System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10082, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10082 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10082
- **State**: PUBLISHED
- **Published Date**: November 06, 2024 at 14:34 UTC
- **Last Updated**: November 06, 2024 at 14:59 UTC
- **Reserved Date**: October 17, 2024 at 12:36 UTC
- **Assigned By**: ERIC
### Vulnerability Description
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.
Authentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface. The attacker needs to acquire the username of the root user to be successful.
This issue affects CodeChecker: through 6.24.1.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-305: Security Weakness
- CWE-330: Security Weakness
- CWE-842: Security Weakness
### Affected Products
**Ericsson - CodeChecker**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/Ericsson/codechecker/security/advisories/GHSA-fpm5-2wcj-vfr7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9535
- **State**: PUBLISHED
- **Published Date**: October 09, 2019 at 19:15 UTC
- **Last Updated**: September 17, 2024 at 02:11 UTC
- **Reserved Date**: March 01, 2019 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
### Weakness Classification (CWE)
- CWE-349: Security Weakness
### Affected Products
**iTerm2 - iTerm2**
Affected versions:
- 3.3.5 (Status: affected)
### References
1. [VU#763073](https://kb.cert.org/vuls/id/763073/)
2. [](https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/)
3. [](https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4)
### Credits
- Thanks to Stefan Grönke and Fabian Freyer of Radically Open Security for finding this vulnerability, the Mozilla Open Source Support (MOSS) project for supporting the audit, and George Nachman of iTerm2 for developing the fix, and all parties for coordinating this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20434
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 16:29 UTC
- **Last Updated**: October 07, 2024 at 15:11 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the control plane of an affected device.
This vulnerability is due to improper handling of frames with VLAN tag information. An attacker could exploit this vulnerability by sending crafted frames to an affected device. A successful exploit could allow the attacker to render the control plane of the affected device unresponsive. The device would not be accessible through the console or CLI, and it would not respond to ping requests, SNMP requests, or requests from other control plane protocols. Traffic that is traversing the device through the data plane is not affected. A reload of the device is required to restore control plane services.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Cisco - Cisco IOS XE Software**
Affected versions:
- 16.6.1 (Status: affected)
- 16.6.2 (Status: affected)
- 16.6.3 (Status: affected)
- 16.6.4 (Status: affected)
- 16.6.5 (Status: affected)
- 16.6.4a (Status: affected)
- 16.6.6 (Status: affected)
- 16.6.7 (Status: affected)
- 16.6.8 (Status: affected)
- 16.6.9 (Status: affected)
- 16.6.10 (Status: affected)
- 16.7.1 (Status: affected)
- 16.8.1 (Status: affected)
- 16.8.1a (Status: affected)
- 16.8.1s (Status: affected)
- 16.9.1 (Status: affected)
- 16.9.2 (Status: affected)
- 16.9.1s (Status: affected)
- 16.9.3 (Status: affected)
- 16.9.4 (Status: affected)
- 16.9.5 (Status: affected)
- 16.9.6 (Status: affected)
- 16.9.7 (Status: affected)
- 16.9.8 (Status: affected)
- 16.10.1 (Status: affected)
- 16.10.1s (Status: affected)
- 16.10.1e (Status: affected)
- 16.11.1 (Status: affected)
- 16.11.1b (Status: affected)
- 16.11.1s (Status: affected)
- 16.12.1 (Status: affected)
- 16.12.1s (Status: affected)
- 16.12.1c (Status: affected)
- 16.12.2 (Status: affected)
- 16.12.3 (Status: affected)
- 16.12.8 (Status: affected)
- 16.12.2s (Status: affected)
- 16.12.4 (Status: affected)
- 16.12.3s (Status: affected)
- 16.12.3a (Status: affected)
- 16.12.4a (Status: affected)
- 16.12.5 (Status: affected)
- 16.12.6 (Status: affected)
- 16.12.5b (Status: affected)
- 16.12.6a (Status: affected)
- 16.12.7 (Status: affected)
- 17.1.1 (Status: affected)
- 17.1.1s (Status: affected)
- 17.1.1t (Status: affected)
- 17.1.3 (Status: affected)
- 17.2.1 (Status: affected)
- 17.2.1a (Status: affected)
- 17.3.1 (Status: affected)
- 17.3.2 (Status: affected)
- 17.3.3 (Status: affected)
- 17.3.2a (Status: affected)
- 17.3.4 (Status: affected)
- 17.3.5 (Status: affected)
- 17.3.6 (Status: affected)
- 17.3.4b (Status: affected)
- 17.3.7 (Status: affected)
- 17.3.8 (Status: affected)
- 17.3.8a (Status: affected)
- 17.4.1 (Status: affected)
- 17.5.1 (Status: affected)
- 17.6.1 (Status: affected)
- 17.6.2 (Status: affected)
- 17.6.3 (Status: affected)
- 17.6.4 (Status: affected)
- 17.6.5 (Status: affected)
- 17.6.6 (Status: affected)
- 17.6.6a (Status: affected)
- 17.6.5a (Status: affected)
- 17.6.7 (Status: affected)
- 17.7.1 (Status: affected)
- 17.10.1 (Status: affected)
- 17.10.1b (Status: affected)
- 17.8.1 (Status: affected)
- 17.9.1 (Status: affected)
- 17.9.2 (Status: affected)
- 17.9.3 (Status: affected)
- 17.9.4 (Status: affected)
- 17.9.5 (Status: affected)
- 17.9.4a (Status: affected)
- 17.11.1 (Status: affected)
- 17.12.1 (Status: affected)
- 17.12.2 (Status: affected)
- 17.12.3 (Status: affected)
- 17.13.1 (Status: affected)
- 17.14.1 (Status: affected)
- 17.11.99SW (Status: affected)
### References
1. [cisco-sa-vlan-dos-27Pur5RT](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26380
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:09 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-27.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2053
- **State**: PUBLISHED
- **Published Date**: June 26, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 26, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://echo.or.id/adv/adv20-theday-2005.txt)
