)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-3926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-3926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-3926 - **State**: PUBLISHED - **Published Date**: September 04, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 10:00 UTC - **Reserved Date**: September 04, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple directory traversal vulnerabilities in Content Management Made Easy (CMME) 1.12 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the env parameter in a weblog action to index.php, or (2) create arbitrary directories via a .. (dot dot) in the env parameter in a login action to admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [cmme-env-file-include(44683)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44683) 2. [31599](http://secunia.com/advisories/31599) 3. [30854](http://www.securityfocus.com/bid/30854) 4. [4220](http://securityreason.com/securityalert/4220) 5. [cmme-admin-directory-traversal(44687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44687) 6. [6313](https://www.exploit-db.com/exploits/6313)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13540 - **State**: PUBLISHED - **Published Date**: January 05, 2021 at 15:43 UTC - **Last Updated**: August 04, 2024 at 12:18 UTC - **Reserved Date**: May 26, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via WIN-911 Account Change Utility. Depending on the vector chosen, an attacker can overwrite various executables which could lead to escalation of the privileges when executed. ### Weakness Classification (CWE) - CWE-276: Security Weakness ### Affected Products **n/a - Win-911** Affected versions: - Win-911 Enterprise V4.20.13 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2818, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2818 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2818 - **State**: PUBLISHED - **Published Date**: July 12, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 04:29 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability. ### Affected Products **Poppler - Poppler** Affected versions: - 0.53.0 (Status: affected) ### References 1. [99497](http://www.securityfocus.com/bid/99497) 2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24698, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24698 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24698 - **State**: PUBLISHED - **Published Date**: November 08, 2021 at 17:35 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Simple Download Monitor WordPress plugin before 3.9.6 allows users with a role as low as Contributor to remove thumbnails from downloads they do not own, even if they cannot normally edit the download. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Unknown - Simple Download Monitor** Affected versions: - 3.9.6 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1fda1356-77d8-4e77-9ee6-8f9ceeb3d380) ### Credits - apple502j
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1509 - **State**: PUBLISHED - **Published Date**: April 17, 2013 at 05:04 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 7.6.2, 11.1.1.6.0, and 11.1.1.6.1 allows remote authenticated users to affect integrity via unknown vectors related to WebCenter Sites. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20130417 SEC Consult SA-20130417-2 :: HTTP header injection/Cache poisoning in Oracle WebCenter Sites Satellite Server](http://archives.neohapsis.com/archives/bugtraq/2013-04/0189.html) 2. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html) 3. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1104, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1104 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1104 - **State**: PUBLISHED - **Published Date**: March 09, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:56 UTC - **Reserved Date**: March 09, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Pixelpost 1.5 beta 1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the showimage parameter in index.php; and the (2) USER_AGENT, (3) HTTP_REFERER, and (4) HTTP_HOST HTTP header fields as used in the book_vistor function in includes/functions.php. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://forum.pixelpost.org/showthread.php?t=3535) 2. [](http://www.neosecurityteam.net/index.php?action=advisories&id=19) 3. [pixelpost-functions-sql-injection(25046)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25046) 4. [20060304 Pixel Post Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/426764/100/0/threaded) 5. [16964](http://www.securityfocus.com/bid/16964) 6. [ADV-2006-0823](http://www.vupen.com/english/advisories/2006/0823) 7. [pixelpost-index-sql-injection(25044)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25044)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4469 - **State**: PUBLISHED - **Published Date**: November 30, 2012 at 22:00 UTC - **Last Updated**: September 16, 2024 at 23:55 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid token, which is not properly handled when administrators use the Database logging module. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20121003 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/10/04/3) 2. [](http://drupal.org/node/1650790) 3. [](http://drupal.org/node/1650784) 4. [](http://drupal.org/node/1663306)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4064 - **State**: PUBLISHED - **Published Date**: July 30, 2007 at 17:00 UTC - **Last Updated**: August 07, 2024 at 14:37 UTC - **Reserved Date**: July 30, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Drupal 5.x before 5.2, and 4.7.x before 4.7.7, (1) allow remote attackers to inject arbitrary web script or HTML via "some server variables," including PHP_SELF; and (2) allow remote authenticated administrators to inject arbitrary web script or HTML via custom content type names. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2007-2697](http://www.vupen.com/english/advisories/2007/2697) 2. [](http://drupal.org/files/sa-2007-018/advisory.txt) 3. [25097](http://www.securityfocus.com/bid/25097) 4. [26224](http://secunia.com/advisories/26224) 5. [drupal-contenttype-xss(35637)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35637) 6. [drupal-servervariable-xss(35638)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35638)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1391 - **State**: PUBLISHED - **Published Date**: March 07, 2012 at 11:00 UTC - **Last Updated**: September 16, 2024 at 22:41 UTC - **Reserved Date**: February 28, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the mOffice - Outlook sync (com.innov8tion.isharesync) application 3.1 for Android has unknown impact and attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1391-vulnerability-in-mOffice.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-48483, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-48483 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-48483 - **State**: PUBLISHED - **Published Date**: May 30, 2025 at 04:58 UTC - **Last Updated**: May 30, 2025 at 22:00 UTC - **Reserved Date**: May 22, 2025 at 12:11 UTC - **Assigned By**: GitHub_M ### Vulnerability Description FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data during mail signature sanitization. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Additionally, if an administrator accesses one of these emails with a modified signature, it could result in a subsequent Cross-Site Request Forgery (CSRF) vulnerability. This issue has been patched in version 1.8.180. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **freescout-help-desk - freescout** Affected versions: - < 1.8.180 (Status: affected) ### References 1. [https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m](https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21160, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21160 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21160 - **State**: PUBLISHED - **Published Date**: March 09, 2021 at 17:46 UTC - **Last Updated**: August 03, 2024 at 18:01 UTC - **Reserved Date**: December 21, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Heap buffer overflow in WebAudio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1170531) 3. [FEDORA-2021-c88a96bd4b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/) 4. [FEDORA-2021-4740239e28](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/) 5. [FEDORA-2021-78547312f2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/) 6. [DSA-4886](https://www.debian.org/security/2021/dsa-4886) 7. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08) 8. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45883 - **State**: PUBLISHED - **Published Date**: October 19, 2023 at 00:00 UTC - **Last Updated**: September 12, 2024 at 18:26 UTC - **Reserved Date**: October 15, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.vidyo.com/enterprise-video-management/qumu) 2. [](https://hackandpwn.com/disclosures/CVE-2023-45883.