System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-10075, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-10075 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-10075 - **State**: PUBLISHED - **Published Date**: February 07, 2023 at 11:31 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: February 06, 2023 at 07:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in Custom-Content-Width 1.0. It has been declared as problematic. Affected by this vulnerability is the function override_content_width/register_settings of the file custom-content-width.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.1 is able to address this issue. The patch is named e05e0104fc42ad13b57e2b2cb2d1857432624d39. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220219. NOTE: This attack is not very likely. ### CVSS Metrics - **CVSS Base Score**: 2.6/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Custom-Content-Width** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.220219) 2. [](https://vuldb.com/?ctiid.220219) 3. [](https://github.com/georgestephanis/Custom-Content-Width/commit/e05e0104fc42ad13b57e2b2cb2d1857432624d39) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-3870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-3870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-3870 - **State**: PUBLISHED - **Published Date**: July 19, 2018 at 19:00 UTC - **Last Updated**: September 16, 2024 at 20:17 UTC - **Reserved Date**: January 02, 2018 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable out-of-bounds write exists in the PCX parsing functionality of Canvas Draw version 4.0.0. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code execution. A different vulnerability than CVE-2018-3871. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **ACD Systems - Canvas Draw** Affected versions: - ACD Systems Canvas Draw 4.0.0 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0552)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-7031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-7031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-7031 - **State**: PUBLISHED - **Published Date**: August 24, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 11:49 UTC - **Reserved Date**: August 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in Foxit Remote Access Server (aka WAC Server) 2.0 Build 3503 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SSH packets, a different vulnerability than CVE-2008-0151. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [wacserver-ssh-bo(40608)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40608) 2. [50997](http://osvdb.org/50997) 3. [](http://aluigi.org/adv/wachof-adv.txt) 4. [27873](http://www.securityfocus.com/bid/27873) 5. [20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503](http://www.securityfocus.com/archive/1/488366/100/200/threaded) 6. [28272](http://secunia.com/advisories/28272)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2151 - **State**: PUBLISHED - **Published Date**: June 22, 2009 at 14:00 UTC - **Last Updated**: August 07, 2024 at 05:36 UTC - **Reserved Date**: June 22, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in index.php in AdaptWeb 0.9.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the newlang parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8954](https://www.exploit-db.com/exploits/8954)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32720 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 09:37 UTC - **Last Updated**: August 02, 2024 at 02:20 UTC - **Reserved Date**: April 17, 2024 at 10:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Restriction of Excessive Authentication Attempts vulnerability in CodePeople Appointment Hour Booking allows Removing Important Client Functionality.This issue affects Appointment Hour Booking: from n/a through 1.4.56. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-307: Security Weakness ### Affected Products **CodePeople - Appointment Hour Booking** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/appointment-hour-booking/wordpress-appointment-hour-booking-plugin-1-4-56-captcha-bypass-vulnerability?_s_id=cve) ### Credits - Mochamad Sofyan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-0973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-0973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-0973 - **State**: PUBLISHED - **Published Date**: February 16, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 12:34 UTC - **Reserved Date**: February 15, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in index.php in Jupiter CMS 1.1.5 allow remote attackers to inject arbitrary web script or HTML via the Referer HTTP header and certain other HTTP headers, which are displayed without proper sanitization when an administrator performs a Logged Guest action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://mgsdl.free.fr/advisories/12070214.txt) 2. [22560](http://www.securityfocus.com/bid/22560) 3. [jupitercm-loggedguests-xss(32518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32518) 4. [20070214 Jupiter CMS 1.1.5 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/460076/100/0/threaded) 5. [20070214 Re: Jupiter CMS 1.1.5 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/460100/100/0/threaded) 6. [33729](http://osvdb.org/33729) 7. [](http://www.acid-root.new.fr/advisories/12070214.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34094, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34094 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34094 - **State**: PUBLISHED - **Published Date**: June 02, 2023 at 15:19 UTC - **Last Updated**: January 08, 2025 at 17:57 UTC - **Reserved Date**: May 25, 2023 at 21:56 UTC - **Assigned By**: GitHub_M ### Vulnerability Description ChuanhuChatGPT is a graphical user interface for ChatGPT and many large language models. A vulnerability in versions 20230526 and prior allows unauthorized access to the config.json file of the privately deployed ChuanghuChatGPT project, when authentication is not configured. The attacker can exploit this vulnerability to steal the API keys in the configuration file. The vulnerability has been fixed in commit bfac445. As a workaround, setting up access authentication can help mitigate the vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **GaiZhenbiao - ChuanhuChatGPT** Affected versions: - <= 20230526 (Status: affected) ### References 1. [https://github.com/GaiZhenbiao/ChuanhuChatGPT/security/advisories/GHSA-j34w-9xr4-m9p8](https://github.com/GaiZhenbiao/ChuanhuChatGPT/security/advisories/GHSA-j34w-9xr4-m9p8) 2. [https://github.com/GaiZhenbiao/ChuanhuChatGPT/commit/bfac445e799c317b0f5e738ab394032a18de62eb](https://github.com/GaiZhenbiao/ChuanhuChatGPT/commit/bfac445e799c317b0f5e738ab394032a18de62eb)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-5813, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-5813 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-5813 - **State**: PUBLISHED - **Published Date**: November 08, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 20:04 UTC - **Reserved Date**: November 08, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Novell eDirectory 8.8 allows attackers to cause a denial of service, as demonstrated by vd_novell3.pm, a "Novell eDirectory 8.8 DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://gleg.net/vulndisco_meta.shtml) 2. [1017169](http://securitytracker.com/id?1017169) 3. [novell-edirectory-dos(30149)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30149)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-25877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-25877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-25877 - **State**: PUBLISHED - **Published Date**: November 01, 2021 at 11:33 UTC - **Last Updated**: August 03, 2024 at 20:11 UTC - **Reserved Date**: January 22, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://avideoyouphptube.com) 2. [](https://synacktiv.com) 3. [](https://www.synacktiv.com/sites/default/files/2021-01/YouPHPTube_Multiple_Vulnerabilities.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9437 - **State**: PUBLISHED - **Published Date**: September 26, 2019 at 01:18 UTC - **Last Updated**: August 06, 2024 at 08:51 UTC - **Reserved Date**: September 25, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The dynamic-widgets plugin before 1.5.11 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=dynwid-config page_limit parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/8258) 2. [](https://wordpress.org/plugins/dynamic-widgets/#developers) 3. [](http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000435, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000435 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000435 - **State**: REJECTED - **Published Date**: December 30, 2017 at 07:00 UTC - **Last Updated**: September 16, 2024 at 19:20 UTC - **Reserved Date**: December 30, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6797 - **State**: PUBLISHED - **Published Date**: August 10, 2017 at 22:00 UTC - **Last Updated**: September 17, 2024 at 04:24 UTC - **Reserved Date**: August 12, 2016 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. ### Affected Products **Apache Software Foundation - Apache Tomcat** Affected versions: - 9.0.0.M1 to 9.0.0.M9 (Status: affected) - 8.5.0 to 8.5.4 (Status: affected) - 8.0.0.RC1 to 8.0.36 (Status: affected) - 7.0.0 to 7.0.70 (Status: affected) - 6.0.0 to 6.0.45 (Status: affected) ### References 1. [93940](http://www.securityfocus.com/bid/93940) 2. [[announce] 20161027 [SECURITY] CVE-2016-6797 Apache Tomcat Unrestricted Access to Global Resources](https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E) 