2. [20050626 Re: [ECHO_ADV_20$2005] Full path disclosure JAF CMS](http://marc.info/?l=bugtraq&m=111990004028512&w=2)
3. [20050623 [ECHO_ADV_20$2005] Full path disclosure JAF CMS](http://marc.info/?l=bugtraq&m=111954840611126&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22409
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 22:16 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 10, 2024 at 15:09 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
DataHub is an open-source metadata platform. In affected versions a low privileged user could remove a user, edit group members, or edit another user's profile information. The default privileges gave too many broad permissions to low privileged users. These have been constrained in PR #9067 to prevent abuse. This issue can result in privilege escalation for lower privileged users up to admin privileges, potentially, if a group with admin privileges exists. May not impact instances that have modified default privileges. This issue has been addressed in datahub version 0.12.1. Users are advised to upgrade.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**datahub-project - datahub**
Affected versions:
- < 0.12.1 (Status: affected)
### References
1. [https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv](https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv)
2. [https://github.com/datahub-project/datahub/pull/9067](https://github.com/datahub-project/datahub/pull/9067) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10406
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 20:47 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, and SD 835, while printing debug message of a pointer in wlan_qmi_err_cb, the real kernel address will be printed regardless of the kptr_restrict system settings.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile**
Affected versions:
- MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0463
- **State**: PUBLISHED
- **Published Date**: January 29, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: January 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Horde IMP 4.3.6 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [horde-dns-info-disclosure(56052)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56052)
2. [](https://secure.grepular.com/DNS_Prefetch_Exposure_on_Thunderbird_and_Webmail)
3. [](http://bugs.horde.org/ticket/8836) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38335
- **State**: PUBLISHED
- **Published Date**: September 27, 2022 at 17:10 UTC
- **Last Updated**: May 21, 2025 at 14:55 UTC
- **Reserved Date**: August 15, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the e-mail template modules.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vtiger.com/)
2. [](https://code.vtiger.com/vtiger/vtigercrm)
3. [](https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3972, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3972 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3972
- **State**: PUBLISHED
- **Published Date**: February 19, 2018 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: June 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Apexis APM-J601-WS cameras with firmware before 17.35.2.49 allows remote attackers to read arbitrary files via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://fortiguard.com/zeroday/FG-VD-14-004) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2930
- **State**: PUBLISHED
- **Published Date**: August 22, 2022 at 11:35 UTC
- **Last Updated**: August 03, 2024 at 00:53 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3.
### Weakness Classification (CWE)
- CWE-620: Security Weakness
### Affected Products
**octoprint - octoprint/octoprint**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477)
2. [](https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6812, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6812 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6812
- **State**: PUBLISHED
- **Published Date**: September 04, 2015 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 17:08 UTC
- **Reserved Date**: September 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.0.12.1 allows remote attackers to cause a denial of service (loop and memory consumption) via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://community.invisionpower.com/release-notes/40121-r22/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46981
- **State**: PUBLISHED
- **Published Date**: November 04, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 14:27 UTC
- **Reserved Date**: October 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in Novel-Plus v.4.2.0 allows a remote attacker to execute arbitrary code via a crafted script to the sort parameter in /common/log/list.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21445
- **State**: PUBLISHED
- **Published Date**: February 09, 2023 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 19:07 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Improper access control vulnerability in MyFiles prior to versions 12.2.09 in Android R(11), 13.1.03.501 in Android S(12) and 14.1.00.422 in Android T(13) allows local attacker to write file with MyFiles privilege via implicit intent.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Samsung Mobile - The patch adds proper access control to use explicit intent.**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38896, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38896
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 18:35 UTC
- **Last Updated**: September 16, 2024 at 19:14 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar Advisor 2.5 through 2.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209566.
