System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24984
- **State**: PUBLISHED
- **Published Date**: February 16, 2022 at 21:05 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 13, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://JQueryForm.com)
2. [](https://www.nou-systems.com/cyber-security)
3. [](https://gist.github.com/pb-nsi/4d0a1ede76d4e97083b3435f820bf560) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3746
- **State**: PUBLISHED
- **Published Date**: September 23, 2011 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 20:21 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jcow 4.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/default/page.tpl.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
2. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/jcow.4.2.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1323
- **State**: REJECTED
- **Published Date**: October 30, 2007 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 20:32 UTC
- **Reserved Date**: March 07, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16794
- **State**: REJECTED
- **Last Updated**: December 02, 2022 at 00:00 UTC
- **Reserved Date**: September 24, 2019 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4243
- **State**: PUBLISHED
- **Published Date**: November 06, 2019 at 02:43 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 21, 2006 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.
### Affected Products
**linux-2.6 - linux-2.6**
Affected versions:
- 2.6 before 2.6.17 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2006-4243) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52700
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:22 UTC
- **Last Updated**: May 04, 2025 at 07:41 UTC
- **Reserved Date**: March 07, 2024 at 14:49 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix kernel warning when sending SYN message
When sending a SYN message, this kernel stack trace is observed:
...
[ 13.396352] RIP: 0010:_copy_from_iter+0xb4/0x550
...
[ 13.398494] Call Trace:
[ 13.398630] <TASK>
[ 13.398630] ? __alloc_skb+0xed/0x1a0
[ 13.398630] tipc_msg_build+0x12c/0x670 [tipc]
[ 13.398630] ? shmem_add_to_page_cache.isra.71+0x151/0x290
[ 13.398630] __tipc_sendmsg+0x2d1/0x710 [tipc]
[ 13.398630] ? tipc_connect+0x1d9/0x230 [tipc]
[ 13.398630] ? __local_bh_enable_ip+0x37/0x80
[ 13.398630] tipc_connect+0x1d9/0x230 [tipc]
[ 13.398630] ? __sys_connect+0x9f/0xd0
[ 13.398630] __sys_connect+0x9f/0xd0
[ 13.398630] ? preempt_count_add+0x4d/0xa0
[ 13.398630] ? fpregs_assert_state_consistent+0x22/0x50
[ 13.398630] __x64_sys_connect+0x16/0x20
[ 13.398630] do_syscall_64+0x42/0x90
[ 13.398630] entry_SYSCALL_64_after_hwframe+0x63/0xcd
It is because commit a41dad905e5a ("iov_iter: saner checks for attempt
to copy to/from iterator") has introduced sanity check for copying
from/to iov iterator. Lacking of copy direction from the iterator
viewpoint would lead to kernel stack trace like above.
This commit fixes this issue by initializing the iov iterator with
the correct copy direction when sending SYN or ACK without data.
### Affected Products
**Linux - Linux**
Affected versions:
- f25dcc7687d42a72de18aa41b04990a24c9e77c7 (Status: affected)
- f25dcc7687d42a72de18aa41b04990a24c9e77c7 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.0 (Status: affected)
- 0 (Status: unaffected)
- 6.1.13 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/54b6082aec178f16ad6d193b4ecdc9c4823d9a32)
2. [](https://git.kernel.org/stable/c/11a4d6f67cf55883dc78e31c247d1903ed7feccc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5094
- **State**: PUBLISHED
- **Published Date**: May 18, 2024 at 20:00 UTC
- **Last Updated**: August 01, 2024 at 21:03 UTC
- **Reserved Date**: May 18, 2024 at 04:59 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This issue affects some unknown processing of the file view_payment.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265073 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Best House Rental Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-265073 | SourceCodester Best House Rental Management System view_payment.php sql injection](https://vuldb.com/?id.265073)
2. [VDB-265073 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.265073)
3. [Submit #335714 | SourceCodester House Rental Management System Latest SQL Injection](https://vuldb.com/?submit.335714)
4. [](https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md)
### Credits
- Burak (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24227
- **State**: PUBLISHED
- **Published Date**: April 12, 2021 at 14:05 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Unknown - Patreon WordPress**
Affected versions:
- 1.7.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016)
2. [](https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/)
### Credits
- George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15810
- **State**: PUBLISHED
- **Published Date**: August 27, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Visiology Flipbox Software Suite before 2.7.0 allows directory traversal via %5c%2e%2e%2f because it does not sanitize filename parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/nenf/7ed2d800ca8d1538cf6bb0a771dc7dae)
2. [](http://flipbox.net/news/620/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3586
- **State**: PUBLISHED
- **Published Date**: August 08, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 13, 2006 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
SQL injection vulnerability in Jetbox CMS 2.1 SR1 allows remote attackers to execute arbitrary SQL commands via the (1) frontsession COOKIE parameter and (2) view parameter in index.php, and the (3) login parameter in admin/cms/index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [jetboxcms-index-sql-injection(28168)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28168)
2. [19303](http://www.securityfocus.com/bid/19303)
3. [20060802 Secunia Research: Jetbox Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/441980/100/0/threaded)
4. [1339](http://securityreason.com/securityalert/1339)
5. [](http://secunia.com/secunia_research/2006-57/advisory/)
6. [20889](http://secunia.com/advisories/20889) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53771
- **State**: PUBLISHED
- **Published Date**: November 30, 2024 at 21:25 UTC
- **Last Updated**: December 01, 2024 at 23:07 UTC
- **Reserved Date**: November 22, 2024 at 13:52 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sergio Micó SimpleSchema allows DOM-Based XSS.This issue affects SimpleSchema: from n/a through 1.7.6.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Sergio Micó - SimpleSchema**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simpleschema-free/vulnerability/wordpress-simpleschema-plugin-1-7-6-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0897, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0897 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0897
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 16, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LocalWEB2000 2.1.0 web server allows remote attackers to bypass access restrictions for restricted files via a URL that contains the "/./" directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4820](http://www.securityfocus.com/bid/4820)
2. [localweb2k-protection-bypass(9165)](http://www.iss.net/security_center/static/9165.php)
3. [20020524 [SecurityOffice] LocalWeb2000 Web Server Protected File Access Vulnerability](http://online.securityfocus.com/archive/1/274020)
4. [20020524 [SecurityOffice] LocalWeb2000 Web Server Protected File Access Vulnerability](http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0079.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31285
- **State**: PUBLISHED
- **Published Date**: June 10, 2022 at 17:21 UTC
- **Last Updated**: August 03, 2024 at 07:11 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Bento4 1.2. The allocator is out of memory in /Source/C++/Core/Ap4Array.h.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/702) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3713, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3713 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3713
- **State**: PUBLISHED
- **Published Date**: September 20, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 20:13 UTC
- **Reserved Date**: June 19, 2012 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple Safari before 6.0.1 does not properly handle the Quarantine attribute of HTML documents, which allows user-assisted remote attackers to read arbitrary files by leveraging the presence of a downloaded document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2012-09-19-3](http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html)