3. [1037145](http://www.securitytracker.com/id/1037145) 4. [RHSA-2017:2247](https://access.redhat.com/errata/RHSA-2017:2247) 5. [RHSA-2017:0457](http://rhn.redhat.com/errata/RHSA-2017-0457.html) 6. [RHSA-2017:0455](https://access.redhat.com/errata/RHSA-2017:0455) 7. [DSA-3720](http://www.debian.org/security/2016/dsa-3720) 8. [RHSA-2017:0456](https://access.redhat.com/errata/RHSA-2017:0456) 9. [[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E) 10. [[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E) 11. [[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E) 12. [[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E) 13. [[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E) 14. [[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E) 15. [[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E) 16. [[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/](https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E) 17. [[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E) 18. [[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E) 19. [[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/](https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E) 20. [[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E) 21. [[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E) 22. [[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/](https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E) 23. [USN-4557-1](https://usn.ubuntu.com/4557-1/) 24. [](https://security.netapp.com/advisory/ntap-20180605-0001/) 25. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4701 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 11, 2006 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1661 - **State**: PUBLISHED - **Published Date**: November 07, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 13:06 UTC - **Reserved Date**: March 24, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [30219](http://secunia.com/advisories/30219) 2. [29267](http://secunia.com/advisories/29267) 3. [USN-547-1](https://usn.ubuntu.com/547-1/) 4. [GLSA-200711-30](http://security.gentoo.org/glsa/glsa-200711-30.xml) 5. [ADV-2007-4238](http://www.vupen.com/english/advisories/2007/4238) 6. [20071106 rPSA-2007-0231-1 pcre](http://www.securityfocus.com/archive/1/483357/100/0/threaded) 7. [TA07-352A](http://www.us-cert.gov/cas/techalerts/TA07-352A.html) 8. [27538](http://secunia.com/advisories/27538) 9. [20071112 FLEA-2007-0064-1 pcre](http://www.securityfocus.com/archive/1/483579/100/0/threaded) 10. [28136](http://secunia.com/advisories/28136) 11. [DSA-1570](http://www.debian.org/security/2008/dsa-1570) 12. [](https://issues.rpath.com/browse/RPL-1738) 13. [27773](http://secunia.com/advisories/27773) 14. [27697](http://secunia.com/advisories/27697) 15. [28406](http://secunia.com/advisories/28406) 16. [27554](http://secunia.com/advisories/27554) 17. [ADV-2008-0924](http://www.vupen.com/english/advisories/2008/0924/references) 18. [pcre-nonutf8-dos(38274)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38274) 19. [27543](http://secunia.com/advisories/27543) 20. [[gtk-devel-list] 20071107 GLib 2.14.3](http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html) 21. [29420](http://secunia.com/advisories/29420) 22. [APPLE-SA-2007-12-17](http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html) 23. [GLSA-200805-11](http://security.gentoo.org/glsa/glsa-200805-11.xml) 24. [APPLE-SA-2008-03-18](http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html) 25. [MDKSA-2007:211](http://www.mandriva.com/security/advisories?name=MDKSA-2007:211) 26. [FEDORA-2008-1842](https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html) 27. [](http://docs.info.apple.com/article.html?artnum=307179) 28. [27741](http://secunia.com/advisories/27741) 29. [ADV-2007-3790](http://www.vupen.com/english/advisories/2007/3790) 30. [ADV-2007-3725](http://www.vupen.com/english/advisories/2007/3725) 31. [SUSE-SA:2007:062](http://www.novell.com/linux/security/advisories/2007_62_pcre.html) 32. [](http://www.pcre.org/changelog.txt) 33. [](http://docs.info.apple.com/article.html?artnum=307562) 34. [30155](http://secunia.com/advisories/30155) 35. [28720](http://secunia.com/advisories/28720) 36. [GLSA-200801-02](http://security.gentoo.org/glsa/glsa-200801-02.xml) 37. [](http://bugs.gentoo.org/show_bug.cgi?id=198976) 38. [GLSA-200801-19](http://security.gentoo.org/glsa/glsa-200801-19.xml) 39. [GLSA-200801-18](http://security.gentoo.org/glsa/glsa-200801-18.xml) 40. [DSA-1399](http://www.debian.org/security/2007/dsa-1399) 41. [28414](http://secunia.com/advisories/28414) 42. [26346](http://www.securityfocus.com/bid/26346) 43. [30106](http://secunia.com/advisories/30106) 44. [28714](http://secunia.com/advisories/28714)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33832, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33832 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33832 - **State**: PUBLISHED - **Published Date**: April 30, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 02:42 UTC - **Reserved Date**: April 26, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/helloxz/onenav/issues/186)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36002 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 22:10 UTC - **Last Updated**: April 23, 2025 at 17:00 UTC - **Reserved Date**: July 15, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an open source platform for machine learning. When `Unbatch` receives a nonscalar input `id`, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 4419d10d576adefa36b0e0a9425d2569f7c0189f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-617: Security Weakness ### Affected Products **tensorflow - tensorflow** Affected versions: - < 2.7.2 (Status: affected) - >= 2.8.0, < 2.8.1 (Status: affected) - >= 2.9.0, < 2.9.1 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mh3m-62v7-68xg) 2. [](https://github.com/tensorflow/tensorflow/commit/4419d10d576adefa36b0e0a9425d2569f7c0189f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-7885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-7885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-7885 - **State**: PUBLISHED - **Published Date**: December 15, 2016 at 06:31 UTC - **Last Updated**: August 06, 2024 at 02:13 UTC - **Reserved Date**: September 09, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.2 and earlier have a vulnerability that could be used in Cross-Site Request Forgery attacks. ### Affected Products **n/a - Adobe Experience Manager 6.2 and earlier** Affected versions: - Adobe Experience Manager 6.2 and earlier (Status: affected) ### References 1. [1037464](http://www.securitytracker.com/id/1037464) 2. [94876](http://www.securityfocus.com/bid/94876) 3. [](https://helpx.adobe.com/security/products/experience-manager/apsb16-42.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4594 - **State**: PUBLISHED - **Published Date**: August 22, 2012 at 10:00 UTC - **Last Updated**: August 06, 2024 at 20:42 UTC - **Reserved Date**: August 22, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description McAfee ePolicy Orchestrator (ePO) 4.6.1 and earlier allows remote authenticated users to bypass intended access restrictions, and obtain sensitive information from arbitrary reporting panels, via a modified ID value in a console URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10025) 2. [mcafee-epolicy-idvalue-info-disc(78132)](https://exchange.xforce.ibmcloud.com/vulnerabilities/78132)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4199 - **State**: PUBLISHED - **Published Date**: August 08, 2007 at 01:11 UTC - **Last Updated**: August 07, 2024 at 14:46 UTC - **Reserved Date**: August 07, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Brian Carrier The Sleuth Kit (TSK) before 2.09 allows user-assisted remote attackers to cause a denial of service (application crash) and prevent examination of certain NTFS files via a malformed NTFS image that triggers (1) dereference of a certain integer value by ntfs_dent.c in fls, or (2) dereference of a certain other integer value by ntfs.c in fsstat. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070726 Re: Guidance Software response to iSEC report on EnCase](http://www.securityfocus.com/archive/1/474809/100/0/threaded) 2. [46997](http://osvdb.org/46997) 3. [25181](http://www.securityfocus.com/bid/25181) 4. [20070802 RE: Re: Guidance Software response to iSEC report on EnCase](http://www.securityfocus.com/archive/1/475335/100/0/threaded) 5. [[sleuthkit-announce] 20070614 TSK 2.09 Released and new Wiki](http://sourceforge.net/mailarchive/message.php?msg_name=A19F11EF-13CA-4940-AFF3-9BE08F67EE22%40sleuthkit.org) 6. [](http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24765 - **State**: PUBLISHED - **Published Date**: February 01, 2022 at 12:21 UTC - **Last Updated**: August 03, 2024 at 19:42 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Perfect Survey WordPress plugin through 1.5.2 does not validate and escape the X-Forwarded-For header value before outputting it in the statistic page when the Anonymize IP setting of a survey is turned off, leading to a Stored Cross-Site Scripting issue ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/4440e7ca-1a55-444d-8f6c-04153302d750) ### Credits - apple502j