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29550 - **State**: PUBLISHED - **Published Date**: May 14, 2021 at 19:10 UTC - **Last Updated**: August 03, 2024 at 22:11 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values. The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger. Later, these computed values are used as arguments(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to `GeneratePoolingSequence`(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation. Since `output_length` can be 0, this results in runtime crashing. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 2.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-369: Security Weakness ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.1.4 (Status: affected) - >= 2.2.0, < 2.2.3 (Status: affected) - >= 2.3.0, < 2.3.3 (Status: affected) - >= 2.4.0, < 2.4.2 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv) 2. [](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0870 - **State**: PUBLISHED - **Published Date**: July 07, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:27 UTC - **Reserved Date**: January 06, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics allow remote attackers to inject arbitrary web script or HTML via (1) the Message parameter to rcore6/main/showerror.jsp, (2) the ButtonsetClass parameter to rcore6/main/buttonset.jsp, (3) the MBName parameter to rcore6/frameset.jsp, (4) the Init parameter to algopds/rcore6/main/browse.jsp, or the (5) Name, (6) StoreName, or (7) STYLESHEET parameter to algopds/rcore6/main/ibrowseheader.jsp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/127304/IBM-Algorithmics-RICOS-Disclosure-XSS-CSRF.html) 2. [ibm-aclm-cve20140870-xss(90944)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90944) 3. [20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS](http://www.securityfocus.com/archive/1/532598/100/0/threaded) 4. [59296](http://secunia.com/advisories/59296) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21675881) 6. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140630-0_IBM_Algorithmics_RICOS_multiple_vulnerabilities_v10.txt) 7. [20140630 SEC Consult SA-20140630-0 :: Multiple vulnerabilities in IBM Algorithmics RICOS](http://seclists.org/fulldisclosure/2014/Jun/173)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1832 - **State**: PUBLISHED - **Published Date**: June 20, 2022 at 10:26 UTC - **Last Updated**: August 03, 2024 at 00:17 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The CaPa Protect WordPress plugin through 0.5.8.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable the applied protection. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Unknown - CaPa Protect** Affected versions: - 0.5.8.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275) ### Credits - Daniel Ruf
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8292 - **State**: PUBLISHED - **Published Date**: October 10, 2018 at 13:00 UTC - **Last Updated**: August 05, 2024 at 06:54 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0. ### Affected Products **Microsoft - PowerShell Core** Affected versions: - 6.0 (Status: affected) **Microsoft - .NET Core** Affected versions: - 1.0 (Status: affected) - 1.1 (Status: affected) - 2.1 (Status: affected) ### References 1. [RHSA-2018:2902](https://access.redhat.com/errata/RHSA-2018:2902) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292) 3. [105548](http://www.securityfocus.com/bid/105548)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46707 - **State**: REJECTED - **Last Updated**: May 08, 2023 at 00:00 UTC - **Reserved Date**: December 07, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5910, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5910 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5910 - **State**: PUBLISHED - **Published Date**: September 18, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description IDE Xcode Server in Apple Xcode before 7.0 does not ensure that server traffic is encrypted, which allows remote attackers to obtain sensitive information by sniffing the network. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1033596](http://www.securitytracker.com/id/1033596) 2. [](https://support.apple.com/HT205217) 3. [APPLE-SA-2015-09-16-2](http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3561 - **State**: PUBLISHED - **Published Date**: October 19, 2010 at 21:00 UTC - **Last Updated**: August 07, 2024 at 03:11 UTC - **Reserved Date**: September 20, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.avaya.com/css/P8/documents/100114327) 2. [RHSA-2010:0865](http://www.redhat.com/support/errata/RHSA-2010-0865.html) 3. [](http://support.avaya.com/css/P8/documents/100114315) 4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml) 5. [HPSBMU02799](http://marc.info/?l=bugtraq&m=134254866602253&w=2) 6. [RHSA-2010:0770](http://www.redhat.com/support/errata/RHSA-2010-0770.html) 7. [SSRT100333](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748) 8. [RHSA-2010:0768](http://www.redhat.com/support/errata/RHSA-2010-0768.html) 9. [FEDORA-2010-16240](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html) 10. [44013](http://www.securityfocus.com/bid/44013) 11. [USN-1010-1](http://www.ubuntu.com/usn/USN-1010-1) 12. [](https://bugzilla.redhat.com/show_bug.cgi?id=639880) 13. [oval:org.mitre.oval:def:12200](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12200) 14. [](http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html) 15. [](http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html) 16. [](http://www.vmware.com/security/advisories/VMSA-2011-0003.html) 17. [42974](http://secunia.com/advisories/42974) 18. [41972](http://secunia.com/advisories/41972) 19. [ADV-2010-3086](http://www.vupen.com/english/advisories/2010/3086) 20. [HPSBUX02608](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748) 21. [oval:org.mitre.oval:def:12437](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12437) 22. [](http://support.avaya.com/css/P8/documents/100123193) 23. [42377](http://secunia.com/advisories/42377) 24. [SUSE-SR:2010:019](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html) 25. [](http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html) 26. [20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX](http://www.securityfocus.com/archive/1/516397/100/0/threaded) 27. [FEDORA-2010-16312](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html) 28. [FEDORA-2010-16294](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25282, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25282 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25282 - **State**: PUBLISHED - **Published Date**: March 15, 2023 at 00:00 UTC - **Last Updated**: February 27, 2025 at 14:31 UTC - **Reserved Date**: February 06, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A heap overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the config.log_to_syslog and log_opt_dropPackets parameters to mydlink_api.ccp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.dlink.com/en/security-bulletin/) 2. [](https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1151 - **State**: PUBLISHED - **Published Date**: May 25, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 18, 2005 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [15505](http://secunia.com/advisories/15505) 2. [15478](http://secunia.com/advisories/15478) 3. [](http://bugs.gentoo.org/show_bug.cgi?id=90622) 4. [DSA-728](http://www.debian.org/security/2005/dsa-728) 5. [15475](http://secunia.com/advisories/15475) 6. [GLSA-200505-17](http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43054, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43054 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43054 - **State**: PUBLISHED - **Published Date**: March 03, 2024 at 12:15 UTC - **Last Updated**: August 02, 2024 at 19:37 UTC - **Reserved Date**: September 15, 2023 at 01:12 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Engineering Test Management 7.0.2 and 7.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 267459. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **IBM - Engineering Test Management** Affected versions: - 7.0.2, 7.0.3 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7122399) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/267459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13180, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13180 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13180 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 16:52 UTC - **Last Updated**: January 16, 2025 at 19:01 UTC - **Reserved Date**: January 07, 2025 at 18:10 UTC - **Assigned By**: ivanti ### Vulnerability Description Path Traversal in Ivanti Avalanche before version 6.4.7 allows a remote unauthenticated attacker to leak sensitive information. This CVE addresses incomplete fixes from CVE-2024-47011. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Ivanti - Avalanche** Affected versions: - 6.4.7 (Status: unaffected) ### References 1. [](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45828, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45828 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45828 - **State**: PUBLISHED - **Published Date**: July 18, 2023 at 11:53 UTC - **Last Updated**: September 25, 2024 at 17:03 UTC - **Reserved Date**: November 23, 2022 at 07:45 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in NooTheme Noo Timetable plugin <= 2.1.3 versions. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **NooTheme - Noo Timetable** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/noo-timetable/wordpress-noo-timetable-responsive-calendar-auto-sync-wordpress-plugin-plugin-2-1-3-cross-site-request-forgery-csrf?_s_id=cve) ### Credits - Cat (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16257, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16257 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16257 - **State**: PUBLISHED - **Published Date**: January 11, 2023 at 21:39 UTC - **Last Updated**: April 09, 2025 at 13:44 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_sx, at 0x9d014f28, the value for the `cmd3` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Insteon - Hub** Affected versions: - Not specified (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24258, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24258 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24258 - **State**: PUBLISHED - **Published Date**: May 12, 2025 at 21:43 UTC - **Last Updated**: May 13, 2025 at 15:28 UTC - **Reserved Date**: January 17, 2025 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Ventura 13.7.6, macOS Sonoma 14.7.6. An app may be able to gain root privileges. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122717) 2. [](https://support.apple.com/en-us/122718) 3. [](https://support.apple.com/en-us/122373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2185 - **State**: REJECTED - **Last Updated**: May 12, 2023 at 00:00 UTC - **Reserved Date**: April 19, 2023 at 00:00 UTC - **Assigned By**: Xylem ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27214, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27214 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27214 - **State**: PUBLISHED - **Published Date**: March 15, 2022 at 16:46 UTC - **Last Updated**: November 19, 2024 at 19:34 UTC - **Reserved Date**: March 15, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials. ### Affected Products **Jenkins project - Jenkins Release Helper Plugin** Affected versions: - unspecified (Status: affected) - next of 1.3.3 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2274) 2. [[oss-security] 20220315 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/15/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9307 - **State**: PUBLISHED - **Published Date**: May 31, 2017 at 03:54 UTC - **Last Updated**: August 05, 2024 at 17:02 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SSRF vulnerability in remotedownload.php in Allen Disk 1.6 allows remote authenticated users to conduct port scans and access intranet servers via a crafted file parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/s3131212/allendisk/issues/20)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35573, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35573 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35573 - **State**: PUBLISHED - **Published Date**: October 20, 2021 at 10:50 UTC - **Last Updated**: September 25, 2024 at 19:34 UTC - **Reserved Date**: June 28, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - Outside In Technology** Affected versions: - 8.5.5 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11592, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11592 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11592 - **State**: PUBLISHED - **Published Date**: July 24, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 18:12 UTC - **Reserved Date**: July 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek function of Exiv2 0.26 that will lead to a remote denial of service attack (heap memory corruption) via crafted input. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1473889)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25229, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25229 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25229 - **State**: PUBLISHED - **Published Date**: May 20, 2022 at 11:01 UTC - **Last Updated**: August 03, 2024 at 04:36 UTC - **Reserved Date**: February 15, 2022 at 00:00 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description Popcorn Time 0.4.7 has a Stored XSS in the 'Movies API Server(s)' field via the 'settings' page. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands. ### Affected Products **n/a - Popcorn Time** Affected versions: - 0.4.7 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/bowie/) 2. [](https://github.com/popcorn-official/popcorn-desktop/issues/2491)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42025, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42025 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42025 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 15:47 UTC - **Last Updated**: September 28, 2024 at 17:44 UTC - **Reserved Date**: July 27, 2024 at 01:04 UTC - **Assigned By**: hackerone ### Vulnerability Description A Command Injection vulnerability found in a Self-Hosted UniFi Network Servers (Linux) with UniFi Network Application (Version 8.3.32 and earlier) allows a malicious actor with unifi user shell access to escalate privileges to root on the host device. ### Affected Products **Ubiquiti Inc - UniFi Network Application** Affected versions: - 8.4.59 (Status: affected) ### References 1. [](https://community.ui.com/releases/Security-Advisory-Bulletin-042-042/c4f68b56-cdc4-4128-b2cb-5870209d1704)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41069, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41069 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41069 - **State**: PUBLISHED - **Published Date**: January 10, 2024 at 22:03 UTC - **Last Updated**: August 30, 2024 at 19:20 UTC - **Reserved Date**: August 22, 2023 at 18:10 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed by improving Face ID anti-spoofing models. This issue is fixed in iOS 17 and iPadOS 17. A 3D model constructed to look like the enrolled user may authenticate via Face ID. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213938)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19075 - **State**: PUBLISHED - **Published Date**: November 07, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 11:30 UTC - **Reserved Date**: November 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The firewall feature makes it easier for remote attackers to ascertain credentials and firewall rules because invalid credentials lead to error -2, whereas rule-based blocking leads to error -8. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4602 - **State**: PUBLISHED - **Published Date**: May 16, 2016 at 10:00 UTC - **Last Updated**: August 06, 2024 at 06:18 UTC - **Reserved Date**: June 16, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2015:1187](http://rhn.redhat.com/errata/RHSA-2015-1187.html) 2. [1032709](http://www.securitytracker.com/id/1032709) 3. [RHSA-2015:1186](http://rhn.redhat.com/errata/RHSA-2015-1186.html) 4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html) 5. [](http://php.net/ChangeLog-5.php) 6. [](https://bugs.php.net/bug.php?id=69152) 7. [[oss-security] 20150616 Re: CVE Request: various issues in PHP](http://www.openwall.com/lists/oss-security/2015/06/16/12) 8. [RHSA-2015:1135](http://rhn.redhat.com/errata/RHSA-2015-1135.html) 9. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fb83c76deec58f1fab17c350f04c9f042e5977d1) 10. [75249](http://www.securityfocus.com/bid/75249) 11. [RHSA-2015:1218](http://rhn.redhat.com/errata/RHSA-2015-1218.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0720 - **State**: PUBLISHED - **Published Date**: March 28, 2022 at 17:23 UTC - **Last Updated**: August 02, 2024 at 23:40 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Amelia WordPress plugin before 1.0.47 does not have proper authorisation when managing appointments, allowing any customer to update other's booking, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it. ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Unknown - Amelia – Events & Appointments Booking Calendar** Affected versions: - 1.0.47 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf) ### Credits - huli of Cymetrics