### Affected Products
**IBM - Qradar Advisor**
Affected versions:
- 2.5 (Status: affected)
- 2.6.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6506461)
2. [ibm-qradar-cve202138896-xss (209566)](https://exchange.xforce.ibmcloud.com/vulnerabilities/209566) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30705
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 13:50 UTC
- **Last Updated**: January 10, 2025 at 19:16 UTC
- **Reserved Date**: June 30, 2022 at 09:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Pankaj Jha WordPress Ping Optimizer plugin <= 2.35.1.2.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Pankaj Jha - WordPress Ping Optimizer**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wordpress-ping-optimizer/wordpress-ping-optimizer-plugin-2-35-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Muhammad Daffa (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15229
- **State**: PUBLISHED
- **Published Date**: August 19, 2019 at 23:29 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FUEL CMS 1.4.4 has CSRF in the blocks/create/ Create Blocks section of the Admin console. This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/daylightstudio/FUEL-CMS/issues/536)
2. [](https://www.sevenlayers.com/index.php/238-fuelcms-1-4-4-csrf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2293
- **State**: PUBLISHED
- **Published Date**: February 06, 2013 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 22:36 UTC
- **Reserved Date**: April 19, 2012 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Directory traversal vulnerability in EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 allows remote authenticated users to upload files, and consequently execute arbitrary code, via a relative path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130131 ESA-2013-002: RSA Archer GRC Multiple Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2013-02/0001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57509, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57509
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 00:00 UTC
- **Last Updated**: January 31, 2025 at 20:31 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/989)
2. [](https://gist.github.com/G2FUZZ/91a1cc3b8f2b0720e984353d59023b24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6529
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 06:00 UTC
- **Last Updated**: August 01, 2024 at 13:26 UTC
- **Reserved Date**: July 05, 2024 at 12:12 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Ultimate Classified Listings WordPress plugin before 1.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Ultimate Classified Listings**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/)
### Credits
- Erwan LR (WPScan)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2006
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in IZArc Archiver 3.5 beta 3 allow remote attackers to write arbitrary files via a ..\ (dot dot backslash) in a (1) .rar, (2) .tar, (3) .zip, (4) .jar, or (5) .gz archive. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24895](http://www.osvdb.org/24895)
2. [19791](http://secunia.com/advisories/19791)
3. [17664](http://www.securityfocus.com/bid/17664)
4. [ADV-2006-1488](http://www.vupen.com/english/advisories/2006/1488)
5. [izarc-extract-directory-traversal(26039)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26039) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6058
- **State**: REJECTED
- **Published Date**: November 02, 2021 at 21:10 UTC
- **Last Updated**: November 02, 2021 at 21:10 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33881, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33881
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 08:32 UTC
- **Last Updated**: December 03, 2024 at 17:05 UTC
- **Reserved Date**: May 23, 2023 at 06:38 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29075, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29075 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29075
- **State**: PUBLISHED
- **Published Date**: November 23, 2023 at 03:39 UTC
- **Last Updated**: October 15, 2024 at 17:46 UTC
- **Reserved Date**: March 30, 2023 at 21:27 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause an Out-Of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Autodesk - AutoCAD, Advance Steel and Civil 3D**
Affected versions:
- 2024, 2023 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0958, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0958 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0958
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:05 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In update of km_compat.cpp, there is a possible loss of potentially sensitive data due to a logic error in the code. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-200041882
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0824
- **State**: PUBLISHED
- **Published Date**: February 19, 2008 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:29 UTC
- **Reserved Date**: February 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the php2phps function in Claroline before 1.8.9 has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?release_id=575934)
2. [28942](http://secunia.com/advisories/28942) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5838, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5838 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5838
- **State**: PUBLISHED
- **Published Date**: May 13, 2020 at 15:42 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Symantec IT Analytics, prior to 2.9.1, may be susceptible to a cross-site scripting (XSS) exploit, which is a type of issue that can potentially enable attackers to inject client-side scripts into web pages viewed by other users.
### Affected Products
**n/a - IT Analytics**
Affected versions:
- Prior to 2.9.1 (Status: affected)
### References
1. [](https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1766) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10442
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:04 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-popular.php by adding a question mark (?) followed by the payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=137#uxss)
2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0436
- **State**: PUBLISHED
- **Published Date**: February 02, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html)
2. [VU#858729](http://www.kb.cert.org/vuls/id/858729)
3. [oval:org.mitre.oval:def:15723](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15723)
4. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
5. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html)
6. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1105, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1105 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1105
- **State**: PUBLISHED
- **Published Date**: July 29, 2019 at 14:07 UTC
- **Last Updated**: May 20, 2025 at 17:49 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A spoofing vulnerability exists in the way Microsoft Outlook for Android software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.
The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user.
The security update addresses the vulnerability by correcting how Outlook for Android parses specially crafted email messages.
### Affected Products
**Microsoft - Microsoft Outlook for Android**
Affected versions:
- 1.0 (Status: affected)
### References
1. [Outlook for Android Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1105) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4514
- **State**: PUBLISHED
- **Published Date**: May 06, 2024 at 02:00 UTC
- **Last Updated**: August 01, 2024 at 20:40 UTC
- **Reserved Date**: May 05, 2024 at 11:29 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/timetable_insert_form.php. The manipulation of the argument grade leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263118 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Campcodes - Complete Web-Based School Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-263118 | Campcodes Complete Web-Based School Management System timetable_insert_form.php cross site scripting](https://vuldb.com/?id.263118)
2. [VDB-263118 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.263118)
3. [Submit #329695 | Campcodes Complete Web-Based School Management System ≤1.0 XSS injection](https://vuldb.com/?submit.329695)
4. [](https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%202.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5556
- **State**: PUBLISHED
- **Published Date**: December 03, 2012 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 23:21 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the RESTful Web Services (RESTWS) module 7.x-1.x before 7.x-1.1 and 7.x-2.x before 7.x-2.0-alpha3 for Drupal allow remote attackers to hijack the authentication of arbitrary users via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/1840740)
2. [](http://drupal.org/node/1840722)
3. [[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/11/20/4)
4. [](http://drupal.org/node/1840728) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4065
- **State**: PUBLISHED
- **Published Date**: May 06, 2019 at 18:06 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected javascript code execution, resulting in the execution of javascript code running on the victim's browser. An attacker can get a victim to click a link, or embedded URL, that redirects to the reflected cross-site scripting vulnerability to trigger this vulnerability.
### Affected Products
**n/a - Sierra Wireless**
Affected versions:
- Sierra Wireless AirLink ES450 FW 4.9.3 (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03)
3. [108147](http://www.securityfocus.com/bid/108147)
4. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1474
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:10 UTC
- **Last Updated**: March 20, 2025 at 18:22 UTC
- **Reserved Date**: February 19, 2025 at 16:25 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.