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4986 - **State**: PUBLISHED - **Published Date**: August 25, 2010 at 19:00 UTC - **Last Updated**: August 07, 2024 at 07:24 UTC - **Reserved Date**: August 25, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in index.php in In-Portal 4.3.1, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the env parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9358](http://www.exploit-db.com/exploits/9358) 2. [36165](http://secunia.com/advisories/36165) 3. [ADV-2009-2164](http://www.vupen.com/english/advisories/2009/2164)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11513 - **State**: PUBLISHED - **Published Date**: April 25, 2019 at 02:52 UTC - **Last Updated**: August 04, 2024 at 22:55 UTC - **Reserved Date**: April 24, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://dev.cmsmadesimple.org/bug/view/12022)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-32843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-32843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-32843 - **State**: PUBLISHED - **Published Date**: December 04, 2023 at 03:46 UTC - **Last Updated**: May 29, 2025 at 13:58 UTC - **Reserved Date**: May 16, 2023 at 03:04 UTC - **Assigned By**: MediaTek ### Vulnerability Description In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849). ### Affected Products **MediaTek, Inc. - MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990** Affected versions: - Modem NR15, NR16, and NR17 (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/December-2023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53233 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 13:50 UTC - **Last Updated**: May 04, 2025 at 09:56 UTC - **Reserved Date**: November 19, 2024 at 17:17 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: unicode: Fix utf8_load() error path utf8_load() requests the symbol "utf8_data_table" and then checks if the requested UTF-8 version is supported. If it's unsupported, it tries to put the data table using symbol_put(). If an unsupported version is requested, symbol_put() fails like this: kernel BUG at kernel/module/main.c:786! RIP: 0010:__symbol_put+0x93/0xb0 Call Trace: <TASK> ? __die_body.cold+0x19/0x27 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x65/0x80 ? __symbol_put+0x93/0xb0 ? exc_invalid_op+0x51/0x70 ? __symbol_put+0x93/0xb0 ? asm_exc_invalid_op+0x1a/0x20 ? __pfx_cmp_name+0x10/0x10 ? __symbol_put+0x93/0xb0 ? __symbol_put+0x62/0xb0 utf8_load+0xf8/0x150 That happens because symbol_put() expects the unique string that identify the symbol, instead of a pointer to the loaded symbol. Fix that by using such string. ### Affected Products **Linux - Linux** Affected versions: - 2b3d047870120bcd46d7cc257d19ff49328fd585 (Status: affected) - 2b3d047870120bcd46d7cc257d19ff49328fd585 (Status: affected) - 2b3d047870120bcd46d7cc257d19ff49328fd585 (Status: affected) - 2b3d047870120bcd46d7cc257d19ff49328fd585 (Status: affected) - 2b3d047870120bcd46d7cc257d19ff49328fd585 (Status: affected) **Linux - Linux** Affected versions: - 5.17 (Status: affected) - 0 (Status: unaffected) - 6.1.120 (Status: unaffected) - 6.6.64 (Status: unaffected) - 6.11.11 (Status: unaffected) - 6.12.2 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/4387cef540f36c2c9297460758cc2438305a24a0) 2. [](https://git.kernel.org/stable/c/c4b6c1781f6cc4e2283120ac8d873864b8056f21) 3. [](https://git.kernel.org/stable/c/6504dd27123966dc455494cb55217c04ca479121) 4. [](https://git.kernel.org/stable/c/89933f8ab3b4cad5ac14ea56a39947d1ffe7d0e3) 5. [](https://git.kernel.org/stable/c/156bb2c569cd869583c593d27a5bd69e7b2a4264)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26758, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26758 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26758 - **State**: PUBLISHED - **Published Date**: April 07, 2021 at 20:50 UTC - **Last Updated**: August 03, 2024 at 20:33 UTC - **Reserved Date**: February 05, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/litespeedtech/openlitespeed/issues/217) 2. [49556](https://www.exploit-db.com/exploits/49556) 3. [](https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6331 - **State**: PUBLISHED - **Published Date**: March 05, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 17:39 UTC - **Reserved Date**: October 31, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description SQL injection vulnerability in IBM Algo One, as used in MetaData Management Tools in UDS 4.7.0 through 5.0.0, ACSWeb in Algo Security Access Control Management 4.7.0 through 4.9.0, and ACSWeb in AlgoWebApps 5.0.0, allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2013-6302. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ibm-algo-one-cve20136331-sqli(89022)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89022) 2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21666110)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2213 - **State**: PUBLISHED - **Published Date**: June 06, 2024 at 18:19 UTC - **Last Updated**: August 01, 2024 at 19:03 UTC - **Reserved Date**: March 06, 2024 at 08:29 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **zenml-io - zenml-io/zenml** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48) 2. [](https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3251 - **State**: PUBLISHED - **Published Date**: August 16, 2012 at 10:00 UTC - **Last Updated**: September 16, 2024 at 16:49 UTC - **Reserved Date**: June 06, 2012 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SSRT100926](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450382) 2. [HPSBMU02803](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450382)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2762 - **State**: PUBLISHED - **Published Date**: April 19, 2018 at 02:00 UTC - **Last Updated**: October 03, 2024 at 20:21 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.7.21 and prior (Status: affected) ### References 1. [1040698](http://www.securitytracker.com/id/1040698) 2. [](https://security.netapp.com/advisory/ntap-20180419-0002/) 3. [103794](http://www.securityfocus.com/bid/103794) 4. [RHSA-2018:3655](https://access.redhat.com/errata/RHSA-2018:3655) 5. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html) 6. [USN-3629-1](https://usn.ubuntu.com/3629-1/) 7. [USN-3629-3](https://usn.ubuntu.com/3629-3/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14378, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14378 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14378 - **State**: PUBLISHED - **Published Date**: September 30, 2020 at 00:00 UTC - **Last Updated**: August 04, 2024 at 12:46 UTC - **Reserved Date**: June 17, 2020 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period. ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **n/a - dpdk** Affected versions: - All dpdk versions before 18.11.10 and before 19.11.5 (Status: affected) ### References 1. [](https://www.openwall.com/lists/oss-security/2020/09/28/3) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1879473) 3. [USN-4550-1](https://usn.ubuntu.com/4550-1/) 4. [openSUSE-SU-2020:1593](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00004.html) 5. [openSUSE-SU-2020:1599](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00006.html) 6. [[oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues](http://www.openwall.com/lists/oss-security/2021/01/04/5) 7. [[oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues](http://www.openwall.com/lists/oss-security/2021/01/04/1) 8. [[oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues](http://www.openwall.com/lists/oss-security/2021/01/04/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-39854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-39854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-39854 - **State**: PUBLISHED - **Published Date**: September 29, 2021 at 15:39 UTC - **Last Updated**: September 17, 2024 at 01:12 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Adobe - Acrobat Reader** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb21-55.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4463 - **State**: PUBLISHED - **Published Date**: August 21, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:53 UTC - **Reserved Date**: August 21, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Fileinfo 2.0.9 plugin for Total Commander allows user-assisted remote attackers to cause a denial of service (unhandled exception) via an invalid RVA address function pointer in (1) an IMAGE_THUNK_DATA structure, involving the (a) OriginalFirstThunk and (b) FirstThunk IMAGE_IMPORT_DESCRIPTOR fields, or (2) the AddressOfNames IMAGE_EXPORT_DIRECTORY field in a PE file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [fileinfo-multiple-pe-dos(36126)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36126) 2. [](http://blog.hispasec.com/lab/advisories/adv_Fileinfo-2_09_multiple_vulnerabilities.txt) 3. [](http://blog.hispasec.com/lab/230) 4. [25373](http://www.securityfocus.com/bid/25373) 5. [20070820 [HISPASEC] Fileinfo 2.0.9 plugin for Total Commander multiple vulnerabilities](http://www.securityfocus.com/archive/1/477170/100/0/threaded) 6. [3044](http://securityreason.com/securityalert/3044) 7. [46835](http://osvdb.org/46835)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1503 - **State**: PUBLISHED - **Published Date**: March 30, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 17:12 UTC - **Reserved Date**: March 29, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in includes/functions_install.php in Virtual War (VWar) 1.5.0 R11 and earlier allows remote attackers to include and execute arbitrary PHP code via a URL in the vwar_root parameter. NOTE: this is a different vulnerability than CVE-2006-1636. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [virtual-war-functionsinstall-file-include(25497)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25497) 2. [17290](http://www.securityfocus.com/bid/17290) 3. [20060328 VWar <= 1.5.0 R11 Remote Code Execution Exploit](http://www.securityfocus.com/archive/1/429090/100/0/threaded) 4. [19438](http://secunia.com/advisories/19438) 5. [ADV-2006-1144](http://www.vupen.com/english/advisories/2006/1144) 6. [24239](http://www.osvdb.org/24239) 7. [20060403 Vendor ACK for VWar issue - VWar used by PhpNuke Clan](http://attrition.org/pipermail/vim/2006-April/000679.