2. [85652](http://osvdb.org/85652)
3. [55624](http://www.securityfocus.com/bid/55624)
4. [](http://support.apple.com/kb/HT5502)
5. [apple-safari-cve20123713(78679)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2220
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2751
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 01, 2024 at 19:25 UTC
- **Reserved Date**: March 20, 2024 at 20:22 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘exad_infobox_animating_mask_style’ parameter in all versions up to, and including, 2.6.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**timstrifler - Exclusive Addons for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ad2dff-0c6d-4d91-a35d-803b97def01f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3065677%40exclusive-addons-for-elementor%2Ftrunk&old=3051927%40exclusive-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=#file51)
### Credits
- Son Tran |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6673, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6673 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6673
- **State**: PUBLISHED
- **Published Date**: December 11, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:46 UTC
- **Reserved Date**: November 05, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64213](http://www.securityfocus.com/bid/64213)
2. [openSUSE-SU-2013:1958](http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html)
3. [SUSE-SU-2013:1919](http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html)
4. [openSUSE-SU-2013:1957](http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html)
5. [FEDORA-2013-23127](http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html)
6. [FEDORA-2013-23519](http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html)
7. [1029470](http://www.securitytracker.com/id/1029470)
8. [openSUSE-SU-2013:1917](http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html)
9. [openSUSE-SU-2013:1959](http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html)
10. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
12. [openSUSE-SU-2013:1916](http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html)
13. [openSUSE-SU-2014:0008](http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html)
14. [1029476](http://www.securitytracker.com/id/1029476)
15. [openSUSE-SU-2013:1918](http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html)
16. [FEDORA-2013-23291](http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html)
17. [USN-2052-1](http://www.ubuntu.com/usn/USN-2052-1)
18. [](https://bugzilla.mozilla.org/show_bug.cgi?id=917380)
19. [](http://www.mozilla.org/security/announce/2013/mfsa2013-113.html)
20. [USN-2053-1](http://www.ubuntu.com/usn/USN-2053-1)
21. [FEDORA-2013-23295](http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7340
- **State**: PUBLISHED
- **Published Date**: February 04, 2019 at 19:00 UTC
- **Last Updated**: September 17, 2024 at 02:41 UTC
- **Reserved Date**: February 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZoneMinder/zoneminder/issues/2462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1785, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1785 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1785
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 17:23 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Zeus Administration Server in Zeus Web Server 4.0 through 4.1r2 allows remote authenticated users to inject arbitrary web script or HTML via the section parameter to index.fcgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [zeus-admin-index-xss(10567)](http://www.iss.net/security_center/static/10567.php)
2. [20021108 Zeus Admin Server v4.1r2 index.fcgi XSS bug](http://archives.neohapsis.com/archives/bugtraq/2002-11/0104.html)
3. [20021211 Re: Zeus Admin Server v4.1r2 index.fcgi XSS bug](http://online.securityfocus.com/archive/1/302961)
4. [6144](http://www.securityfocus.com/bid/6144) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-21574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-21574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-21574
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 17:45 UTC
- **Last Updated**: August 04, 2024 at 14:30 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow vulnerability in YotsuyaNight c-http v0.1.0, allows attackers to cause a denial of service via a long url request which is passed to the delimitedread function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/YotsuyaNight/c-http/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33213
- **State**: PUBLISHED
- **Published Date**: June 19, 2023 at 12:42 UTC
- **Last Updated**: October 10, 2024 at 18:55 UTC
- **Reserved Date**: May 18, 2023 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in gVectors Display Custom Fields – wpView plugin <= 1.3.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**gVectors - Display Custom Fields – wpView**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wpview/wordpress-wpview-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Bae Song Hyun (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3843
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 07:46 UTC
- **Last Updated**: February 13, 2025 at 17:53 UTC
- **Reserved Date**: April 15, 2024 at 17:25 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 124.0.6367.60 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html)
2. [](https://issues.chromium.org/issues/41486690)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/)
6. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/)
7. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/)
8. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2801, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2801 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2801
- **State**: PUBLISHED
- **Published Date**: September 10, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and "out of array writes."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?](http://www.openwall.com/lists/oss-security/2012/09/02/4)
2. [](http://libav.org/releases/libav-0.8.5.changelog)
3. [](http://libav.org/releases/libav-0.8.4.changelog)
4. [55355](http://www.securityfocus.com/bid/55355)
5. [MDVSA-2013:079](http://www.mandriva.com/security/advisories?name=MDVSA-2013:079)
6. [[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?](http://www.openwall.com/lists/oss-security/2012/08/31/3)
7. [](http://ffmpeg.org/security.html)
8. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e)
9. [](http://libav.org/releases/libav-0.7.7.changelog)
10. [USN-1705-1](http://www.ubuntu.com/usn/USN-1705-1)
11. [50468](http://secunia.com/advisories/50468)
12. [51257](http://secunia.com/advisories/51257) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45734
- **State**: PUBLISHED
- **Published Date**: February 04, 2022 at 01:33 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setUrlFilterRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via the url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_10/10.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0552
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15928
- **State**: PUBLISHED
- **Published Date**: November 24, 2020 at 01:41 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters to test-browser/index.cfm allow directory traversal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/49078) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4470
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38204
- **State**: PUBLISHED
- **Published Date**: August 08, 2021 at 19:25 UTC
- **Last Updated**: August 04, 2024 at 01:37 UTC
- **Reserved Date**: August 08, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b)
2. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6)
3. [[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update](https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2413, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2413
- **State**: REJECTED
- **Published Date**: March 05, 2018 at 16:00 UTC
- **Last Updated**: March 05, 2018 at 15:57 UTC
- **Reserved Date**: July 09, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7297, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7297
- **State**: PUBLISHED
- **Published Date**: September 15, 2020 at 23:15 UTC
- **Last Updated**: August 04, 2024 at 09:25 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to access protected dashboard data via improper access control in the user interface.