### Weakness Classification (CWE)
- CWE-521: Security Weakness
### Affected Products
**mlflow - mlflow/mlflow**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/e79f7774-10fe-46b2-b522-e73b748e3b2d)
2. [](https://github.com/mlflow/mlflow/commit/149c9e18aa219bc47e86b432e130e467a36f4a17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6847
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 06:31 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 18, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. SVG files can be used as mp3 album covers. In case their XML structure contains script code, that code may get executed when calling the related cover URL. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93457](http://www.securityfocus.com/bid/93457)
2. [](https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7805, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7805 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7805
- **State**: PUBLISHED
- **Published Date**: May 07, 2020 at 17:06 UTC
- **Last Updated**: August 04, 2024 at 09:41 UTC
- **Reserved Date**: January 22, 2020 at 00:00 UTC
- **Assigned By**: krcert
### Vulnerability Description
An issue was discovered on KT Slim egg IML500 (R7283, R8112, R8424) and IML520 (R8112, R8368, R8411) wifi device. This issue is a command injection allowing attackers to execute arbitrary OS commands.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Infomark - KT Slim egg IML500**
Affected versions:
- R7283 (Status: affected)
- R8112 (Status: affected)
- R8424 (Status: affected)
**Infomark - KT Slim egg IML520**
Affected versions:
- R8112 (Status: affected)
- R8368 (Status: affected)
- R8411 (Status: affected)
### References
1. [](https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35362)
2. [](http://www.infomark.co.kr/bbs/board.php?bo_table=download&wr_id=57&sfl=wr_subject&stx=520&sop=and)
### Credits
- Inhyeong Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2819
- **State**: PUBLISHED
- **Published Date**: June 23, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 23, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in BlognPlus (BURO GUN +) 2.5.4 and earlier MySQL and PostgreSQL editions allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30642](http://secunia.com/advisories/30642)
2. [JVN#14072646](http://jvn.jp/jp/JVN14072646/index.html)
3. [blognplus-unspecified-sql-injection(43136)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43136)
4. [29764](http://www.securityfocus.com/bid/29764)
5. [](http://www.blogn.org/index.php?e=170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31774
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:51 UTC
- **Last Updated**: April 01, 2025 at 19:30 UTC
- **Reserved Date**: April 01, 2025 at 13:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WebProtect.ai Astra Security Suite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Astra Security Suite: from n/a through 0.2.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WebProtect.ai - Astra Security Suite**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/getastra/vulnerability/wordpress-astra-security-suite-plugin-0-2-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3927
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 19:26 UTC
- **Last Updated**: June 11, 2021 at 19:26 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17387
- **State**: PUBLISHED
- **Published Date**: August 25, 2020 at 20:21 UTC
- **Last Updated**: August 04, 2024 at 13:53 UTC
- **Reserved Date**: August 07, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the writeObjectToConfigFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10565.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Marvell - QConvergeConsole**
Affected versions:
- 5.5.0.64 (Status: affected)
### References
1. [](https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-974/)
### Credits
- rgod |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32738
- **State**: REJECTED
- **Last Updated**: May 29, 2023 at 00:00 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26823
- **State**: PUBLISHED
- **Published Date**: November 10, 2020 at 16:17 UTC
- **Last Updated**: August 04, 2024 at 16:03 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.
### Affected Products
**SAP SE - SAP Solution Manager (JAVA stack)**
Affected versions:
- < 7.20 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571)
2. [](https://launchpad.support.sap.com/#/notes/2985866) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-28004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-28004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28004
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 05:51 UTC
- **Last Updated**: August 11, 2024 at 14:01 UTC
- **Reserved Date**: February 29, 2024 at 06:17 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in ExtendThemes Colibri Page Builder.This issue affects Colibri Page Builder: from n/a through 1.0.248.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**ExtendThemes - Colibri Page Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/colibri-page-builder/wordpress-colibri-page-builder-plugin-1-0-248-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-17214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-17214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17214
- **State**: PUBLISHED
- **Published Date**: October 06, 2019 at 13:21 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WebARX plugin 1.3.0 for WordPress allows firewall bypass by appending &cc=1 to a URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/149573/WordPress-WebARX-Website-Firewall-4.9.8-XSS-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2635, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2635
- **State**: PUBLISHED
- **Published Date**: August 22, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**The libvirt Project - libvirt**
Affected versions:
- from 2.5.0 to 3.0.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2635)
2. [](https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=c3de387380f6057ee0e46cd9f2f0a092e8070875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30866
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 10:55 UTC
- **Last Updated**: March 27, 2025 at 18:57 UTC
- **Reserved Date**: March 26, 2025 at 09:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Giannis Kipouros Terms & Conditions Per Product allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Terms & Conditions Per Product: from n/a through 1.2.15.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Giannis Kipouros - Terms & Conditions Per Product**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/terms-and-conditions-per-product/vulnerability/wordpress-terms-conditions-per-product-plugin-1-2-15-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-2238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-2238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2238
- **State**: PUBLISHED
- **Published Date**: October 14, 2007 at 20:00 UTC
- **Last Updated**: August 08, 2024 at 03:59 UTC
- **Reserved Date**: October 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the Kunani ODBC FTP Server 1.0.10 allows remote attackers to read arbitrary files via a "..\" (dot dot backslash) in a GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6355](http://www.securityfocus.com/bid/6355)
2. [kunani-dotdot-directory-traversal(10819)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10819)
3. [20021210 KunaniFTP-Server v.1.0.10 allows dictionary traversal](http://archives.neohapsis.com/archives/bugtraq/2002-12/0088.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6717, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6717 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6717
- **State**: REJECTED
- **Published Date**: January 12, 2021 at 20:02 UTC
- **Last Updated**: January 12, 2021 at 20:02 UTC
- **Reserved Date**: January 09, 2020 at 00:00 UTC
- **Assigned By**: Eaton
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7755
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3677, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3677
- **State**: PUBLISHED
- **Published Date**: March 02, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: August 03, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - postgresql**
Affected versions:
- Fixedin v13.4, v12.8, v11.13 (Status: affected)
### References
1. [](https://www.postgresql.org/support/security/CVE-2021-3677/)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=2001857)
3. [](https://security.netapp.com/advisory/ntap-20220407-0008/)
4. [GLSA-202211-04](https://security.gentoo.org/glsa/202211-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43571