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21567, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21567 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21567 - **State**: PUBLISHED - **Published Date**: August 10, 2021 at 19:05 UTC - **Last Updated**: September 16, 2024 at 22:56 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS 9.1.0.x contains an improper privilege management vulnerability. It may allow an authenticated user with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE to elevate privilege. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **Dell - PowerScale OneFS** Affected versions: - 9.1.0.x (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000189495)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-8847, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-8847 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-8847 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 14, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1796 - **State**: PUBLISHED - **Published Date**: March 20, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:08 UTC - **Reserved Date**: March 20, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in IBM Tivoli Monitoring Agent (ITMA), as used in IBM DB2 9.5 before FP9 on UNIX, allows local users to gain privileges via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21586193) 2. [oval:org.mitre.oval:def:14526](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14526) 3. [IC79970](http://www-01.ibm.com/support/docview.wss?uid=swg1IC79970) 4. [db2-itma-priv-esc(74325)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74325)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33200 - **State**: REJECTED - **Last Updated**: May 28, 2025 at 18:19 UTC - **Reserved Date**: June 17, 2022 at 18:05 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56031 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 12:49 UTC - **Last Updated**: December 31, 2024 at 17:59 UTC - **Reserved Date**: December 14, 2024 at 19:42 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Yulio Aleman Jimenez Smart Shopify Product allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Shopify Product: from n/a through 1.0.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Yulio Aleman Jimenez - Smart Shopify Product** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/smart-shopify-product/vulnerability/wordpress-smart-shopify-product-plugin-1-0-2-arbitrary-content-deletion-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-50785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-50785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-50785 - **State**: PUBLISHED - **Published Date**: January 25, 2024 at 00:00 UTC - **Last Updated**: October 28, 2024 at 00:16 UTC - **Reserved Date**: December 14, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.manageengine.com/products/active-directory-audit/cve-2023-50785.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2298 - **State**: REJECTED - **Published Date**: January 22, 2019 at 20:00 UTC - **Last Updated**: January 22, 2019 at 17:57 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14711 - **State**: PUBLISHED - **Published Date**: October 23, 2020 at 04:31 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 06, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have a race condition for RBAC bypass. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2020-20/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14682 - **State**: PUBLISHED - **Published Date**: July 15, 2020 at 17:34 UTC - **Last Updated**: September 27, 2024 at 18:22 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Depot Repair product of Oracle E-Business Suite (component: Estimate and Actual Charges). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Depot Repair. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Depot Repair, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Depot Repair accessible data as well as unauthorized update, insert or delete access to some of Oracle Depot Repair accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N` ### Affected Products **Oracle Corporation - Depot Repair** Affected versions: - 12.1.1-12.1.3 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujul2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17895 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 02:00 UTC - **Last Updated**: September 17, 2024 at 02:52 UTC - **Reserved Date**: October 02, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description LAquis SCADA Versions 4.1.0.3870 and prior has several out-of-bounds read vulnerabilities, which may allow remote code execution. ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME - LAquis SCADA** Affected versions: - 4.1.0.3870 and prior (Status: affected) ### References 1. [](http://laquisscada.com/instale1.php) 2. [105719](http://www.securityfocus.com/bid/105719) 3. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32271 - **State**: PUBLISHED - **Published Date**: April 04, 2025 at 15:59 UTC - **Last Updated**: April 04, 2025 at 18:55 UTC - **Reserved Date**: April 04, 2025 at 10:02 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **ablancodev - Woocommerce Role Pricing** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/woocommerce-role-pricing/vulnerability/wordpress-woocommerce-role-pricing-plugin-3-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-6053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-6053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-6053 - **State**: PUBLISHED - **Published Date**: December 05, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 21:21 UTC - **Reserved Date**: November 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 relies on a length field to calculate an offset value, which allows remote attackers to cause a denial of service (infinite loop) via a zero value for this field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:15915](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15915) 2. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7787) 3. [](http://www.wireshark.org/security/wnpa-sec-2012-31.html) 4. [openSUSE-SU-2012:1633](http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html) 5. [openSUSE-SU-2013:0151](http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html) 6. [](http://anonsvn.wireshark.org/viewvc?view=revision&revision=45310) 7. [](http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-usb.c?r1=45310&r2=45309&pathrev=45310)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7560 - **State**: PUBLISHED - **Published Date**: March 04, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 06:31 UTC - **Reserved Date**: February 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description index.js in the Anton Myshenin aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3133 - **State**: PUBLISHED - **Published Date**: July 10, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 17, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Anonymous Method Injection Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MS13-052](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052) 2. [oval:org.mitre.oval:def:17421](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17421) 3. [TA13-190A](http://www.us-cert.gov/ncas/alerts/TA13-190A)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2400 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:23 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: User Registration). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). ### Affected Products **Oracle Corporation - iStore** Affected versions: - 12.1.1 (Status: affected) - 12.1.2 (Status: affected) - 12.1.3 (Status: affected) - 12.2.3 (Status: affected) - 12.2.4 (Status: affected) - 12.2.5 (Status: affected) - 12.2.6 (Status: affected) - 12.2.7 (Status: affected) - 12.2.8 (Status: affected) ### References 1. [106620](http://www.securityfocus.com/bid/106620) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7011, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7011 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7011 - **State**: PUBLISHED - **Published Date**: September 27, 2024 at 02:45 UTC - **Last Updated**: November 05, 2024 at 20:07 UTC - **Reserved Date**: July 23, 2024 at 04:53 UTC - **Assigned By**: NEC ### Vulnerability Description Sharp NEC Projectors (NP-CB4500UL, NP-CB4500WL, NP-CB4700UL, NP-P525UL, NP-P525UL+, NP-P525ULG, NP-P525ULJL, NP-P525WL, NP-P525WL+, NP-P525WLG, NP-P525WLJL, NP-CG6500UL, NP-CG6500WL, NP-CG6700UL, NP-P605UL, NP-P605UL+, NP-P605ULG, NP-P605ULJL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC332WJL, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME372WJL, NP-ME382U, NP-ME382UG, NP-ME382UJL, NP-ME402X, NP-ME402XG, NP-ME402XJL, NP-CB4500XL, NP-CG6400UL, NP-CG6400WL, NP-CG6500XL, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CB4600U, NP-CF6600U, NP-P474U, NP-P554U, NP-P554U+, NP-P554UG, NP-P554UJL, NP-CG6600UL, NP-P547UL, NP-P547ULG, NP-P547ULJL, NP-P607UL+, NP-P627UL, NP-P627UL+, NP-P627ULG, NP-P627ULJL, NP-PV710UL-B, NP-PV710UL-B1, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-W1, NP-PV730UL-BJL, NP-PV730UL-WJL, NP-PV800UL-B, NP-PV800UL-B+, NP-PV800UL-B1, NP-PV800UL-BJL, NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-W1, NP-PV800UL-WJL, NP-CA4200X, NP-CA4265X, NP-CA4300U, NP-CA4300W, NP-CA4305X, NP-CA4400X, NP-CD2125X, NP-CD2200W, NP-CD2300U, NP-CD2310X, NP-CR2105X, NP-CR2200X, NP-CR2205W, NP-CR2300U, NP-CR2300W, NP-CR2315X, NP-CR2400X, NP-MC333XG, NP-MC363XG, NP-MC393WJL, NP-MC423W, NP-MC423WG, NP-MC453X, NP-MC453X, NP-MC453XG, NP-MC453XJL, NP-ME383WG, NP-ME403U, NP-ME403UG, NP-ME403UJL, NP-ME423W, NP-ME423WG, NP-ME423WJL, NP-ME453X, NP-ME453XG, NP-CB4400USL, NP-CB4400WSL, NP-CB4510UL, NP-CB4510WL, NP-CB4510XL, NP-CB4550USL, NP-CB6700UL, NP-CG6510UL, NP-PE456USL, NP-PE456USLG, NP-PE456USLJL, NP-PE456WSLG, NP-PE506UL, NP-PE506ULG, NP-PE506ULJL, NP-PE506WL, NP-PE506WLG, NP-PE506WLJL) allows