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1762 - **State**: PUBLISHED - **Published Date**: April 27, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:50 UTC - **Reserved Date**: January 29, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Unspecified vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code with medium-integrity privileges and bypass a sandbox protection mechanism via unknown vectors, as demonstrated by ZDI during a Pwn4Fun competition at CanSecWest 2014. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [67511](http://www.securityfocus.com/bid/67511) 2. [1030370](http://www.securitytracker.com/id/1030370) 3. [](http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/) 4. [MS14-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035) 5. [](http://twitter.com/thezdi/statuses/443810610958958592)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5640 - **State**: PUBLISHED - **Published Date**: November 20, 2023 at 18:55 UTC - **Last Updated**: August 02, 2024 at 08:07 UTC - **Reserved Date**: October 18, 2023 at 13:28 UTC - **Assigned By**: WPScan ### Vulnerability Description The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability. ### Weakness Classification (CWE) - CWE-89 SQL Injection: SQL Injection ### Affected Products **Unknown - Article analytics** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d) 2. [](https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/) ### Credits - Nicolas Surribas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26265, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26265 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26265 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 00:00 UTC - **Last Updated**: March 28, 2025 at 15:11 UTC - **Reserved Date**: February 07, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.eurecom.fr/oai/openairinterface5g) 2. [](https://www.sigmobile.org/mobicom/2025/) 3. [](https://anonymous.4open.science/r/Mobicom-ARCANE-36B7/README.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0445, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0445 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0445 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:41 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1104](http://www.osvdb.org/1104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13055, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13055 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13055 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23) 2. [](https://support.apple.com/HT208221) 3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971) 4. [1039307](http://www.securitytracker.com/id/1039307) 5. [](https://github.com/the-tcpdump-group/tcpdump/commit/5d0d76e88ee2d3236d7e032589d6f1d4ec5f7b1e) 6. [](http://www.tcpdump.org/tcpdump-changes.txt) 7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29001 - **State**: PUBLISHED - **Published Date**: January 26, 2021 at 01:26 UTC - **Last Updated**: August 04, 2024 at 16:48 UTC - **Reserved Date**: November 24, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.mygeeni.com/hc/en-us) 2. [](https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27826, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27826 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27826 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 22:17 UTC - **Last Updated**: February 13, 2025 at 17:46 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214101) 2. [](https://support.apple.com/en-us/HT214120) 3. [](https://support.apple.com/en-us/HT214106) 4. [](https://support.apple.com/en-us/HT214104) 5. [](https://support.apple.com/en-us/HT214123) 6. [](https://support.apple.com/en-us/HT214102) 7. [](https://support.apple.com/en-us/HT214118) 8. [](https://support.apple.com/kb/HT214102) 9. [](https://support.apple.com/kb/HT214104) 10. [](https://support.apple.com/kb/HT214106) 11. [](https://support.apple.com/kb/HT214101) 12. [](http://seclists.org/fulldisclosure/2024/Jul/23) 13. [](http://seclists.org/fulldisclosure/2024/Jul/20) 14. [](http://seclists.org/fulldisclosure/2024/Jul/19)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46256, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46256 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46256 - **State**: PUBLISHED - **Published Date**: October 31, 2023 at 15:29 UTC - **Last Updated**: September 05, 2024 at 20:15 UTC - **Reserved Date**: October 19, 2023 at 20:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description PX4-Autopilot provides PX4 flight control solution for drones. In versions 1.14.0-rc1 and prior, PX4-Autopilot has a heap buffer overflow vulnerability in the parser function due to the absence of `parserbuf_index` value checking. A malfunction of the sensor device can cause a heap buffer overflow with leading unexpected drone behavior. Malicious applications can exploit the vulnerability even if device sensor malfunction does not occur. Up to the maximum value of an `unsigned int`, bytes sized data can be written to the heap memory area. As of time of publication, no fixed version is available. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:L` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow - CWE-120: Security Weakness ### Affected Products **PX4 - PX4-Autopilot** Affected versions: - <= 1.14.0-rc1 (Status: affected) ### References 1. [https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw](https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw) 2. [https://github.com/PX4/PX4-Autopilot/blob/main/src/drivers/distance_sensor/lightware_laser_serial/parser.cpp#L87](https://github.com/PX4/PX4-Autopilot/blob/main/src/drivers/distance_sensor/lightware_laser_serial/parser.cpp#L87)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35089, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35089 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35089 - **State**: PUBLISHED - **Published Date**: April 01, 2022 at 04:40 UTC - **Last Updated**: August 04, 2024 at 00:33 UTC - **Reserved Date**: June 21, 2021 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Possible buffer overflow due to lack of input IB amount validation while processing the user command in Snapdragon Auto ### CVSS Metrics - **CVSS Base Score**: 8.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Qualcomm, Inc. - Snapdragon Auto** Affected versions: - QCA6574AU, QCA6696, SA8155P (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30771, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30771 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30771 - **State**: PUBLISHED - **Published Date**: March 18, 2022 at 17:59 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.4, iOS 14.6 and iPadOS 14.6, watchOS 7.5, tvOS 14.6. Processing a maliciously crafted font file may lead to arbitrary code execution. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212528) 2. [](https://support.apple.com/en-us/HT212529) 3. [](https://support.apple.com/en-us/HT212532) 4. [](https://support.apple.com/en-us/HT212533)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8027 - **State**: PUBLISHED - **Published Date**: February 11, 2021 at 16:10 UTC - **Last Updated**: September 16, 2024 at 17:54 UTC - **Reserved Date**: January 27, 2020 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H` ### Weakness Classification (CWE) - CWE-377: Security Weakness ### Affected Products **SUSE - SUSE Linux Enterprise Server 15-LTSS** Affected versions: - openldap2 (Status: affected) **SUSE - SUSE Linux Enterprise Server for SAP 15** Affected versions: - openldap2 (Status: affected) **openSUSE - openSUSE Leap 15.1** Affected versions: - openldap2 (Status: affected) **openSUSE - openSUSE Leap 15.2** Affected versions: - openldap2 (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1175568) ### Credits - Thorsten Kukuk/Matthias Gerstner of SUSE
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9065, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9065 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9065 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: October 27, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description The location bar in Firefox for Android can be spoofed by forcing a user into fullscreen mode, blocking its exiting, and creating of a fake location bar without any user notification. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox < 50. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [94342](http://www.securityfocus.com/bid/94342) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1306696) 3. [1037298](http://www.securitytracker.com/id/1037298) 4. [](https://www.mozilla.org/security/advisories/mfsa2016-89/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22016, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22016 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22016 - **State**: PUBLISHED - **Published Date**: May 10, 2022 at 20:33 UTC - **Last Updated**: January 02, 2025 at 18:58 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows PlayToManager Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Windows PlayToManager Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22016)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47227, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47227 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47227 - **State**: PUBLISHED - **Published Date**: September 23, 2024 at 00:00 UTC - **Last Updated**: March 25, 2025 at 14:11 UTC - **Reserved Date**: September 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description iRedAdmin before 2.6 allows XSS, e.g., via order_name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/iredmail/iRedAdmin/commit/b537e71ecf522d7f10180f5f0aab4a98a881893a) 2. [](https://www.iredmail.org) 3. [](https://github.com/iredmail/iRedAdmin/commit/3c72b438d412ea3ee0270f6956e19b1098c19191) 