- **State**: PUBLISHED
- **Published Date**: November 09, 2021 at 21:05 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 09, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/)
2. [](https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35056
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 15:14 UTC
- **Last Updated**: September 18, 2024 at 13:58 UTC
- **Reserved Date**: June 12, 2023 at 15:52 UTC
- **Assigned By**: talos
### Vulnerability Description
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the cgi_handler function.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Yifan - YF325**
Affected versions:
- v1.0_20221108 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761)
### Credits
- Discovered by Francesco Benvenuto of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3193
- **State**: PUBLISHED
- **Published Date**: September 15, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 06:14 UTC
- **Reserved Date**: September 15, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the DigiFolio (com_digifolio) component 1.52 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a project action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [9534](http://www.exploit-db.com/exploits/9534) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27731
- **State**: REJECTED
- **Published Date**: July 07, 2022 at 19:44 UTC
- **Last Updated**: July 07, 2022 at 19:44 UTC
- **Reserved Date**: October 26, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48566, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48566
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:15 UTC
- **Last Updated**: October 07, 2024 at 13:45 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0090
- **State**: PUBLISHED
- **Published Date**: April 12, 2016 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 22:08 UTC
- **Reserved Date**: December 04, 2015 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Hyper-V in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS16-045](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-045)
2. [1035538](http://www.securitytracker.com/id/1035538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39784
- **State**: PUBLISHED
- **Published Date**: March 30, 2022 at 16:02 UTC
- **Last Updated**: August 04, 2024 at 02:13 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In CellBroadcastReceiver, there is a possible path to enable specific cellular features due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-200163477
### Affected Products
**n/a - Android**
Affected versions:
- Android-12L (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-12l) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12547
- **State**: PUBLISHED
- **Published Date**: February 11, 2019 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 08:38 UTC
- **Reserved Date**: June 18, 2018 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**The Eclipse Foundation - Eclipse OpenJ9**
Affected versions:
- unspecified (Status: affected)
### References
1. [RHSA-2019:0474](https://access.redhat.com/errata/RHSA-2019:0474)
2. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659)
3. [RHSA-2019:0469](https://access.redhat.com/errata/RHSA-2019:0469)
4. [RHSA-2019:0473](https://access.redhat.com/errata/RHSA-2019:0473)
5. [RHSA-2019:0472](https://access.redhat.com/errata/RHSA-2019:0472)
6. [RHSA-2019:0640](https://access.redhat.com/errata/RHSA-2019:0640)
7. [RHSA-2019:1238](https://access.redhat.com/errata/RHSA-2019:1238) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0608
- **State**: PUBLISHED
- **Published Date**: May 12, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35400458. References: QC-CR#1098363.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-05-01)
2. [98172](http://www.securityfocus.com/bid/98172) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49517
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 20:02 UTC
- **Last Updated**: November 12, 2024 at 20:25 UTC
- **Reserved Date**: October 15, 2024 at 15:35 UTC
- **Assigned By**: adobe
### Vulnerability Description
Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Adobe - Substance3D - Painter**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0205
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (CSS) vulnerability in error.asp for Plumtree Corporate Portal 3.5 through 4.5 allows remote attackers to execute arbitrary script on other clients via the "Description" parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020104 Cross-Site Scripting in PlumTree?](http://online.securityfocus.com/archive/82/248396)
2. [plumtree-css-error(7817)](http://www.iss.net/security_center/static/7817.php)
3. [3799](http://www.securityfocus.com/bid/3799)
4. [20020124 Plumtree Corporate Portal Cross-Site Scripting (Patch Available)](http://marc.info/?l=bugtraq&m=101189911121808&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1736, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1736 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1736
- **State**: PUBLISHED
- **Published Date**: April 29, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Comodo Firewall Pro before 3.0 does not properly validate certain parameters to hooked System Service Descriptor Table (SSDT) functions, which allows local users to cause a denial of service (system crash) via (1) a crafted OBJECT_ATTRIBUTES structure in a call to the NtDeleteFile function, which leads to improper validation of a ZwQueryObject result; and unspecified calls to the (2) NtCreateFile and (3) NtSetThreadContext functions, different vectors than CVE-2007-0709.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-1383](http://www.vupen.com/english/advisories/2008/1383)
2. [30006](http://secunia.com/advisories/30006)
3. [](http://www.personalfirewall.comodo.com/release_notes.html)
4. [3838](http://securityreason.com/securityalert/3838)
5. [28742](http://www.securityfocus.com/bid/28742)
6. [](http://www.coresecurity.com/?action=item&id=2249)
7. [1019944](http://securitytracker.com/id?1019944)
8. [comodo-ssdt-dos(42082)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42082)
9. [20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls](http://www.securityfocus.com/archive/1/491405/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5768
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [APPLE-SA-2016-09-20](http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html)
2. [openSUSE-SU-2016:1761](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html)
3. [openSUSE-SU-2016:1922](http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html)
4. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
5. [RHSA-2016:2598](http://rhn.redhat.com/errata/RHSA-2016-2598.html)
6. [](http://php.net/ChangeLog-5.php)
7. [](https://bugs.php.net/bug.php?id=72402)
8. [](http://github.com/php/php-src/commit/5b597a2e5b28e2d5a52fc1be13f425f08f47cb62?w=1)
9. [[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues](http://www.openwall.com/lists/oss-security/2016/06/23/4)
10. [DSA-3618](http://www.debian.org/security/2016/dsa-3618)
11. [](http://php.net/ChangeLog-7.php)
12. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731)
13. [](https://support.apple.com/HT207170)
14. [91396](http://www.securityfocus.com/bid/91396) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4656, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4656 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4656
- **State**: PUBLISHED
- **Published Date**: March 03, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: March 03, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in E-Soft DJ Studio Pro 4.2 including 4.2.2.7.5, and 5.x including 5.1.4.3.1, allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a playlist file (.pls) containing a long string. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2009-2681](http://www.vupen.com/english/advisories/2009/2681)
2. [36728](http://secunia.com/advisories/36728)
3. [djstudio-pls-dos(53310)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53310)
4. [9691](http://www.exploit-db.com/exploits/9691) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34027, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34027 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34027
- **State**: PUBLISHED
- **Published Date**: June 24, 2024 at 13:56 UTC
- **Last Updated**: May 04, 2025 at 09:05 UTC
- **Reserved Date**: June 24, 2024 at 13:54 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock
It needs to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock
to avoid racing with checkpoint, otherwise, filesystem metadata including
blkaddr in dnode, inode fields and .total_valid_block_count may be
corrupted after SPO case.