an attacker to cause a denial-of-service (DoS) condition via SNMP service. ### Weakness Classification (CWE) - CWE-1242: Security Weakness ### Affected Products **Sharp NEC Display Solutions, Ltd. - NP-CB4500UL, NP-CB4500WL, NP-CB4700UL, NP-P525UL, NP-P525UL+, NP-P525ULG, NP-P525ULJL, NP-P525WL, NP-P525WL+, NP-P525WLG, NP-P525WLJL, NP-CG6500UL, NP-CG6500WL, NP-CG6700UL, NP-P605UL, NP-P605UL+, NP-P605ULG, NP-P605ULJL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC332WJL, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME372WJL, NP-ME382U, NP-ME382UG, NP-ME382UJL, NP-ME402X, NP-ME402XG, NP-ME402XJL, NP-CB4500XL, NP-CG6400UL, NP-CG6400WL, NP-CG6500XL, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CB4600U, NP-CF6600U, NP-P474U, NP-P554U, NP-P554U+, NP-P554UG, NP-P554UJL, NP-CG6600UL, NP-P547UL, NP-P547ULG, NP-P547ULJL, NP-P607UL+, NP-P627UL, NP-P627UL+, NP-P627ULG, NP-P627ULJL, NP-PV710UL-B, NP-PV710UL-B1, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-W1, NP-PV730UL-BJL, NP-PV730UL-WJL, NP-PV800UL-B, NP-PV800UL-B+, NP-PV800UL-B1, NP-PV800UL-BJL, NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-W1, NP-PV800UL-WJL, NP-CA4200X, NP-CA4265X, NP-CA4300U, NP-CA4300W, NP-CA4305X, NP-CA4400X, NP-CD2125X, NP-CD2200W, NP-CD2300U, NP-CD2310X, NP-CR2105X, NP-CR2200X, NP-CR2205W, NP-CR2300U, NP-CR2300W, NP-CR2315X, NP-CR2400X, NP-MC333XG, NP-MC363XG, NP-MC393WJL, NP-MC423W, NP-MC423WG, NP-MC453X, NP-MC453X, NP-MC453XG, NP-MC453XJL, NP-ME383WG, NP-ME403U, NP-ME403UG, NP-ME403UJL, NP-ME423W, NP-ME423WG, NP-ME423WJL, NP-ME453X, NP-ME453XG, NP-CB4400USL, NP-CB4400WSL, NP-CB4510UL, NP-CB4510WL, NP-CB4510XL, NP-CB4550USL, NP-CB6700UL, NP-CG6510UL, NP-PE456USL, NP-PE456USLG, NP-PE456USLJL, NP-PE456WSLG, NP-PE506UL, NP-PE506ULG, NP-PE506ULJL, NP-PE506WL, NP-PE506WLG, NP-PE506WLJL** Affected versions: - all (Status: affected) ### References 1. [](https://www.sharp-nec-displays.com/global/support/info/Projector_vulnerability_202408.html) ### Credits - Southern Metropolitan Cemeteries Trust JP Hofmeyr
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15990, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15990 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15990 - **State**: PUBLISHED - **Published Date**: November 03, 2020 at 02:21 UTC - **Last Updated**: August 04, 2024 at 13:30 UTC - **Reserved Date**: July 27, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1133671) 3. [openSUSE-SU-2020:1829](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html) 4. [FEDORA-2020-127d40f1ab](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/) 5. [FEDORA-2020-8aca25b5c8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/) 6. [FEDORA-2020-4e8e48da22](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/) 7. [DSA-4824](https://www.debian.org/security/2021/dsa-4824)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0496 - **State**: PUBLISHED - **Published Date**: February 10, 2009 at 01:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 09, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.gentoo.org/show_bug.cgi?id=254309) 2. [32943](http://www.securityfocus.com/bid/32943) 3. [openfire-serverproperties-xss(47835)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47835) 4. [32940](http://www.securityfocus.com/bid/32940) 5. [32944](http://www.securityfocus.com/bid/32944) 6. [](http://www.igniterealtime.org/issues/browse/JM-1506) 7. [33452](http://secunia.com/advisories/33452) 8. [32935](http://www.securityfocus.com/bid/32935) 9. [openfire-mucroomeditform-xss(47845)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47845) 10. [openfire-multiple-scripts-xss(47834)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47834) 11. [32939](http://www.securityfocus.com/bid/32939) 12. [32938](http://www.securityfocus.com/bid/32938) 13. [32937](http://www.securityfocus.com/bid/32937) 14. [20090108 CORE-2008-1128: Openfire multiple vulnerabilities](http://www.securityfocus.com/archive/1/499880/100/0/threaded) 15. [](http://www.coresecurity.com/content/openfire-multiple-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-36553, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-36553 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-36553 - **State**: PUBLISHED - **Published Date**: November 14, 2023 at 18:05 UTC - **Last Updated**: October 22, 2024 at 20:53 UTC - **Reserved Date**: June 23, 2023 at 14:57 UTC - **Assigned By**: fortinet ### Vulnerability Description A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Fortinet - FortiSIEM** Affected versions: - 5.4.0 (Status: affected) - 5.3.0 (Status: affected) - 5.2.5 (Status: affected) - 5.2.1 (Status: affected) - 5.1.0 (Status: affected) - 5.0.0 (Status: affected) - 4.10.0 (Status: affected) - 4.9.0 (Status: affected) - 4.7.2 (Status: affected) ### References 1. [https://fortiguard.com/psirt/FG-IR-23-135](https://fortiguard.com/psirt/FG-IR-23-135)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-15803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-15803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-15803 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 20:15 UTC - **Last Updated**: August 05, 2024 at 00:56 UTC - **Reserved Date**: August 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html) 2. [](https://www.zyxel.com/support/gs1900-switch-vulnerabilities.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4250, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4250 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4250 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91716](http://www.securityfocus.com/bid/91716) 2. [1036281](http://www.securitytracker.com/id/1036281) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0372 - **State**: PUBLISHED - **Published Date**: March 10, 2021 at 15:55 UTC - **Last Updated**: August 03, 2024 at 15:40 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In getMediaOutputSliceAction of RemoteMediaSlice.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174047735 ### Affected Products **n/a - Android** Affected versions: - Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2021-03-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5212, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5212 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5212 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 17:55 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In NetHack before 3.6.5, an extremely long value for the MENUCOLOR configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files. Users should upgrade to NetHack 3.6.5. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **NetHack - NetHack** Affected versions: - < 3.6.5 (Status: affected) ### References 1. [](https://github.com/NetHack/NetHack/security/advisories/GHSA-g89f-m829-4m56)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-31296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-31296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-31296 - **State**: PUBLISHED - **Published Date**: December 29, 2023 at 00:00 UTC - **Last Updated**: August 27, 2024 at 18:25 UTC - **Reserved Date**: April 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows attackers to obtain sensitive information via the User Name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://herolab.usd.de/en/security-advisories/usd-2022-0054/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42049 - **State**: PUBLISHED - **Published Date**: October 06, 2021 at 20:47 UTC - **Last Updated**: August 04, 2024 at 03:22 UTC - **Reserved Date**: October 06, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows oversighters to whitewash revisions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://phabricator.wikimedia.org/T286884) 2. [](https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37522 - **State**: PUBLISHED - **Published Date**: July 21, 2024 at 07:10 UTC - **Last Updated**: August 02, 2024 at 03:57 UTC - **Reserved Date**: June 09, 2024 at 13:11 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dario Curasì CC & BCC for Woocommerce Order Emails allows Stored XSS.This issue affects CC & BCC for Woocommerce Order Emails: from n/a through 1.4.1. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Dario Curasì - CC & BCC for Woocommerce Order Emails** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/cc-bcc-for-woocommerce-order-emails/wordpress-cc-bcc-for-woocommerce-order-emails-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Joshua Chan (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2233 - **State**: PUBLISHED - **Published Date**: August 18, 2008 at 17:15 UTC - **Last Updated**: August 07, 2024 at 08:49 UTC - **Reserved Date**: May 16, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The client in Openwsman 1.2.0 and 2.0.0, in unknown configurations, allows remote Openwsman servers to replay SSL sessions via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [30694](http://www.securityfocus.com/bid/30694) 2. [ADV-2008-2397](http://www.vupen.com/english/advisories/2008/2397) 3. [SUSE-SA:2008:041](http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html) 4. [31429](http://secunia.com/advisories/31429)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-11042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-11042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-11042 - **State**: REJECTED - **Published Date**: September 18, 2018 at 20:00 UTC - **Last Updated**: September 18, 2018 at 19:57 UTC - **Reserved Date**: May 14, 2018 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3595 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:41 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3590, CVE-2016-3591, CVE-2016-3592, CVE-2016-3593, CVE-2016-3594, and CVE-2016-3596. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988009) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 3. [91940](http://www.securityfocus.com/bid/91940) 4. [91787](http://www.securityfocus.com/bid/91787) 5. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988718) 6. [1036370](http://www.securitytracker.com/id/1036370)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0884, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0884 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0884 - **State**: PUBLISHED - **Published Date**: March 13, 2012 at 01:00 UTC - **Last Updated**: August 06, 2024 at 18:38 UTC - **Reserved Date**: January 19, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2012-4630](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html) 2. [RHSA-2012:0531](http://rhn.redhat.com/errata/RHSA-2012-0531.html) 3. [](http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564) 4. [FEDORA-2012-18035](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html) 5. [](https://downloads.avaya.com/css/P8/documents/100162507) 6. [RHSA-2012:1308](http://rhn.redhat.com/errata/RHSA-2012-1308.html) 7. [openSUSE-SU-2012:0547](https://hermes.opensuse.org/messages/14330767) 8. [RHSA-2012:1307](http://rhn.redhat.com/errata/RHSA-2012-1307.html) 9. [](http://www.openssl.org/news/secadv_20120312.txt) 10. [48916](http://secunia.com/advisories/48916) 11. [RHSA-2012:0488](http://rhn.redhat.com/errata/RHSA-2012-0488.html) 12. [DSA-2454](http://www.debian.org/security/2012/dsa-2454) 13. [48895](http://secunia.com/advisories/48895) 14. [48580](http://secunia.com/advisories/48580) 15. [VU#737740](http://www.kb.cert.org/vuls/id/737740) 16. [RHSA-2012:1306](http://rhn.redhat.com/errata/RHSA-2012-1306.html) 17. [FEDORA-2012-4665](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html) 18. [HPSBOV02793](http://marc.info/?l=bugtraq&m=134039053214295&w=2) 19. [57353](http://secunia.com/advisories/57353) 20. [RHSA-2012:0426](http://rhn.redhat.com/errata/RHSA-2012-0426.html) 21. [HPSBUX02782](http://marc.info/?l=bugtraq&m=133728068926468&w=2) 22. [SSRT100891](http://marc.info/?l=bugtraq&m=134039053214295&w=2) 23. [SSRT100852](http://marc.info/?l=bugtraq&m=133951357207000&w=2) 24. [FEDORA-2012-4659](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html) 25. [HPSBMU02776](http://marc.info/?l=bugtraq&m=133951357207000&w=2) 26. [SSRT100844](http://marc.info/?l=bugtraq&m=133728068926468&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9755, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9755 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9755 - **State**: PUBLISHED - **Published Date**: January 20, 2017 at 15:00 UTC - **Last Updated**: August 06, 2024 at 13:55 UTC - **Reserved Date**: November 02, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows remote attackers to perform a replay attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20160203 Security Advisories](http://www.securityfocus.com/archive/1/537441/100/0/threaded) 2. [](http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html) 3. [20160203 Security Advisories](http://seclists.org/fulldisclosure/2016/Feb/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11195 - **State**: PUBLISHED - **Published Date**: July 12, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 18:05 UTC - **Reserved Date**: July 12, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://twitter.com/sxcurity/status/884556905145937921) 2. [](http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf) 3. [99615](http://www.securityfocus.com/bid/99615)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37149, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37149 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37149 - **State**: PUBLISHED - **Published Date**: November 03, 2021 at 15:20 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 21, 2021 at 00:00 UTC - **Assigned By**: apache ### Vulnerability Description Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Apache Software Foundation - Apache Traffic Server** Affected versions: - 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164) 2. [DSA-5153](https://www.debian.org/security/2022/dsa-5153) ### Credits - Apache Traffic Server would like to thank Mattias Grenfeldt and Asta Olofsson for reporting this issue
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42422 - **State**: PUBLISHED - **Published Date**: December 03, 2024 at 12:15 UTC - **Last Updated**: December 03, 2024 at 14:23 UTC - **Reserved Date**: August 01, 2024 at 07:28 UTC - **Assigned By**: dell ### Vulnerability Description Dell NetWorker, version(s) 19.10, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Dell - NetWorker** Affected versions: - 19.11 (Status: affected) - N/A (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-44396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-44396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-44396 - **State**: PUBLISHED - **Published Date**: April 15, 2024 at 17:13 UTC - **Last Updated**: August 02, 2024 at 20:07 UTC - **Reserved Date**: September 28, 2023 at 17:56 UTC - **Assigned By**: GitHub_M ### Vulnerability Description iTop is an IT service management platform. Dashlet edits ajax endpoints can be used to produce XSS. Fixed in iTop 2.7.10, 3.0.4, and 3.1.1. ### CVSS Metrics - **CVSS Base Score**: 6.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-80: Security Weakness ### Affected Products **Combodo - iTop** Affected versions: - < 2.7.1 (Status: affected) - >= 3.0.0, < 3.0.4 (Status: affected) - >= 3.1.0, < 3.1.1 (Status: affected) ### References 1. [https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35](https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35) 2. [https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273](https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273) 3. [https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f](https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-1365, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-1365 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-1365 - **State**: PUBLISHED - **Published Date**: July 01, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 09:42 UTC - **Reserved Date**: January 08, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple iOS before 7.1.2, Apple Safari before 6.1.5 and 7.x before 7.0.5, and Apple TV before 6.1.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-06-30-1, APPLE-SA-2014-06-30-3, and APPLE-SA-2014-06-30-4. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.apple.com/kb/HT6537) 2. [APPLE-SA-2014-06-30-4](http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html) 3. [APPLE-SA-2014-06-30-3](http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html) 4. [59481](http://secunia.com/advisories/59481) 5. [1030495](http://www.securitytracker.com/id/1030495) 6. [APPLE-SA-2014-06-30-1](http://archives.neohapsis.com/archives/bugtraq/2014-06/0171.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0042 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:27 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in University of Washington's implementation of IMAP and POP servers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5247, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5247 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5247 - **State**: PUBLISHED - **Published Date**: November 30, 2023 at 03:57 UTC - **Last Updated**: December 02, 2024 at 19:02 UTC - **Reserved Date**: September 28, 2023 at 07:26 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **Mitsubishi Electric Corporation - GX Works3** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSOFT iQ AppPortal** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - MELSOFT Navigator** Affected versions: - all versions (Status: affected) **Mitsubishi Electric Corporation - Motion Control Setting** Affected versions: - all versions (Status: affected) ### References 1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-016_en.pdf) 2. [](https://jvn.jp/vu/JVNVU93383160/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26662 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 00:09 UTC - **Last Updated**: May 13, 2025 at 14:06 UTC - **Reserved Date**: February 12, 2025 at 21:05 UTC - **Assigned By**: sap ### Vulnerability Description The Data Services Management Console does not sufficiently encode user-controlled inputs, allowing an attacker to inject malicious script. When a targeted victim, who is already logged in, clicks on the compromised link, the injected script gets executed within the scope of victim�s browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SAP_SE - SAP Data Services Management Console** Affected versions: - SBOP DS JOB SERVER 4.3 (Status: affected) ### References 1. [](https://me.sap.com/notes/3558755) 2. [](https://url.sap/sapsecuritypatchday)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4205 - **State**: PUBLISHED - **Published Date**: June 23, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: June 04, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IOS XR 5.3.1 on ASR 9000 devices allows remote attackers to cause a denial of service (NPU chip reset or line-card reload) by sending crafted IEEE 802.3x flow-control PAUSE frames on the local network, aka Bug ID CSCut19959. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [75352](http://www.securityfocus.com/bid/75352) 2. [1032691](http://www.securitytracker.com/id/1032691) 3. [20150622 Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers Denial of Service Vulnerability](http://tools.cisco.com/security/center/viewAlert.x?alertId=39455)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0327, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0327 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0327 - **State**: PUBLISHED - **Published Date**: March 14, 2022 at 14:41 UTC - **Last Updated**: August 02, 2024 at 23:25 UTC - **Reserved Date**: January 21, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Master Addons for Elementor WordPress plugin before 1.8.5 does not sanitise and escape the error_message parameter before outputting it back in the response of the jltma_restrict_content AJAX action, available to unauthenticated and authenticated users, leading to a Reflected Cross-Site Scripting ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Master Addons for Elementor** Affected versions: - 1.8.5 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883) ### Credits - Krzysztof Zając