### CVSS Metrics
- **CVSS Base Score**: 5.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**McAfee - McAfee Web Gateway (MWG)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10323) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14702
- **State**: PUBLISHED
- **Published Date**: December 03, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: July 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Incorrect access control in the /drobopix/api/drobo.php endpoint in Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to retrieve sensitive system information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-23549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-23549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23549
- **State**: PUBLISHED
- **Published Date**: October 28, 2021 at 21:09 UTC
- **Last Updated**: August 04, 2024 at 14:58 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, related to a "Data from Faulting Address controls Branch Selection starting at FORMATS!GetPlugInInfo+0x00000000000047f6".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.irfanview.com/plugins.htm)
2. [](https://github.com/nhiephon/Research/blob/master/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1010095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1010095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010095
- **State**: PUBLISHED
- **Published Date**: July 18, 2019 at 12:36 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
DomainMOD v4.10.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: There is a CSRF vulnerability that can add the administrator account. The component is: admin/users/add.php. The attack vector is: After the administrator logged in, open the html page.
### Affected Products
**DomainMOD - DomainMOD**
Affected versions:
- v4.10.0 (Status: affected)
### References
1. [](https://github.com/domainmod/domainmod/issues/65) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9175
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 18:24 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, lack of input validation could lead to an untrusted pointer dereference in wv_dash_core_generic_verify().
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000177
- **State**: REJECTED
- **Published Date**: August 20, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 18:56 UTC
- **Reserved Date**: August 20, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36011
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 18:10 UTC
- **Last Updated**: May 22, 2025 at 18:43 UTC
- **Reserved Date**: June 20, 2023 at 20:44 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Win32k Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-822: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Win32k Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36011) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5750, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5750 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5750
- **State**: PUBLISHED
- **Published Date**: May 07, 2020 at 16:16 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Insufficient output sanitization in TCExam 14.2.2 allows a remote, unauthenticated attacker to conduct persistent cross-site scripting (XSS) attacks via the self-registration feature.
### Affected Products
**n/a - TCExam**
Affected versions:
- 14.2.2 (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2020-31) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1672
- **State**: PUBLISHED
- **Published Date**: January 04, 2018 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 02:27 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Tivoli Key Lifecycle Manager 2.6 and 2.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 133639.
### Affected Products
**IBM - Security Key Lifecycle Manager**
Affected versions:
- 2.6 (Status: affected)
- 2.7 (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/133639)
2. [](http://www.ibm.com/support/docview.wss?uid=swg22012019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0630
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 13:17 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In wifi driver, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05551397; Issue ID: ALPS05551397.
### Affected Products
**n/a - MT6761, MT6762, MT6765, MT6768, MT6779, MT6785, MT6833, MT6853, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8735A, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 8.1, 9.0, 10.0, 11.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/October-2021) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4712
- **State**: PUBLISHED
- **Published Date**: September 25, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 00:39 UTC
- **Reserved Date**: May 11, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
CoreCrypto in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207141)
2. [1036858](http://www.securitytracker.com/id/1036858)
3. [APPLE-SA-2016-09-20](http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html)
4. [APPLE-SA-2016-09-20-3](http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html)
5. [APPLE-SA-2016-09-20-5](http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html)
6. [APPLE-SA-2016-09-20-6](http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html)
7. [93054](http://www.securityfocus.com/bid/93054)
8. [](https://support.apple.com/HT207170)
9. [](https://support.apple.com/HT207142)
10. [](https://support.apple.com/HT207143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2771
- **State**: PUBLISHED
- **Published Date**: June 18, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 18, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Node Hierarchy module 5.x before 5.x-1.1 and 6.x before 6.x-1.0 for Drupal does not properly implement access checks, which allows remote attackers with "access content" permissions to bypass restrictions and modify the node hierarchy via unspecified attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30622](http://secunia.com/advisories/30622)
2. [node-hierarchy-access-security-bypass(43006)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43006)
3. [](http://drupal.org/node/269473)
4. [29675](http://www.securityfocus.com/bid/29675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37060
- **State**: PUBLISHED
- **Published Date**: June 04, 2024 at 12:02 UTC
- **Last Updated**: August 02, 2024 at 03:43 UTC
- **Reserved Date**: May 31, 2024 at 14:16 UTC
- **Assigned By**: HiddenLayer
### Vulnerability Description
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user’s system when run.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**MLflow - MLflow**
Affected versions:
- 1.27.0 (Status: affected)
### References
1. [](https://hiddenlayer.com/sai-security-advisory/mlflow-june2024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4995, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4995 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4995
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9217
- **State**: PUBLISHED
- **Published Date**: December 08, 2014 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 02, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Graylog2 before 0.92 allows remote attackers to bypass LDAP authentication via crafted wildcards.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [graylog-cve20149217-ldap-injection(99571)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99571)
2. [](http://www.graylog2.org/news/post/0010-graylog2-v0-92)
3. [[oss-security] 20141222 Graylog2-Web LDAP Injection - CVE-2014-9217](http://seclists.org/oss-sec/2014/q4/1130) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32798, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32798 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32798