4. [](https://github.com/iredmail/iRedAdmin/compare/2.5...2.6) 5. [](https://docs.iredmail.org/upgrade.iredmail.1.6.8-1.7.0.html#upgrade-iredadmin-open-source-edition-to-the-latest-stable-release-26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41593, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41593 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41593 - **State**: PUBLISHED - **Published Date**: September 11, 2023 at 00:00 UTC - **Last Updated**: September 26, 2024 at 15:57 UTC - **Reserved Date**: August 30, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Dairy Farm Shop Management System Using PHP and MySQL v1.1 allow attackers to execute arbitrary web scripts and HTML via a crafted payload injected into the Category and Category Field parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet) 2. [](https://portswigger.net/web-security/cross-site-scripting) 3. [](https://www.acunetix.com/websitesecurity/cross-site-scripting/) 4. [](https://github.com/MATRIXDEVIL/CVE/blob/main/CVE-2023-41593)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11447, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11447 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11447 - **State**: PUBLISHED - **Published Date**: November 21, 2024 at 02:06 UTC - **Last Updated**: April 14, 2025 at 19:01 UTC - **Reserved Date**: November 19, 2024 at 18:10 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Community by PeepSo – Download from PeepSo.com plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘filter’ parameter in all versions up to, and including, 7.0.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **peepso - Community by PeepSo – Download from PeepSo.com** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/049a36b1-4e24-4ac9-a594-9cabdc0dfe0f?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/peepso-core/trunk/classes/template.php#L68) 3. [](https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.2/templates/activity/activity-stream-filters-simple.php#L131) 4. [](https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.2/templates/activity/activity-stream-filters.php#L179) 5. [](https://www.peepso.com/7.0.4.0/) ### Credits - Rajan Kshedal
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26857 - **State**: PUBLISHED - **Published Date**: April 05, 2023 at 00:00 UTC - **Last Updated**: February 13, 2025 at 16:08 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An arbitrary file upload vulnerability in /admin/ajax.php?action=save_uploads of Dynamic Transaction Queuing System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ctg503/bug_report/blob/main/vendors/oretnom23/dynamic-transaction-queuing-system/RCE-1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1298 - **State**: PUBLISHED - **Published Date**: April 02, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 09:34 UTC - **Reserved Date**: January 08, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2014-04-22-2](http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html) 2. [](https://support.apple.com/kb/HT6537) 3. [APPLE-SA-2014-04-22-3](http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html) 4. [APPLE-SA-2014-04-01-1](http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14790, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14790 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14790 - **State**: REJECTED - **Published Date**: May 22, 2018 at 20:00 UTC - **Last Updated**: May 22, 2018 at 19:57 UTC - **Reserved Date**: September 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4560 - **State**: PUBLISHED - **Published Date**: July 02, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 23, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in includes/getTipo.php in the ToolPage plugin 1.6.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the t parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://codevigilant.com/disclosure/wp-plugin-toolpage-a3-cross-site-scripting-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0442, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0442 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0442 - **State**: PUBLISHED - **Published Date**: February 21, 2023 at 08:51 UTC - **Last Updated**: March 12, 2025 at 13:27 UTC - **Reserved Date**: January 23, 2023 at 14:18 UTC - **Assigned By**: WPScan ### Vulnerability Description The Loan Comparison WordPress plugin before 1.5.3 does not validate and escape some of its query parameters before outputting them back in a page/post via an embedded shortcode, which could allow an attacker to inject javascript into into the site via a crafted URL. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Loan Comparison** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/34d95d88-4114-4597-b4db-e9f5ef80d322) ### Credits - Harald Eilertsen - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1400 - **State**: PUBLISHED - **Published Date**: February 03, 2015 at 16:00 UTC - **Last Updated**: August 06, 2024 at 04:40 UTC - **Reserved Date**: January 27, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in search.php in NPDS Revolution 13 allows remote attackers to execute arbitrary SQL commands via the query parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.npds.org/viewtopic.php?topic=26189&forum=12) 2. [](http://www.npds.org/viewtopic.php?topic=26233&forum=12) 3. [](http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html) 4. [](http://websecgeeks.com/npds-cms-sql-injection/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2911 - **State**: PUBLISHED - **Published Date**: June 07, 2012 at 19:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2011-12370](http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html) 2. [[oss-security] 20120810 CVE request: libmodplug: multiple vulnerabilities reported in <= 0.8.8.3](http://www.openwall.com/lists/oss-security/2011/08/10/4) 3. [DSA-2415](http://www.debian.org/security/2012/dsa-2415) 4. [](http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/) 5. [GLSA-201203-16](http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml) 6. [FEDORA-2011-10503](http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html) 7. [45131](http://secunia.com/advisories/45131) 8. [[oss-security] 20120812 Re: CVE request: libmodplug: multiple vulnerabilities reported in <= 0.8.8.3](http://www.openwall.com/lists/oss-security/2011/08/12/4) 9. [48058](http://secunia.com/advisories/48058) 10. [46032](http://secunia.com/advisories/46032) 11. [74208](http://www.osvdb.org/74208) 12. [46793](http://secunia.com/advisories/46793) 13. [48439](http://secunia.com/advisories/48439) 14. [45742](http://secunia.com/advisories/45742) 15. [USN-1255-1](http://ubuntu.com/usn/usn-1255-1) 16. [openSUSE-SU-2011:0943](http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html) 17. [48434](http://secunia.com/advisories/48434) 18. [48979](http://www.securityfocus.com/bid/48979) 19. [GLSA-201203-14](http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml) 20. [](http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8) 21. [45901](http://secunia.com/advisories/45901) 22. [RHSA-2011:1264](http://rhn.redhat.com/errata/RHSA-2011-1264.html) 23. [46043](http://secunia.com/advisories/46043) 24. [libmodplug-wav-bo(68983)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68983) 25. [](http://jira.atheme.org/browse/AUDPLUG-394) 26. [45658](http://secunia.com/advisories/45658)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0987 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting vulnerability in CGIWrap before 3.7 allows remote attackers to execute arbitrary Javascript on other web clients by causing the Javascript to be inserted into error messages that are generated by CGIWrap. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://cgiwrap.sourceforge.net/changes.html) 2. [20010722 Re: [cgiwrap-users] Re: Security hole in CGIWrap (cross-site scripting vulnerability)](http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html) 3. [1909](http://www.osvdb.org/1909) 4. [cgiwrap-cross-site-scripting(6886)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6886) 5. [3084](http://www.securityfocus.com/bid/3084)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15882, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15882 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15882 - **State**: PUBLISHED - **Published Date**: October 26, 2017 at 05:00 UTC - **Last Updated**: August 05, 2024 at 20:04 UTC - **Reserved Date**: October 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The London Trust Media Private Internet Access (PIA) application before 1.3.3.1 for Android allows remote attackers to cause a denial of service (application crash) via a large VPN server-list file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wwws.nightwatchcybersecurity.com/2017/10/25/advisory-pia-android-app-cve-2017-15882/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8219, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8219 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8219 - **State**: PUBLISHED - **Published Date**: August 27, 2024 at 21:31 UTC - **Last Updated**: August 