### Affected Products
**Linux - Linux**
Affected versions:
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
- ef8d563f184e1112651f2cbde383d43e599334e8 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.8 (Status: affected)
- 0 (Status: unaffected)
- 5.10.219 (Status: unaffected)
- 5.15.161 (Status: unaffected)
- 6.1.93 (Status: unaffected)
- 6.6.33 (Status: unaffected)
- 6.9.4 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a6e1f7744e9b84f86a629a76024bba8468aa153b)
2. [](https://git.kernel.org/stable/c/b5bac43875aa27ec032dbbb86173baae6dce6182)
3. [](https://git.kernel.org/stable/c/5d47d63883735718825ca2efc4fca6915469774f)
4. [](https://git.kernel.org/stable/c/329edb7c9e3b6ca27e6ca67ab1cdda1740fb3a2b)
5. [](https://git.kernel.org/stable/c/69136304fd144144a4828c7b7b149d0f80321ba4)
6. [](https://git.kernel.org/stable/c/0a4ed2d97cb6d044196cc3e726b6699222b41019) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32793
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 11:34 UTC
- **Last Updated**: September 24, 2024 at 19:24 UTC
- **Reserved Date**: May 15, 2023 at 12:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Pre-Orders plugin <= 2.0.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WooCommerce - WooCommerce Pre-Orders**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woocommerce-pre-orders/wordpress-woocommerce-pre-orders-plugin-2-0-0-contributor-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20167
- **State**: PUBLISHED
- **Published Date**: December 30, 2019 at 23:55 UTC
- **Last Updated**: August 05, 2024 at 02:39 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gpac/gpac/issues/1330) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26333, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26333 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26333
- **State**: PUBLISHED
- **Published Date**: March 05, 2024 at 00:00 UTC
- **Last Updated**: August 27, 2024 at 19:21 UTC
- **Reserved Date**: February 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
swftools v0.9.2 was discovered to contain a segmentation violation via the function free_lines at swftools/lib/modules/swfshape.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/219) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1239
- **State**: PUBLISHED
- **Published Date**: April 13, 2011 at 20:07 UTC
- **Last Updated**: August 06, 2024 at 22:21 UTC
- **Reserved Date**: March 04, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html)
2. [mswin-win32k-var27-priv-escalation(66421)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66421)
3. [MS11-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034)
4. [ADV-2011-0952](http://www.vupen.com/english/advisories/2011/0952)
5. [](http://support.avaya.com/css/P8/documents/100133352)
6. [47216](http://www.securityfocus.com/bid/47216)
7. [71754](http://osvdb.org/71754)
8. [44156](http://secunia.com/advisories/44156)
9. [](http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx)
10. [oval:org.mitre.oval:def:11726](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11726)
11. [1025345](http://www.securitytracker.com/id?1025345) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1634, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1634
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:00 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
show_bug.cgi in Bugzilla 2.17.1 through 2.18rc2 and 2.19 from CVS, when using the insidergroup feature and exporting a bug to XML, shows comments and attachment summaries which are marked as private, which allows remote attackers to gain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20041025 [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2](http://marc.info/?l=bugtraq&m=109872095201238&w=2)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=263780)
3. [bugzilla-xml-information-disclosure(17841)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17841)
4. [11511](http://www.securityfocus.com/bid/11511) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4359, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4359
- **State**: PUBLISHED
- **Published Date**: December 01, 2010 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 04:18 UTC
- **Reserved Date**: December 01, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Jurpopage 0.2.0 allows remote attackers to execute arbitrary SQL commands via the category parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15621](http://www.exploit-db.com/exploits/15621)
2. [42387](http://secunia.com/advisories/42387)
3. [](http://packetstormsecurity.org/files/view/96131/jurpopage-sql.txt)
4. [ADV-2010-3071](http://www.vupen.com/english/advisories/2010/3071)
5. [45076](http://www.securityfocus.com/bid/45076) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4754
- **State**: PUBLISHED
- **Published Date**: April 01, 2006 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 20:47 UTC
- **Reserved Date**: March 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier allow remote attackers to obtain sensitive information (intranet IP addresses) via unknown attack vectors involving "network address translation."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [BEA05-90.00](http://dev2dev.bea.com/pub/advisory/144)
2. [15052](http://www.securityfocus.com/bid/15052)
3. [17138](http://secunia.com/advisories/17138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19123, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19123
- **State**: REJECTED
- **Published Date**: August 21, 2020 at 16:34 UTC
- **Last Updated**: August 21, 2020 at 16:34 UTC
- **Reserved Date**: November 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6892
- **State**: PUBLISHED
- **Published Date**: April 18, 2024 at 11:05 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 16, 2023 at 14:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The EAN for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'alg_wc_ean_product_meta' shortcode in all versions up to, and including, 4.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**algoritmika - EAN for WooCommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d798406b-2b7f-4ca0-8d05-8aff4bf44dd8?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3070991/ean-for-woocommerce)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3091, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3091 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3091
- **State**: PUBLISHED
- **Published Date**: September 28, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: September 28, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Mantis before 1.0.0rc1 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, as identified by bug#0005751 "thraxisp".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-905](http://www.debian.org/security/2005/dsa-905)
2. [16506](http://secunia.com/advisories/16506)
3. [17654](http://secunia.com/advisories/17654)
4. [](http://www.mantisbt.org/changelog.php)
5. [15227](http://www.securityfocus.com/bid/15227) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27342
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:56 UTC
- **Last Updated**: August 02, 2024 at 12:09 UTC
- **Reserved Date**: February 28, 2023 at 17:58 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor EMF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18766.