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 12:51 UTC
- **Last Updated**: August 02, 2024 at 02:20 UTC
- **Reserved Date**: April 18, 2024 at 10:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.8.0.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WP Travel Engine - WP Travel Engine**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-travel-engine/wordpress-wp-travel-engine-plugin-5-8-0-price-manipulation-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7089, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7089 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7089
- **State**: PUBLISHED
- **Published Date**: August 26, 2009 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: August 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Pligg 9.9 and earlier allows remote attackers to inject arbitrary web script or HTML via the keyword parameter in a search action to user.php and other unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.gulftech.org/?node=research&article_id=00120-07312008)
2. [pligg-user-xss(44187)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44187)
3. [20080730 Pligg <= 9.9.0 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/494987/100/0/threaded)
4. [30458](http://www.securityfocus.com/bid/30458)
5. [50186](http://www.osvdb.org/50186)
6. [6173](https://www.exploit-db.com/exploits/6173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11500
- **State**: PUBLISHED
- **Published Date**: May 26, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 08:10 UTC
- **Reserved Date**: May 26, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sanluan/PublicCMS/issues/11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2095, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2095 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2095
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 15:15 UTC
- **Last Updated**: August 04, 2024 at 06:54 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
### Affected Products
**Jenkins project - Jenkins Redgate SQL Change Automation Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1696) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32850
- **State**: REJECTED
- **Last Updated**: May 08, 2023 at 00:00 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1041
- **State**: PUBLISHED
- **Published Date**: March 07, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:56 UTC
- **Reserved Date**: March 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Gregarius 0.5.2 allow remote attackers to inject arbitrary web script or HTML via the (1) rss_query parameter to search.php or (2) tag parameter to tags.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [16939](http://www.securityfocus.com/bid/16939)
2. [23679](http://www.osvdb.org/23679)
3. [20060303 Gregarius 0.5.2 XSS and SQL Injection Vulnerabilities](http://www.securityfocus.com/archive/1/426656/100/0/threaded)
4. [gregarius-multiple-xss(25058)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25058)
5. [ADV-2006-0819](http://www.vupen.com/english/advisories/2006/0819)
6. [23678](http://www.osvdb.org/23678)
7. [19102](http://secunia.com/advisories/19102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-10066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-10066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-10066
- **State**: PUBLISHED
- **Published Date**: May 31, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 16:48 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Versions less than 0.1.4 of the static file server module fancy-server are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - fancy-server node module**
Affected versions:
- <0.1.4 (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4121
- **State**: PUBLISHED
- **Published Date**: August 01, 2007 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 01, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in admin.aspx in E-Commerce Scripts Shopping Cart Script, Multi-Vendor E-Shop Script, and Auction Script allow remote attackers to execute arbitrary SQL commands via the (1) EmailAdd (Username) and (2) Pass (password) parameters. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ecommerce-admin-sql-injection(35680)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35680)
2. [](http://outlaw.aria-security.info/?p=11)
3. [20070728 E-commerceScripts ALL Apps (Auction Script, Shopping Cart Script and Multi-Vendor E-Shop Script) admin.aspx SQL](http://www.securityfocus.com/archive/1/475062/100/0/threaded)
4. [2944](http://securityreason.com/securityalert/2944)
5. [25125](http://www.securityfocus.com/bid/25125)
6. [26277](http://secunia.com/advisories/26277) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13405
- **State**: PUBLISHED
- **Published Date**: July 16, 2020 at 18:23 UTC
- **Last Updated**: August 04, 2024 at 12:18 UTC
- **Reserved Date**: May 22, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/microweber/microweber/commit/269320e0e0e06a1785e1a1556da769a34280b7e6)
2. [](https://rhinosecuritylabs.com/research/microweber-database-disclosure/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3863
- **State**: PUBLISHED
- **Published Date**: October 23, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 09:53 UTC
- **Reserved Date**: August 29, 2008 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-2891](http://www.vupen.com/english/advisories/2008/2891)
2. [32137](http://secunia.com/advisories/32137)
3. [gnuenscript-readspecialescape-bo(46026)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46026)
4. [31858](http://www.securityfocus.com/bid/31858)
5. [32521](http://secunia.com/advisories/32521)
6. [](http://support.apple.com/kb/HT3549)
7. [SUSE-SR:2008:024](http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html)
8. [FEDORA-2008-9372](https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html)
9. [oval:org.mitre.oval:def:9939](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9939)
10. [FEDORA-2008-9351](https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html)
11. [RHSA-2008:1016](http://www.redhat.com/support/errata/RHSA-2008-1016.html)
12. [](http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm)
13. [USN-660-1](http://www.ubuntu.com/usn/usn-660-1)
14. [35074](http://secunia.com/advisories/35074)
15. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0321)
16. [4488](http://securityreason.com/securityalert/4488)
17. [APPLE-SA-2009-05-12](http://lists.apple.com/archives/security-announce/2009/May/msg00002.html)
18. [GLSA-200812-02](http://security.gentoo.org/glsa/glsa-200812-02.xml)
19. [20081022 Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow](http://www.securityfocus.com/archive/1/497647/100/0/threaded)
20. [20081117 rPSA-2008-0321-1 enscript](http://www.securityfocus.com/archive/1/498385/100/0/threaded)
21. [](https://issues.rpath.com/browse/RPL-2887)
22. [32854](http://secunia.com/advisories/32854)
23. [MDVSA-2008:243](http://www.mandriva.com/security/advisories?name=MDVSA-2008:243)
24. [32970](http://secunia.com/advisories/32970)
25. [32530](http://secunia.com/advisories/32530)
26. [DSA-1670](http://www.debian.org/security/2008/dsa-1670)
27. [TA09-133A](http://www.us-cert.gov/cas/techalerts/TA09-133A.html)
28. [ADV-2009-1297](http://www.vupen.com/english/advisories/2009/1297)
29. [](http://secunia.com/secunia_research/2008-41/)
30. [32753](http://secunia.com/advisories/32753)
31. [33109](http://secunia.com/advisories/33109)
32. [RHSA-2008:1021](http://rhn.redhat.com/errata/RHSA-2008-1021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-33742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-33742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-33742
- **State**: PUBLISHED
- **Published Date**: July 05, 2022 at 12:50 UTC
- **Last Updated**: August 03, 2024 at 08:09 UTC