28, 2024 at 14:03 UTC - **Reserved Date**: August 27, 2024 at 12:38 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **code-projects - Responsive Hotel Site** Affected versions: - 1.0 (Status: affected) ### References 1. [VDB-275928 | code-projects Responsive Hotel Site index.php sql injection](https://vuldb.com/?id.275928) 2. [VDB-275928 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275928) 3. [Submit #398205 | code-projects Responsive Hotel Site Using PHP With Source Code 1.0 SQL Injection](https://vuldb.com/?submit.398205) 4. [](https://github.com/t4rrega/cve/issues/8) 5. [](https://code-projects.org/) ### Credits - t4rrega (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8768 - **State**: PUBLISHED - **Published Date**: March 18, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 07:02 UTC - **Reserved Date**: March 18, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://openwall.com/lists/oss-security/2018/03/15/2) 2. [[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update](https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27745 - **State**: PUBLISHED - **Published Date**: June 02, 2023 at 00:00 UTC - **Last Updated**: January 09, 2025 at 18:41 UTC - **Reserved Date**: March 05, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in South River Technologies TitanFTP Before v2.0.1.2102 allows attackers with low-level privileges to perform Administrative actions by sending requests to the user server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf) 2. [](https://www.whiteoaksecurity.com/blog/titanftp-vulnerability-disclosure/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3496 - **State**: PUBLISHED - **Published Date**: November 04, 2005 at 00:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in PHP Handicapper allows remote attackers to inject arbitrary web script or HTML via the msg parameter to msg.php. NOTE: some sources identify a second vector in the login parameter to process_signup.php, but the original source says that it is for CRLF injection (CVE-2005-4712). Also note: the vendor has disputed CVE-2005-3497, and it is possible that the dispute was intended to include this issue as well. If so, followup investigation strongly suggests that the original report is correct. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20479](http://www.osvdb.org/20479) 2. [](http://www.zone-h.org/advisories/read/id=8360) 3. [15294](http://www.securityfocus.com/bid/15294) 4. [ADV-2005-2292](http://www.vupen.com/english/advisories/2005/2292) 5. [17412](http://secunia.com/advisories/17412) 6. [20480](http://www.osvdb.org/20480)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3603, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3603 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3603 - **State**: PUBLISHED - **Published Date**: April 27, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 21, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20111007 radvd 1.8.2 released with security fixes](http://www.openwall.com/lists/oss-security/2011/10/06/3) 2. [](http://www.litech.org/radvd/CHANGES) 3. [](https://access.redhat.com/security/cve/CVE-2011-3603)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43505 - **State**: PUBLISHED - **Published Date**: August 11, 2023 at 02:37 UTC - **Last Updated**: February 13, 2025 at 16:33 UTC - **Reserved Date**: November 10, 2022 at 04:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access. ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-691: Security Weakness ### Affected Products **n/a - Intel(R) Processors** Affected versions: - See references (Status: affected) ### References 1. [http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html) 2. [](https://security.netapp.com/advisory/ntap-20230824-0001/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38849, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38849 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38849 - **State**: PUBLISHED - **Published Date**: October 25, 2023 at 00:00 UTC - **Last Updated**: September 11, 2024 at 19:06 UTC - **Reserved Date**: July 25, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in tire-sales Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://liff.line.me/1657203739-yvGg5PjN) 2. [](https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38849.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4353 - **State**: PUBLISHED - **Published Date**: December 20, 2005 at 00:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 19, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in toendaCMS 0.6.2.1, when configured to use a SQL database, allows remote attackers to execute arbitrary SQL commands via the id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21768](http://www.osvdb.org/21768) 2. [18058](http://secunia.com/advisories/18058) 3. [ADV-2005-2926](http://www.vupen.com/english/advisories/2005/2926)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20080, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20080 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20080 - **State**: PUBLISHED - **Published Date**: March 23, 2023 at 00:00 UTC - **Last Updated**: October 28, 2024 at 16:32 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the IPv6 DHCP version 6 (DHCPv6) relay and server features of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to insufficient validation of data boundaries. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-129: Security Weakness ### Affected Products **Cisco - Cisco IOS ** Affected versions: - n/a (Status: affected) ### References 1. [20230322 Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dhcpv6-dos-44cMvdDK)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26734, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26734 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26734 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 17:00 UTC - **Last Updated**: May 04, 2025 at 08:55 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The pernet operations structure for the subsystem must be registered before registering the generic netlink family. Make an unregister in case of unsuccessful registration. ### Affected Products **Linux - Linux** Affected versions: - 687125b5799cd5120437fa455cfccbe8537916ff (Status: affected) - 687125b5799cd5120437fa455cfccbe8537916ff (Status: affected) - 687125b5799cd5120437fa455cfccbe8537916ff (Status: affected) **Linux - Linux** Affected versions: - 6.3 (Status: affected) - 0 (Status: unaffected) - 6.6.19 (Status: unaffected) - 6.7.7 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/919092bd5482b7070ae66d1daef73b600738f3a2) 2. [](https://git.kernel.org/stable/c/e91d3561e28d7665f4f837880501dc8755f635a9) 3. [](https://git.kernel.org/stable/c/def689fc26b9a9622d2e2cb0c4933dd3b1c8071c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1233 - **State**: PUBLISHED - **Published Date**: December 15, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: December 14, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in Gadu-Gadu allows remote attackers to cause a denial of service (disk consumption) via a user packet to the DCC file transfer capability with an invalid file length. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041213 Gadu-Gadu several vulnerabilities](http://marc.info/?l=bugtraq&m=110295777306493&w=2) 2. [](http://www.man.poznan.pl/~security/gg-adv.txt) 3. [gadu-gadu-dcc-bo(18465)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18465)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19524, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19524 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19524 - **State**: PUBLISHED - **Published Date**: December 03, 2019 at 15:42 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86) 3. [[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3](http://www.openwall.com/lists/oss-security/2019/12/03/4) 4. [openSUSE-SU-2019:2675](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html) 5. [USN-4228-1](https://usn.ubuntu.com/4228-1/) 6. [USN-4227-1](https://usn.ubuntu.com/4227-1/) 7. [USN-4226-1](https://usn.ubuntu.com/4226-1/) 8. [USN-4225-1](https://usn.ubuntu.com/4225-1/) 9. [USN-4228-2](https://usn.ubuntu.com/4228-2/) 10. [USN-4227-2](https://usn.ubuntu.com/4227-2/) 11. [20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)](https://seclists.org/bugtraq/2020/Jan/10) 12. [](http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html) 13. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html) 14. [USN-4225-2](https://usn.ubuntu.com/4225-2/) 15. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41538, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41538 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41538 - **State**: PUBLISHED - **Published Date**: October 14, 2022 at 00:00 UTC - **Last Updated**: May 14, 2025 at 15:10 UTC - **Reserved Date**: September 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Wedding Planner v1.0 was discovered to contain an arbitrary file upload vulnerability in the component /Wedding-Management-PHP/admin/photos_add.