### Weakness Classification (CWE)
- CWE-822: Security Weakness
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 9.4.363.0 (Status: affected)
### References
1. [ZDI-23-354](https://www.zerodayinitiative.com/advisories/ZDI-23-354/)
2. [vendor-provided URL](https://www.tracker-software.com/product/pdf-xchange-editor/history) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3204
- **State**: PUBLISHED
- **Published Date**: September 06, 2011 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 23:29 UTC
- **Reserved Date**: August 19, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
hammerhead.cc in Hammerhead 2.1.4 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/hammer.log (aka the HH_LOG file) or (2) the REPORT_LOG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20110830 Re: Security issue in hammerhead](http://www.openwall.com/lists/oss-security/2011/08/30/7)
2. [[oss-security] 20110826 Security issue in hammerhead](http://www.openwall.com/lists/oss-security/2011/08/26/9)
3. [49548](http://www.securityfocus.com/bid/49548)
4. [](https://launchpad.net/bugs/826679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43102, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43102 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43102
- **State**: PUBLISHED
- **Published Date**: November 03, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 12:59 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41194
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 02:11 UTC
- **Last Updated**: August 02, 2024 at 18:54 UTC
- **Reserved Date**: August 24, 2023 at 19:16 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DAP-1325 HNAP SetAPLanSettings SubnetMask Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of a request parameter provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18814.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**D-Link - DAP-1325**
Affected versions:
- 1.07b01 (Status: affected)
### References
1. [ZDI-23-1302](https://www.zerodayinitiative.com/advisories/ZDI-23-1302/)
2. [vendor-provided URL](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11040, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11040 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11040
- **State**: REJECTED
- **Published Date**: March 20, 2025 at 10:10 UTC
- **Last Updated**: April 15, 2025 at 15:53 UTC
- **Reserved Date**: November 09, 2024 at 04:21 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19188
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the success.php fort_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/payfort/payfort-php-sdk/issues/12)
2. [](https://www.seekurity.com/blog/general/payfort-multiple-security-issues-and-concerns-in-a-supposed-to-be-pci-dss-compliant-payment-processor-sdk)
3. [105930](http://www.securityfocus.com/bid/105930) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14397
- **State**: PUBLISHED
- **Published Date**: September 12, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 01:35 UTC
- **Reserved Date**: September 12, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AnyDesk before 3.6.1 on Windows has a DLL injection vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://download.anydesk.com/changelog.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1292
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [sambar-telnet-bo(6973)](http://www.iss.net/security_center/static/6973.php)
2. [20010813 Sambar Telnet Proxy/Server multiple vulnerablietis](http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1007, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1007
- **State**: PUBLISHED
- **Published Date**: March 25, 2019 at 18:38 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 10, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Opto 22 - PAC Project Professional**
Affected versions:
- < R9.4008 (Status: affected)
**Opto 22 - PAC Project Basic**
Affected versions:
- < R9.4008 (Status: affected)
**Opto 22 - PAC Display Basic**
Affected versions:
- < R9.4g (Status: affected)
**Opto 22 - PAC Display Professional**
Affected versions:
- < R9.4g (Status: affected)
**Opto 22 - OptoOPCServer**
Affected versions:
- R9.4c and prior that were installed by PAC Project installer versions prior to R9.4008 (Status: affected)
**Opto 22 - OptoDataLink**
Affected versions:
- R9.4d and prior that were installed by PAC Project installer versions prior to R9.4008 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4167, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4167
- **State**: PUBLISHED
- **Published Date**: July 11, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The L3-agent in OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (IPv4 address attachment outage) by attaching an IPv6 private subnet to a L3 router.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/neutron/+bug/1309195)
2. [[oss-security] 20140618 [OSSA 2014-019] Neutron L3-agent DoS through IPv6 subnet (CVE-2014-4167)](http://seclists.org/oss-sec/2014/q2/572)
3. [59533](http://secunia.com/advisories/59533)
4. [USN-2255-1](http://www.ubuntu.com/usn/USN-2255-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0045, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0045
- **State**: PUBLISHED
- **Published Date**: April 25, 2023 at 22:44 UTC
- **Last Updated**: February 13, 2025 at 16:38 UTC
- **Reserved Date**: January 04, 2023 at 10:07 UTC
- **Assigned By**: Google
### Vulnerability Description
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.