- **Reserved Date**: June 15, 2022 at 00:00 UTC
- **Assigned By**: XEN
### Vulnerability Description
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
### Affected Products
**Linux - Linux**
Affected versions:
- consult Xen advisory XSA-403 (Status: unknown)
**Xen - xen**
Affected versions:
- consult Xen advisory XSA-403 (Status: unknown)
### References
1. [](https://xenbits.xenproject.org/xsa/advisory-403.txt)
2. [](http://xenbits.xen.org/xsa/advisory-403.html)
3. [[oss-security] 20220705 Xen Security Advisory 403 v3 (CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742) - Linux disk/nic frontends data leaks](http://www.openwall.com/lists/oss-security/2022/07/05/6)
4. [FEDORA-2022-c4ec706488](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/)
5. [FEDORA-2022-2c9f8224f8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/)
6. [DSA-5191](https://www.debian.org/security/2022/dsa-5191)
7. [[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html)
### Credits
- {'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'The issue related to not zeroing memory areas used for shared communications\nwas discovered by Roger Pau Monné of Citrix.\n\nThe issue related to leaking contiguous data in granted pages was disclosed\npublicly.'}]}}} |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27859
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 19:35 UTC
- **Last Updated**: August 04, 2024 at 16:25 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the GetEuaLogDownloadAction class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-9607.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**NEC - ESMPRO Manager**
Affected versions:
- 6.42 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-736/)
### Credits
- rgod |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0296, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0296 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0296
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 04:00 UTC
- **Last Updated**: April 17, 2025 at 18:11 UTC
- **Reserved Date**: January 07, 2024 at 09:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249862 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Totolink - N200RE**
Affected versions:
- 9.3.5u.6139_B20201216 (Status: affected)
### References
1. [](https://vuldb.com/?id.249862)
2. [](https://vuldb.com/?ctiid.249862)
3. [](https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N200RE/NTPSyncWithHost/README.md)
### Credits
- jylsec (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5687
- **State**: PUBLISHED
- **Published Date**: August 06, 2019 at 19:49 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which an incorrect use of default permissions for an object exposes it to an unintended actor
### Affected Products
**NVIDIA - GPU Display Driver**
Affected versions:
- All (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/4841)
2. [](https://support.lenovo.com/us/en/product_security/LEN-28096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21025, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21025 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21025
- **State**: PUBLISHED
- **Published Date**: February 11, 2021 at 19:29 UTC
- **Last Updated**: September 16, 2024 at 18:44 UTC
- **Reserved Date**: December 18, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the product layout updates. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
### Weakness Classification (CWE)
- CWE-91: Security Weakness
### Affected Products
**Adobe - Magento Commerce**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb21-08.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25864
- **State**: PUBLISHED
- **Published Date**: April 20, 2021 at 13:07 UTC
- **Last Updated**: August 04, 2024 at 15:49 UTC
- **Reserved Date**: September 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.hashicorp.com/blog/category/consul)
2. [](https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368)
3. [GLSA-202208-09](https://security.gentoo.org/glsa/202208-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14253, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14253
- **State**: PUBLISHED
- **Published Date**: September 18, 2019 at 15:37 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in servletcontroller in the secure portal in Publisure 2.1.2. One can bypass authentication and perform a query on PHP forms within the /AdminDir folder that should be restricted.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6784
- **State**: PUBLISHED
- **Published Date**: December 28, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 20:42 UTC
- **Reserved Date**: December 27, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Netbula Anyboard allows remote attackers to execute arbitrary SQL commands via the user name in the login form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21734](http://www.securityfocus.com/bid/21734)
2. [2063](http://securityreason.com/securityalert/2063)
3. [20061225 Forum AnyBoard - Sql Inyection By Firewall](http://www.securityfocus.com/archive/1/455263/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23018, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23018 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23018
- **State**: PUBLISHED
- **Published Date**: June 01, 2021 at 11:51 UTC
- **Last Updated**: August 03, 2024 at 18:58 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster.
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**n/a - Nginx Controller**
Affected versions:
- "3.x before 3.4.0" (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K97002210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56573
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 14:23 UTC
- **Last Updated**: May 04, 2025 at 09:58 UTC
- **Reserved Date**: December 27, 2024 at 14:03 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
efi/libstub: Free correct pointer on failure
cmdline_ptr is an out parameter, which is not allocated by the function
itself, and likely points into the caller's stack.
cmdline refers to the pool allocation that should be freed when cleaning
up after a failure, so pass this instead to free_pool().
### Affected Products
**Linux - Linux**
Affected versions:
- 42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9 (Status: affected)
- 42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9 (Status: affected)
- 42c8ea3dca094ab82776ca706fb7a9cbe8ac3dc9 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.2 (Status: affected)
- 0 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.12.4 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/d173aee5709bd0994d216d60589ec67f8b11376a)
2. [](https://git.kernel.org/stable/c/eaafbcf0a5782ae412ca7de12ef83fc48ccea4cf)
3. [](https://git.kernel.org/stable/c/06d39d79cbd5a91a33707951ebf2512d0e759847) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6389
- **State**: PUBLISHED
- **Published Date**: December 07, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 17:39 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.24 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20131122 SA-CORE-2013-003 - Drupal core - Multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2013/11/22/4)
2. [](https://drupal.org/SA-CORE-2013-003)
3. [DSA-2804](http://www.debian.org/security/2013/dsa-2804) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7553, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7553 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7553
- **State**: PUBLISHED
- **Published Date**: August 07, 2024 at 09:57 UTC
- **Last Updated**: August 07, 2024 at 15:27 UTC
- **Reserved Date**: August 06, 2024 at 08:34 UTC
- **Assigned By**: mongodb
### Vulnerability Description
Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.