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gougou123-hash/bug_report/blob/main/vendors/pushpam02/wedding-planner/RCE-1.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39838, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39838 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39838 - **State**: PUBLISHED - **Published Date**: August 05, 2024 at 04:35 UTC - **Last Updated**: March 25, 2025 at 16:20 UTC - **Reserved Date**: July 26, 2024 at 05:46 UTC - **Assigned By**: jpcert ### Vulnerability Description ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15 uses hard-coded credentials, which may allow a network-adjacent attacker with an administrative privilege to alter the configuration of the device. ### Affected Products **ZEXELON CO., LTD. - ZWX-2000CSW2-HN** Affected versions: - firmware versions prior to Ver.0.3.15 (Status: affected) ### References 1. [](https://www.zexelon.co.jp/pdf/jvn70666401.pdf) 2. [](https://jvn.jp/en/jp/JVN70666401/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31863, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31863 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31863 - **State**: PUBLISHED - **Published Date**: April 28, 2021 at 06:17 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 28, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows Redmine users to read arbitrary local files accessible by the application server process. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.redmine.org/projects/redmine/wiki/Security_Advisories) 2. [](https://www.redmine.org/news/131) 3. [[debian-lts-announce] 20210513 [SECURITY] [DLA 2658-1] redmine security update](https://lists.debian.org/debian-lts-announce/2021/05/msg00013.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17968, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17968 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17968 - **State**: PUBLISHED - **Published Date**: October 23, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 11:01 UTC - **Reserved Date**: October 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A gambling smart contract implementation for RuletkaIo, an Ethereum gambling game, generates a random value that is predictable by an external contract call. The developer wrote a random() function that uses a block timestamp and block hash from the Ethereum blockchain. This can be predicted by writing the same random function code in an exploit contract to determine the deadSeat value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17968)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11087, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11087 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11087 - **State**: PUBLISHED - **Published Date**: May 29, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0. ### CVSS Metrics - **CVSS Base Score**: 3.1/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **FreeRDP - FreeRDP** Affected versions: - <= 2.0.0 (Status: affected) ### References 1. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7) 2. [](https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4) 3. [openSUSE-SU-2020:1090](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html) 4. [[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update](https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34438, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34438 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34438 - **State**: PUBLISHED - **Published Date**: October 21, 2022 at 18:05 UTC - **Last Updated**: May 07, 2025 at 15:39 UTC - **Reserved Date**: June 23, 2022 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS, versions 8.2.x-9.4.0.x, contain a privilege context switching error. A local authenticated malicious user with high privileges could potentially exploit this vulnerability, leading to full system compromise. This impacts compliance mode clusters. ### CVSS Metrics - **CVSS Base Score**: 6.7/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Dell - PowerScale OneFS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000204053/dsa-2022-245-dell-emc-powerscale-onefs-security-update-for-multiple-security-updates)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11114, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11114 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11114 - **State**: PUBLISHED - **Published Date**: May 17, 2019 at 15:41 UTC - **Last Updated**: August 04, 2024 at 22:48 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient input validation in Intel(R) Driver & Support Assistant version 19.3.12.3 and before may allow a privileged user to potentially enable denial of service via local access. ### Affected Products **n/a - Intel(R) Driver & Support Assistant** Affected versions: - Version 19.3.12.3 and before. (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00252.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49108, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49108 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49108 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:54 UTC - **Last Updated**: May 04, 2025 at 08:30 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: Fix memory leaks on probe Handle the error branches to free memory where required. Addresses-Coverity-ID: 1491825 ("Resource leak") ### Affected Products **Linux - Linux** Affected versions: - 710573dee31b4ca34abeb384c6e3db499c0af65f (Status: affected) - 710573dee31b4ca34abeb384c6e3db499c0af65f (Status: affected) - 710573dee31b4ca34abeb384c6e3db499c0af65f (Status: affected) **Linux - Linux** Affected versions: - 5.15 (Status: affected) - 0 (Status: unaffected) - 5.16.20 (Status: unaffected) - 5.17.3 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c6a0b413398588fc2d8b174a79ea715b66413fca) 2. [](https://git.kernel.org/stable/c/02742d1d5c95cff8b6e9379aae4ab12674f7265d) 3. [](https://git.kernel.org/stable/c/7a688c91d3fd54c53e7a9edd6052cdae98dd99d8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3656 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2365 - **State**: PUBLISHED - **Published Date**: March 01, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 04:14 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description SAP NetWeaver Portal, WebDynpro Java, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. ### Affected Products **SAP SE - SAP NetWeaver Portal WebDynpro RunTime** Affected versions: - 7.30 (Status: affected) - 7.31 (Status: affected) - 7.40 (Status: affected) - 7.50 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/2547977) 2. [102999](http://www.securityfocus.com/bid/102999) 3. [](https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2614 - **State**: PUBLISHED - **Published Date**: March 19, 2024 at 12:02 UTC - **Last Updated**: February 13, 2025 at 17:41 UTC - **Reserved Date**: March 18, 2024 at 16:22 UTC - **Assigned By**: mozilla ### Vulnerability Description Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) ### References 1. [Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093) 2. [](https://www.mozilla.org/security/advisories/mfsa2024-12/) 3. [](https://www.mozilla.org/security/advisories/mfsa2024-13/) 4. [](https://www.mozilla.org/security/advisories/mfsa2024-14/) 5. [](https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html) 6. [](https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html) ### Credits - Noah Lokocz, Kevin Brosnan, Ryan VanderMeulen and the Mozilla Fuzzing Team
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0358 - **State**: PUBLISHED - **Published Date**: June 21, 2018 at 11:00 UTC - **Last Updated**: November 29, 2024 at 14:56 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the file descriptor handling of Cisco TelePresence Video Communication Server (VCS) Expressway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to exhaustion of file descriptors while processing a high volume of traffic. An attacker could exploit this vulnerability by establishing a high number of concurrent TCP connections to the vulnerable system. An exploit could allow the attacker to cause a restart in a specific process, resulting in a temporary interruption of service. Cisco Bug IDs: CSCvh77056, CSCvh77058, CSCvh95264. ### Weakness Classification (CWE) - CWE-769: Security Weakness ### Affected Products **n/a - Cisco TelePresence Video Communication Server unknown** Affected versions: - Cisco TelePresence Video Communication Server unknown (Status: affected) ### References 1. [1041172](http://www.securitytracker.com/id/1041172) 2. [104521](http://www.securityfocus.com/bid/104521) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-vcse-dos)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1266, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1266 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1266 - **State**: PUBLISHED - **Published Date**: March 06, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Evolution 2.8.1 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Evolution from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[gnupg-users] 20070306 [Announce] Multiple Messages Problem in GnuPG and GPGME](http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html) 2. [2353](http://securityreason.com/securityalert/2353) 3. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/30/7710/threaded) 4. [22760](http://www.securityfocus.com/bid/22760) 5. [](http://www.coresecurity.com/?action=item&id=1687) 6. [20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability](http://www.securityfocus.com/archive/1/461958/100/0/threaded) 7. [24412](http://secunia.com/advisories/24412) 8. [1017727](http://www.securitytracker.com/id?1017727) 9. [ADV-2007-0835](http://www.vupen.com/english/advisories/2007/0835)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5749 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 15:30 UTC - **Last Updated**: June 06, 2025 at 15:53 UTC - **Reserved Date**: June 05, 2025 at 20:45 UTC - **Assigned By**: zdi ### Vulnerability Description WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295. ### Weakness Classification (CWE) - CWE-457: Security Weakness ### Affected Products **WOLFBOX - Level 2 EV Charger** Affected versions: - 3.1.17 (main), 1.2.6 (MCU) (Status: affected) ### References 1. [ZDI-25-328](https://www.zerodayinitiative.com/advisories/ZDI-25-328/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52645, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52645 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52645 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 15:59 UTC - **Last Updated**: May 04, 2025 at 07:40 UTC - **Reserved Date**: March 06, 2024 at 09:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: pmdomain: mediatek: fix race conditions with genpd If the power domains are registered first with genpd and *after that* the driver attempts to power them on in the probe sequence, then it is possible that a race condition occurs if genpd tries to power them on in the same time. The same is valid for powering them off before unregistering them from genpd. Attempt to fix race conditions by first removing the domains from genpd and *after that* powering down domains. Also first power up the domains and *after that* register them to genpd. ### Affected Products **Linux - Linux** Affected versions: - 59b644b01cf48d6042f3c5983d464921a4920845 (Status: affected) - 59b644b01cf48d6042f3c5983d464921a4920845 (Status: affected) - 59b644b01cf48d6042f3c5983d464921a4920845 (Status: affected) - 59b644b01cf48d6042f3c5983d464921a4920845 (Status: affected) - 59b644b01cf48d6042f3c5983d464921a4920845 (Status: affected) **Linux - Linux** Affected versions: - 5.11 (Status: affected) - 0 (Status: unaffected) - 5.15.150 (Status: unaffected) - 6.1.80 (Status: unaffected) - 6.6.18 (Status: unaffected) - 6.7.6 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438) 2. [](https://git.kernel.org/stable/c/339ddc983bc1622341d95f244c361cda3da3a4ff) 3. [](https://git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25) 4. [](https://git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b) 5. [](https://git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5238 - **State**: PUBLISHED - **Published Date**: August 08, 2019 at 16:50 UTC - **Last Updated**: August 04, 2024 at 19:47 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei PCManager with the versions before 9.0.1.66 (Oversea) and versions before 9.0.1.70 (China) have a code execution vulnerability. Successful exploitation may cause the attacker to execute code and read/write information. ### Affected Products **Huawei - PCManager** Affected versions: - versions before PCManager 9.0.1.66 (Oversea) (Status: affected) - versions before PCManager 9.0.1.70 (China) (Status: affected) ### References 1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190710-01-pcmanager-en)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4306 - **State**: PUBLISHED - **Published Date**: August 23, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Sun Solaris 8 and 9 before 20060821 allows local users to execute arbitrary commands via unspecified vectors, involving the default Role-Based Access Control (RBAC) settings in the "File System Management" profile. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016726](http://securitytracker.com/id?1016726) 2. [21581](http://secunia.com/advisories/21581) 3. [19643](http://www.securityfocus.com/bid/19643) 4. [solaris-rbac-privilege-escalation(28551)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28551) 5. [](http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm) 6. [oval:org.mitre.oval:def:1527](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1527) 7. [ADV-2006-3355](http://www.vupen.com/english/advisories/2006/3355) 8. [22295](http://secunia.com/advisories/22295) 9. [102514](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102514-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0629 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 16:52 UTC - **Last Updated**: August 01, 2024 at 18:11 UTC - **Reserved Date**: January 16, 2024 at 21:21 UTC - **Assigned By**: Wordfence ### Vulnerability Description The 2Checkout Payment Gateway for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sniff_ins function in all versions up to, and including, 6.2. This makes it possible for unauthenticated attackers to make changes to orders and mark them as paid. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **nmedia - 2Checkout Payment Gateway for WooCommerce** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/bcc6a4a5-b133-4ee1-a345-a7c812624b03?source=cve) 2. [](https://wordpress.org/plugins/woocommerce-2checkout-payment/) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16742 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:50 UTC - **Last Updated**: December 20, 2021 at 22:50 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15955, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15955 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15955 - **State**: PUBLISHED - **Published Date**: October 12, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected) ### References 1. [1041809](http://www.securitytracker.com/id/1041809) 2. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html) 3. [105432](http://www.securityfocus.com/bid/105432) 4. [](https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36405, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36405 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36405 - **State**: PUBLISHED - **Published Date**: August 23, 2022 at 15:48 UTC - **Last Updated**: February 20, 2025 at 20:10 UTC - **Reserved Date**: August 09, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in amCharts: Charts and Maps plugin <= 1.4 at WordPress. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **amCharts - amCharts: Charts and Maps (WordPress plugin)** Affected versions: - <= 1.4 (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/amcharts-charts-and-maps/wordpress-amcharts-charts-and-maps-plugin-1-4-authenticated-stored-cross-site-scripting-xss-vulnerability) 2. [](https://wordpress.org/plugins/amcharts-charts-and-maps/#developers) ### Credits - Vulnerability discovered by Ngo Van Thien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24362 - **State**: PUBLISHED - **Published Date**: August 16, 2021 at 10:48 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Photo Gallery by 10Web – Mobile-Friendly Image Gallery** Affected versions: - 1.5.75 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a) ### Credits - avolume
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51609 - **State**: PUBLISHED - **Published Date**: November 09, 2024 at 14:13 UTC - **Last Updated**: November 09, 2024 at 15:15 UTC - **Reserved Date**: October 30, 2024 at 15:04 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elsner Technologies Pvt. Ltd. Emoji Shortcode allows Stored XSS.This issue affects Emoji Shortcode: from n/a through 1.0.0. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Elsner Technologies Pvt. Ltd. - Emoji Shortcode** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/emoji-shortcode/wordpress-emoji-shortcode-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4193 - **State**: PUBLISHED - **Published Date**: October 12, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: August 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.mozilla.org/security/announce/2012/mfsa2012-89.html) 2. [50904](http://secunia.com/advisories/50904) 3. [50984](http://secunia.com/advisories/50984) 4. [oval:org.mitre.oval:def:16786](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16786) 5. [RHSA-2012:1361](http://rhn.redhat.com/errata/RHSA-2012-1361.html) 6. [50907](http://secunia.com/advisories/50907) 7. [RHSA-2012:1362](http://rhn.redhat.com/errata/RHSA-2012-1362.html) 8. [55318](http://secunia.com/advisories/55318) 9. [mozilla-location-security-bypass(79211)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79211) 10. [SUSE-SU-2012:1351](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html) 11. [50964](http://secunia.com/advisories/50964) 12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=720619) 13. [50906](http://secunia.com/advisories/50906) 14. [USN-1611-1](http://www.ubuntu.com/usn/USN-1611-1)