We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-610: Security Weakness
### Affected Products
**Linux - Linux Kernel**
Affected versions:
- 9137bb27e60e (Status: affected)
### References
1. [](https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96)
2. [](https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html)
3. [](https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html)
4. [](https://security.netapp.com/advisory/ntap-20230714-0001/)
5. [](https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23460
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 14:24 UTC
- **Last Updated**: March 26, 2025 at 15:48 UTC
- **Reserved Date**: January 16, 2025 at 11:24 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RWS Enquiry And Lead Follow-up allows Reflected XSS. This issue affects RWS Enquiry And Lead Follow-up: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - RWS Enquiry And Lead Follow-up**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/rws-enquiry/vulnerability/wordpress-rws-enquiry-and-lead-follow-up-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2078
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 02:03 UTC
- **Last Updated**: November 08, 2024 at 14:59 UTC
- **Reserved Date**: April 14, 2023 at 19:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to update the plugins settings. CVE-2023-25030 may be a duplicate of this issue.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**buymeacoffee - Buy Me a Coffee – Button and Widget Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c1c218c6-1599-4dc9-846f-e0ef74821488?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/buymeacoffee/trunk/includes/class-buy-me-a-coffee.php?rev=2319979#L162)
3. [](https://plugins.trac.wordpress.org/browser/buymeacoffee/trunk/admin/class-buy-me-a-coffee-admin.php?rev=2816542)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2935565%40buymeacoffee&new=2935565%40buymeacoffee&sfp_email=&sfph_mail=)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46651
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 13:45 UTC
- **Last Updated**: September 17, 2024 at 13:41 UTC
- **Reserved Date**: October 24, 2023 at 16:05 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.
### Affected Products
**Jenkins Project - Jenkins Warnings Plugin**
Affected versions:
- 10.5.1 (Status: unaffected)
- 10.4.1 (Status: unaffected)
### References
1. [Jenkins Security Advisory 2023-10-25](https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3265)
2. [](http://www.openwall.com/lists/oss-security/2023/10/25/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0926, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0926
- **State**: PUBLISHED
- **Published Date**: October 28, 2004 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 20:02 UTC
- **Reserved Date**: September 29, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in Apple QuickTime on Mac OS 10.2.8 through 10.3.5 may allow remote attackers to execute arbitrary code via a certain BMP image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11322](http://www.securityfocus.com/bid/11322)
2. [APPLE-SA-2004-10-27](http://lists.apple.com/archives/security-announce/2004/Oct/msg00001.html)
3. [APPLE-SA-2004-09-30](http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29406
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: November 30, 2020 at 00:00 UTC
- **Assigned By**: odoo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9462
- **State**: PUBLISHED
- **Published Date**: March 28, 2017 at 02:46 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 19, 2016 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are not properly verifying restore privileges when restoring a file. The restore capability of Nextcloud/ownCloud was not verifying whether a user has only read-only access to a share. Thus a user with read-only access was able to restore old versions.
### Weakness Classification (CWE)
- CWE-275: Security Weakness
### Affected Products
**n/a - Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4**
Affected versions:
- Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 (Status: affected)
### References
1. [](https://github.com/nextcloud/server/commit/1208953ba1d4d55a18a639846bbcdd66a2d5bc5e)
2. [](https://github.com/owncloud/core/commit/c93eca49c32428ece03dd67042772d5fa62c8d6e)
3. [](https://owncloud.org/security/advisory/?id=oc-sa-2016-015)
4. [](https://github.com/owncloud/core/commit/3b056fa68ce502ceb0db9b446dab3b9e7b10dd13)
5. [](https://github.com/owncloud/core/commit/d31720b6f1e8c8dfeb5e8805ab35ad7c8000b2f1)
6. [97285](http://www.securityfocus.com/bid/97285)
7. [](https://hackerone.com/reports/146067)
8. [](https://github.com/owncloud/core/commit/23383080731d092e079986464a8c4c9ffcb79f4c)
9. [](https://nextcloud.com/security/advisory/?id=nc-sa-2016-005) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8420
- **State**: PUBLISHED
- **Published Date**: January 28, 2020 at 20:58 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Joomla! before 3.9.15. A missing CSRF token check in the LESS compiler of com_templates causes a CSRF vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22411, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22411 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22411
- **State**: PUBLISHED
- **Published Date**: August 10, 2022 at 16:50 UTC
- **Last Updated**: September 17, 2024 at 04:05 UTC
- **Reserved Date**: January 03, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
### Affected Products
**IBM - Spectrum Scale DAS**
Affected versions:
- 5.1.3.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6610277)
2. [ibm-spectrum-cve202222411-script-injection (223016)](https://exchange.xforce.ibmcloud.com/vulnerabilities/223016) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33751
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 00:00 UTC
- **Last Updated**: January 31, 2025 at 17:38 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in mipjz v5.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at /app/tag/controller/ApiAdminTagCategory.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sansanyun/mipjz/issues/14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0688
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 14:10 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-8.1 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-09-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4132
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13585
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for CHERRYCOIN, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CHERRYCOIN)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0010, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0010
- **State**: PUBLISHED
- **Published Date**: March 10, 2020 at 19:53 UTC
- **Last Updated**: August 04, 2024 at 05:47 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In fpc_ta_get_build_info of fpc_ta_kpi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-137014293References: N/A
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1052
- **State**: PUBLISHED
- **Published Date**: May 11, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1051, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1067, CVE-2016-1068, CVE-2016-1069, CVE-2016-1070, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, CVE-2016-4102, and CVE-2016-4107.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [90512](http://www.securityfocus.com/bid/90512)
2. [1035828](http://www.securitytracker.com/id/1035828)
3. [](http://www.zerodayinitiative.com/advisories/ZDI-16-300)
4. [](https://helpx.adobe.com/security/products/acrobat/apsb16-14.html) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.