Required Configuration:
Only environments with Windows as the underlying operating system is affected by this issue
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**MongoDB Inc - MongoDB Server**
Affected versions:
- 5.0 (Status: affected)
- 6.0 (Status: affected)
- 7.0 (Status: affected)
- 7.3 (Status: affected)
**MongoDB Inc - MongoDB C Driver**
Affected versions:
- 0 (Status: affected)
**MongoDB Inc - MongoDB PHP Driver**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://jira.mongodb.org/browse/PHPC-2369)
2. [](https://jira.mongodb.org/browse/SERVER-93211)
3. [](https://jira.mongodb.org/browse/CDRIVER-5650)
### Credits
- T. Doğa Gelişli |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3471
- **State**: PUBLISHED
- **Published Date**: August 29, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:07 UTC
- **Reserved Date**: May 06, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The captive portal application in Cisco Identity Services Engine (ISE) allows remote attackers to discover cleartext usernames and passwords by leveraging unspecified use of hidden form fields in an HTML document, aka Bug ID CSCug02515.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130828 Cisco ISE Captive Portal Application Plaintext Credentials Exposure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3471)
2. [1028965](http://www.securitytracker.com/id/1028965)
3. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=30524) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2142
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 18:05 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112768568
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6511, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6511 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6511
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 21:28 UTC
- **Reserved Date**: January 23, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in organizer/page/users.php in the Organizer plugin 1.2.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) delete_id parameter or (2) extension parameter in an "Update Setting" action to wp-admin/admin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [wordpress-organizer-admin-xss(75105)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75105)
2. [](http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html)
3. [wporganizer-admin-xss(75106)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75106)
4. [](http://websecurity.com.ua/5782) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7022
- **State**: REJECTED
- **Published Date**: January 17, 2019 at 17:00 UTC
- **Last Updated**: January 17, 2019 at 16:57 UTC
- **Reserved Date**: February 14, 2018 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5800
- **State**: PUBLISHED
- **Published Date**: March 21, 2019 at 13:56 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 23, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A malicious attacker can trigger a remote buffer overflow in the Communication Server in Fatek Automation PM Designer V3 Version 2.1.2.2, and Automation FV Designer Version 1.2.8.0.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Fatek - Automation PM Designer V3**
Affected versions:
- 2.1.2.2 (Status: affected)
**Fatek - Automation FV Designer**
Affected versions:
- 1.2.8.0 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-287-06) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11438, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11438
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 19:34 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibreHealth EMR v2.0.0 is affected by systemic CSRF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://know.bishopfox.com/advisories)
2. [](https://librehealth.io/)
3. [](https://labs.bishopfox.com/advisories/librehealth-version-2.0.0-0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4842, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4842
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 18:05 UTC
- **Last Updated**: September 16, 2024 at 20:58 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Secret Server 10.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190046.
### Affected Products
**IBM - Security Secret Server**
Affected versions:
- 10.6 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6336251)
2. [ibm-sss-cve20204842-info-disc (190046)](https://exchange.xforce.ibmcloud.com/vulnerabilities/190046) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4579
- **State**: PUBLISHED
- **Published Date**: August 20, 2012 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 01:30 UTC
- **Reserved Date**: November 29, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The svq1_decode_frame function in the SVQ1 decoder (svq1dec.c) in libavcodec in FFmpeg 0.5.x before 0.5.7, 0.6.x before 0.6.4, 0.7.x before 0.7.9, and 0.8.x before 0.8.8; and in Libav 0.5.x before 0.5.6, 0.6.x before 0.6.4, and 0.7.x before 0.7.3 allows remote attackers to cause a denial of service (memory corruption) via a crafted SVQ1 stream, related to "dimensions changed."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.libav.org/?p=libav.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229)
2. [MDVSA-2012:076](http://www.mandriva.com/security/advisories?name=MDVSA-2012:076)
3. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=6e24b9488e67849a28e64a8056e05f83cf439229)
4. [USN-1320-1](http://ubuntu.com/usn/usn-1320-1)
5. [MDVSA-2012:074](http://www.mandriva.com/security/advisories?name=MDVSA-2012:074)
6. [MDVSA-2012:075](http://www.mandriva.com/security/advisories?name=MDVSA-2012:075)
7. [](http://ffmpeg.org/)
8. [](http://libav.org/)
9. [USN-1333-1](http://ubuntu.com/usn/usn-1333-1)
10. [20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution](http://www.securityfocus.com/archive/1/520620) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23473
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 12:43 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 17, 2024 at 16:07 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
The SolarWinds Access Rights Manager was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability allows access to the RabbitMQ management console.
We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**SolarWinds - Access Rights Manager**
Affected versions:
- previous versions (Status: affected)
### References
1. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23473)
2. [](https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-4_release_notes.htm)
### Credits
- Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1014
- **State**: PUBLISHED
- **Published Date**: April 08, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 08, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013637](http://securitytracker.com/id?1013637)
2. [mailenable-imap-dos(19947)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19947)
3. [20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]](http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html)
4. [](http://www.mailenable.com/hotfix/)
5. [12995](http://www.securityfocus.com/bid/12995)
6. [14812](http://secunia.com/advisories/14812) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1419
- **State**: PUBLISHED
- **Published Date**: June 11, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a certain window close action that occurs during a drag-and-drop operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [](http://support.apple.com/kb/HT4220)
3. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
4. [43068](http://secunia.com/advisories/43068)
5. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
6. [41856](http://secunia.com/advisories/41856)
7. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
8. [APPLE-SA-2010-06-07-1](http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html)
9. [40196](http://secunia.com/advisories/40196)
10. [40105](http://secunia.com/advisories/40105)
11. [ADV-2010-1373](http://www.vupen.com/english/advisories/2010/1373)
12. [APPLE-SA-2010-06-16-1](http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html)
13. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
14. [ADV-2010-1512](http://www.vupen.com/english/advisories/2010/1512)
15. [40620](http://www.securityfocus.com/bid/40620)
16. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
17. [oval:org.mitre.oval:def:7314](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7314)
18. [1024067](http://securitytracker.com/id?1024067)
19. [](http://support.apple.com/kb/HT4196) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2908
- **State**: PUBLISHED
- **Published Date**: April 25, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 18, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://ics-cert.us-cert.gov/advisories/ICSA-14-114-02)
2. [44687](https://www.exploit-db.com/exploits/44687/)
3. [](http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892012.pdf)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-892012.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41187
- **State**: PUBLISHED
- **Published Date**: October 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:35 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
Due to lack of proper memory management, when a victim opens a manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
### Weakness Classification (CWE)
- CWE-119: Security Weakness
- CWE-787: Out-of-bounds Write
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Viewer**
Affected versions:
- 9 (Status: affected)
### References
1. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
2. [](https://launchpad.support.sap.com/#/notes/3245928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47633
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:20 UTC
- **Last Updated**: May 08, 2025 at 15:14 UTC
- **Reserved Date**: May 07, 2025 at 10:44 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Awin Awin – Advertiser Tracking for WooCommerce allows Cross Site Request Forgery. This issue affects Awin – Advertiser Tracking for WooCommerce: from n/a through 2.0.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Awin - Awin – Advertiser Tracking for WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/awin-advertiser-tracking/vulnerability/wordpress-awin-advertiser-tracking-for-woocommerce-plugin-2-0-0-csrf-to-product-feed-regeneration-vulnerability?_s_id=cve)
### Credits
- ch4r0n (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1281
- **State**: PUBLISHED
- **Published Date**: July 13, 2011 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 04, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly restrict the number of console objects for a process, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP AllocConsole Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:12602](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12602)
2. [TA11-193A](http://www.us-cert.gov/cas/techalerts/TA11-193A.html)
3. [MS11-056](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-056) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22402
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 20:06 UTC
- **Reserved Date**: December 27, 2022 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Use After Free vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). In a Non Stop Routing (NSR) scenario, an unexpected kernel restart might be observed if "bgp auto-discovery" is enabled and if there is a BGP neighbor flap of auto-discovery sessions for any reason. This is a race condition which is outside of an attackers direct control and it depends on system internal timing whether this issue occurs. This issue affects Juniper Networks Junos OS Evolved: 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R2-EVO; 22.1 versions prior to 22.1R2-EVO; 22.2 versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 21.3 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA70198) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3029, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3029
- **State**: PUBLISHED
- **Published Date**: September 21, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:53 UTC
- **Reserved Date**: September 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in AhnLab V3Pro 2004 build 6.0.0.383, V3 VirusBlock 2005 build 6.0.0.383, and V3Net for Windows Server 6.0 build 6.0.0.383 allows remote attackers to execute arbitrary code via a long filname in an ACE archive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://secunia.com/secunia_research/2005-17/advisory/)
2. [20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=112680062609377&w=2)
3. [](http://info.ahnlab.com/english/advisory/01.html)
4. [14844](http://www.securityfocus.com/bid/14844)
5. [15674](http://secunia.com/advisories/15674/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3424
- **State**: PUBLISHED
- **Published Date**: September 16, 2010 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:55 UTC
- **Reserved Date**: September 16, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in admin/sources/classes/bbcode/custom/defaults.php in Invision Power Board (IP.Board) 3.1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://community.invisionpower.com/topic/320838-ipboard-31x-security-patch-released/)
2. [ADV-2010-2328](http://www.vupen.com/english/advisories/2010/2328)
3. [43053](http://www.securityfocus.com/bid/43053)
4. [41314](http://secunia.com/advisories/41314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0935
- **State**: PUBLISHED
- **Published Date**: June 04, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:34 UTC
- **Reserved Date**: January 06, 2014 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Unspecified vulnerability in IBM Smart Analytics System 7700 before FP 2.1.3.0 and 7710 before FP 2.1.3.0 allows local users to gain privileges via vectors related to events.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21672887)
2. [ibm-smartanalytics-cve20140935-priv-esc(92298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/92298) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29415
- **State**: PUBLISHED
- **Published Date**: May 21, 2021 at 11:29 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 29, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The elliptic curve cryptography (ECC) hardware accelerator, part of the ARM® TrustZone® CryptoCell 310, contained in the NordicSemiconductor nRF52840 through 2021-03-29 has a non-constant time ECDSA implemenation. This allows an adversary to recover the private ECC key used during an ECDSA operation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sit.fraunhofer.de/en/news-events/downloads-services/cve/)
2. [](https://eprint.iacr.org/2021/640)
3. [](https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4817
- **State**: PUBLISHED
- **Published Date**: October 03, 2023 at 15:03 UTC
- **Last Updated**: September 19, 2024 at 19:46 UTC
- **Reserved Date**: September 07, 2023 at 07:41 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**ICP DAS - ET-7060**
Affected versions:
- 3.00 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/unrestricted-file-upload-vulnerability-icp-das-et-7060)
### Credits
- Joel Serna Moreno |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5855
- **State**: PUBLISHED
- **Published Date**: September 18, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 07:06 UTC
- **Reserved Date**: August 06, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Apple iOS before 9 allows attackers to discover the e-mail address of a player via a crafted Game Center app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033609](http://www.securitytracker.com/id/1033609)
2. [](https://support.apple.com/HT205212)
3. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html)
4. [76764](http://www.securityfocus.com/bid/76764)
5. [](https://support.apple.com/HT205267)
6. [APPLE-SA-2015-09-16-1](http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46642
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 03:29 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the auto_upgrade_hour parameter in the SetAutoUpgradeInfo function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetAutoUpgradeInfo%20command%20injection%20vulnerability.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1977
- **State**: PUBLISHED
- **Published Date**: June 27, 2022 at 08:59 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: June 02, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Import Export All WordPress Images, Users & Post Types WordPress plugin before 6.5.3 does not fully validate the file to be imported via an URL before making an HTTP request to it, which could allow high privilege users such as admin to perform Blind SSRF attacks
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**Unknown - Import Export All WordPress Images, Users & Post Types**
Affected versions:
- 6.5.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d)
### Credits
- Luan Pedersini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42160
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 07:47 UTC
- **Last Updated**: May 04, 2025 at 09:24 UTC
- **Reserved Date**: July 29, 2024 at 15:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- It missed to check validation of fault attrs in parse_options(),
let's fix to add check condition in f2fs_build_fault_attr().
- Use f2fs_build_fault_attr() in __sbi_store() to clean up code.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.181 (Status: unaffected)
- 6.1.98 (Status: unaffected)
- 6.6.39 (Status: unaffected)
- 6.9.9 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6e5b601706ce05d94338cad598736d96bb8096c8)
2. [](https://git.kernel.org/stable/c/bc84dd2c33e0c10fd90d60f0cfc0bfb504d4692d)
3. [](https://git.kernel.org/stable/c/44958ca9e400f57bd0478115519ffc350fcee61e)
4. [](https://git.kernel.org/stable/c/ecb641f424d6d1f055d149a15b892edcc92c504b)
5. [](https://git.kernel.org/stable/c/4ed886b187f47447ad559619c48c086f432d2b77) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0665
- **State**: PUBLISHED
- **Published Date**: February 22, 2022 at 14:55 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 17, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Path Traversal in GitHub repository pimcore/pimcore prior to 10.3.2.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**pimcore - pimcore/pimcore**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3)
2. [](https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47950
- **State**: PUBLISHED
- **Published Date**: January 18, 2023 at 00:00 UTC
- **Last Updated**: April 04, 2025 at 15:48 UTC
- **Reserved Date**: December 24, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://launchpad.net/bugs/1998625)
2. [](https://security.openstack.org/ossa/OSSA-2023-001.html)
3. [[debian-lts-announce] 20230125 [SECURITY] [DLA 3281-1] swift security update](https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html)
4. [DSA-5327](https://www.debian.org/security/2023/dsa-5327) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4747
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Event Processing component in Oracle Fusion Middleware 11.1.1.7 and 12.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CEP system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5705
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 11:28 UTC
- **Last Updated**: February 05, 2025 at 18:57 UTC
- **Reserved Date**: October 22, 2023 at 17:38 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The VK Filter Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vk_filter_search' shortcode in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**vektor-inc - VK Filter Search**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/012946d4-82ce-48b9-9b9a-1fc49846dca6?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/vk-filter-search/tags/2.3.1/inc/filter-search/package/class-vk-filter-search-shortcode.php#L40)
3. [](https://plugins.trac.wordpress.org/changeset/2983339/vk-filter-search#file1)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26320
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 18:35 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/t0mer/broadlinkmanager-docker)
2. [](https://github.com/t0mer/broadlinkmanager-docker/blob/master/broadlinkmanager/broadlinkmanager.py#L639-L657)
3. [](https://github.com/BaranTeyin1/vulnerability-research/tree/main/CVE-2025-26320) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20494
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 20:10 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In AutomaticZenRule of AutomaticZenRule.java, there is a possible persistent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243794204
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-01-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19130
- **State**: PUBLISHED
- **Published Date**: November 09, 2018 at 11:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Libav 12.3, there is an invalid memory access in vc1_decode_frame in libavcodec/vc1dec.c that allows attackers to cause a denial-of-service via a crafted aac file. NOTE: This may be a duplicate of CVE-2017-17127
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.libav.org/show_bug.cgi?id=1139)
2. [[debian-lts-announce] 20191205 [SECURITY] [DLA 2021-1] libav security update](https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47698
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 11:53 UTC
- **Last Updated**: May 04, 2025 at 09:37 UTC
- **Reserved Date**: September 30, 2024 at 16:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
Ensure index in rtl2832_pid_filter does not exceed 31 to prevent
out-of-bounds access.
dev->filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index > 32 to index >= 32 to resolve this
issue.
[hverkuil: added fixes tag, rtl2830_pid_filter -> rtl2832_pid_filter in logmsg]
### Affected Products
**Linux - Linux**
Affected versions:
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
- 4b01e01a81b6629878344430531ced347cc2ed5b (Status: affected)
**Linux - Linux**
Affected versions:
- 4.0 (Status: affected)
- 0 (Status: unaffected)
- 4.19.323 (Status: unaffected)
- 5.4.285 (Status: unaffected)
- 5.10.227 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.54 (Status: unaffected)
- 6.10.13 (Status: unaffected)
- 6.11.2 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7065c05c6d58b9b9a98127aa14e9a5ec68173918)
2. [](https://git.kernel.org/stable/c/49b33c38d202d3327dcfd058e27f541dcc308b92)
3. [](https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d)
4. [](https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71)
5. [](https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a)
6. [](https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835)
7. [](https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447)
8. [](https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60)
9. [](https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2658, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2658
- **State**: PUBLISHED
- **Published Date**: January 16, 2023 at 15:38 UTC
- **Last Updated**: April 04, 2025 at 19:43 UTC
- **Reserved Date**: August 04, 2022 at 12:24 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Spell Check WordPress plugin before 9.13 does not escape ignored words, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WP Spell Check**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3)
### Credits
- Marco Nappi
- WPScan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.