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9987 - **State**: PUBLISHED - **Published Date**: April 18, 2018 at 08:00 UTC - **Last Updated**: August 05, 2024 at 07:24 UTC - **Reserved Date**: April 10, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Zulip Server versions 1.5.x, 1.6.x, and 1.7.x before 1.7.2, there was an XSS issue with muting notifications. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.zulip.org/2018/04/12/zulip-1-7-2-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9198, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9198 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9198 - **State**: PUBLISHED - **Published Date**: December 14, 2016 at 00:37 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: November 06, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Active Directory integration component of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack. More Information: CSCuw15041. Known Affected Releases: 1.2(1.199). ### Affected Products **n/a - Cisco Identity Services Engine (ISE)** Affected versions: - Cisco Identity Services Engine (ISE) (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ise) 2. [1037415](http://www.securitytracker.com/id/1037415) 3. [94810](http://www.securityfocus.com/bid/94810)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-24997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-24997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-24997 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 14:49 UTC - **Last Updated**: March 26, 2025 at 14:33 UTC - **Reserved Date**: February 01, 2023 at 10:29 UTC - **Assigned By**: apache ### Vulnerability Description Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 https://github.com/apache/inlong/pull/7223  to solve it. ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **Apache Software Foundation - Apache InLong** Affected versions: - 1.1.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8) ### Credits - This issue was discovered by s3gundo of Hundsun Tech
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43453 - **State**: PUBLISHED - **Published Date**: December 01, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 19:37 UTC - **Reserved Date**: September 18, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the IP parameter of the setDiagnosisCfg component. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tharsis1024/vuln/blob/main/TOTOLINK/X6000R/2.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13587, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13587 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13587 - **State**: PUBLISHED - **Published Date**: February 18, 2025 at 04:21 UTC - **Last Updated**: February 18, 2025 at 19:28 UTC - **Reserved Date**: January 21, 2025 at 14:39 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Zigaform – Price Calculator & Cost Estimation Form Builder Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zgfm_fvar' shortcode in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **softdiscover - Zigaform – Price Calculator & Cost Estimation Form Builder Lite** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0946fab3-6299-4f62-9664-c0a049e2dbb3?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/zigaform-calculator-cost-estimation-form-builder-lite/trunk/modules/formbuilder/controllers/uiform-fb-controller-frontend.php#L999) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3358 - **State**: PUBLISHED - **Published Date**: September 25, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 07, 2014 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Memory leak in Cisco IOS 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.3.xSE before 3.3.2SE, 3.3.xXO before 3.3.1XO, 3.5.xE before 3.5.2E, and 3.11.xS before 3.11.1S allows remote attackers to cause a denial of service (memory consumption, and interface queue wedge or device reload) via malformed mDNS packets, aka Bug ID CSCuj58950. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ciscoios-cve20143358-dos(96183)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96183) 2. [](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns/cvrf/cisco-sa-20140924-mdns_cvrf.xml) 3. [70139](http://www.securityfocus.com/bid/70139) 4. [20140924 Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns) 5. [1030898](http://www.securitytracker.com/id/1030898)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16650 - **State**: PUBLISHED - **Published Date**: November 07, 2017 at 23:00 UTC - **Last Updated**: August 05, 2024 at 20:27 UTC - **Reserved Date**: November 07, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The qmi_wwan_bind function in drivers/net/usb/qmi_wwan.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3617-1](https://usn.ubuntu.com/3617-1/) 2. [USN-3619-2](https://usn.ubuntu.com/3619-2/) 3. [USN-3617-3](https://usn.ubuntu.com/3617-3/) 4. [](https://patchwork.ozlabs.org/patch/834770/) 5. [USN-3754-1](https://usn.ubuntu.com/3754-1/) 6. [](https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ) 7. [101791](http://www.securityfocus.com/bid/101791) 8. [USN-3617-2](https://usn.ubuntu.com/3617-2/) 9. [USN-3619-1](https://usn.ubuntu.com/3619-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6238 - **State**: PUBLISHED - **Published Date**: September 21, 2015 at 19:00 UTC - **Last Updated**: August 06, 2024 at 07:15 UTC - **Reserved Date**: August 14, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Google Analyticator plugin before 6.4.9.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) ga_adsense, (2) ga_admin_disable_DimentionIndex, (3) ga_downloads_prefix, (4) ga_downloads, or (5) ga_outbound_prefix parameter in the google-analyticator page to wp-admin/admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/8159) 2. [](https://wordpress.org/plugins/google-analyticator/changelog/) 3. [](https://www.netsparker.com/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27613 - **State**: PUBLISHED - **Published Date**: July 28, 2022 at 06:35 UTC - **Last Updated**: September 17, 2024 at 01:40 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in webapi component in Synology CardDAV Server before 6.0.10-0153 allows remote authenticated users to inject SQL commands via unspecified vectors. ### CVSS Metrics - **CVSS Base Score**: 8.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Synology - CardDAV Server** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.synology.com/security/advisory/Synology_SA_21_06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2582 - **State**: PUBLISHED - **Published Date**: May 08, 2023 at 00:00 UTC - **Last Updated**: January 28, 2025 at 20:28 UTC - **Reserved Date**: May 08, 2023 at 00:00 UTC - **Assigned By**: tenable ### Vulnerability Description A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser. ### Affected Products **n/a - Strikingly** Affected versions: - All versions (Status: affected) ### References 1. [](https://www.tenable.com/security/research/tra-2023-18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9700, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9700 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9700 - **State**: PUBLISHED - **Published Date**: December 05, 2017 at 17:00 UTC - **Last Updated**: September 17, 2024 at 04:25 UTC - **Reserved Date**: June 15, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer overwrite is possible in fw_name_store if image name is 64 characters. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2017-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-17942, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-17942 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-17942 - **State**: PUBLISHED - **Published Date**: December 28, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 21:06 UTC - **Reserved Date**: December 28, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugzilla.maptools.org/show_bug.cgi?id=2767) 2. [102312](http://www.securityfocus.com/bid/102312)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1556, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1556 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1556 - **State**: PUBLISHED - **Published Date**: May 14, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:51 UTC - **Reserved Date**: May 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gamespy cd-key validation system allows remote attackers to cause a denial of service (cd-key already in use) by capturing and replaying a cd-key authorization session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [gamespy-sdk-cdkey-mult-games-dos(20417)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20417) 2. [20050504 Gamespy cd-key validation system: "Cd-key in use" DoS versus many games](http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0065.html) 3. [20050510 Gamespy cd-key validation system: "Cd-key in use" DoS versus many games](http://marc.info/?l=bugtraq&m=111575820116969&w=2) 4. [](http://aluigi.altervista.org/adv/gskeyinuse-adv.txt) 5. [15254](http://secunia.com/advisories/15254)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23131 - **State**: PUBLISHED - **Published Date**: February 22, 2024 at 04:05 UTC - **Last Updated**: January 28, 2025 at 16:44 UTC - **Reserved Date**: January 11, 2024 at 21:47 UTC - **Assigned By**: autodesk ### Vulnerability Description A maliciously crafted STP file, when parsed in ASMIMPORT229A.dll, ASMKERN228A.dll, ASMkern229A.dll or ASMDATAX228A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-119: Security Weakness ### Affected Products **Autodesk - AutoCAD** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD Architecture** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD Electrical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD Mechanical** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD MEP** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD Plant 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - Civil 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - Advance Steel** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) **Autodesk - AutoCAD MAP 3D** Affected versions: - 2025 (Status: affected) - 2024 (Status: affected) - 2023 (Status: affected) - 2022 (Status: affected) - 2021 (Status: affected) ### References 1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002) 2. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004) 3. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-8812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-8812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-8812 - **State**: PUBLISHED - **Published Date**: November 15, 2017 at 08:00 UTC - **Last Updated**: August 05, 2024 at 16:48 UTC - **Reserved Date**: May 07, 2017 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows remote attackers to inject > (greater than) characters via the id attribute of a headline. ### Affected Products **n/a - MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2** Affected versions: - MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 (Status: affected) ### References 1. [1039812](http://www.securitytracker.com/id/1039812) 2. [](https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html) 3. [DSA-4036](https://www.debian.org/security/2017/dsa-4036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26901 - **State**: PUBLISHED - **Published Date**: April 15, 2022 at 19:05 UTC - **Last Updated**: January 02, 2025 at 18:51 UTC - **Reserved Date**: March 11, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Excel Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Office 2019 for Mac** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Office Online Server** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC for Mac 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Excel 2016** Affected versions: - 16.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft Excel 2013 Service Pack 1** Affected versions: - 15.0.0.0 (Status: affected) **Microsoft - Microsoft Office 2013 Service Pack 1** Affected versions: - 15.0.0 (Status: affected) **Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1** Affected versions: - 15.0.1 (Status: affected) ### References 1. [Microsoft Excel Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26901)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-46300, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-46300 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-46300 - **State**: PUBLISHED - **Published Date**: March 21, 2023 at 22:10 UTC - **Last Updated**: January 17, 2025 at 22:08 UTC - **Reserved Date**: December 21, 2022 at 17:02 UTC - **Assigned By**: icscert ### Vulnerability Description Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. ### Affected Products **VISAM - VBASE** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29157, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29157 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29157 - **State**: PUBLISHED - **Published Date**: June 28, 2021 at 11:58 UTC - **Last Updated**: August 03, 2024 at 22:02 UTC - **Reserved Date**: March 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AC:H/AV:L/A:N/C:H/I:H/PR:L/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://dovecot.org/security) 2. [](https://www.openwall.com/lists/oss-security/2021/06/28/1) 3. [FEDORA-2021-208340a217](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JB2VTJ3G2ILYWH5Y2FTY2PUHT2MD6VMI/) 4. [FEDORA-2021-891c1ab1ac](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TK424DWFO2TKJYXZ2H3XL633TYJL4GQN/) 5. [GLSA-202107-41](https://security.gentoo.org/glsa/202107-41)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3166 - **State**: PUBLISHED - **Published Date**: September 09, 2010 at 18:00 UTC - **Last Updated**: August 07, 2024 at 03:03 UTC - **Reserved Date**: August 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [SUSE-SA:2010:049](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html) 2. [oval:org.mitre.oval:def:12186](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12186) 3. [](http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox) 4. [FEDORA-2010-14362](http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html) 5. [](http://www.mozilla.org/security/announce/2010/mfsa2010-53.html) 6. [](http://support.avaya.com/css/P8/documents/100112690) 7. [42867](http://secunia.com/advisories/42867) 8. [ADV-2011-0061](http://www.vupen.com/english/advisories/2011/0061) 9. [MDVSA-2010:173](http://www.mandriva.com/security/advisories?name=MDVSA-2010:173) 10. [ADV-2010-2323](http://www.vupen.com/english/advisories/2010/2323) 11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=579655) 12. [43102](http://www.securityfocus.com/bid/43102)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26800, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26800 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26800 - **State**: PUBLISHED - **Published Date**: March 26, 2023 at 00:00 UTC - **Last Updated**: February 20, 2025 at 15:37 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Ruijie Networks RG-EW1200 Wireless Routers EW_3.0(1)B11P204 was discovered to contain a command injetion vulnerability via the params.path parameter in the upgradeConfirm function. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/winmt/my-vuls/tree/main/RG-EW1200)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11410, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11410 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11410 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 04:23 UTC - **Last Updated**: December 12, 2024 at 14:59 UTC - **Reserved Date**: November 19, 2024 at 13:52 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Top and footer bars for announcements, notifications, advertisements, promotions – YooBar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Yoo Bar settings in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **sharabindu - Top and footer bars for announcements, notifications, advertisements, promotions – YooBar** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/64d6099e-2435-4a3a-9dcc-dba4a674c711?source=cve) 2. [](https://wordpress.org/plugins/yoo-bar/#developers) ### Credits - SOPROBRO
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2946 - **State**: PUBLISHED - **Published Date**: August 18, 2011 at 23:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in an ActiveX control in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to execute arbitrary code via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1025943](http://www.securitytracker.com/id?1025943) 2. [](http://service.real.com/realplayer/security/08162011_player/en/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1457, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1457 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1457 - **State**: PUBLISHED - **Published Date**: February 03, 2015 at 16:00 UTC - **Last Updated**: August 06, 2024 at 04:40 UTC - **Reserved Date**: February 03, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Fortinet FortiAuthenticator 3.0.0 allows local users to read arbitrary files via the -f flag to the dig command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html) 2. [fortinetfortiauthenticator-dig-info-disc(100560)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100560) 3. [72378](http://www.securityfocus.com/bid/72378) 4. [](http://www.fortiguard.com/advisory/FG-IR-15-003/) 5. [](http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25784, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25784 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25784 - **State**: PUBLISHED - **Published Date**: May 04, 2022 at 13:56 UTC - **Last Updated**: August 03, 2024 at 04:49 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: Secomea ### Vulnerability Description Cross-site Scripting (XSS) vulnerability in Web GUI of SiteManager allows logged-in user to inject scripting. This issue affects: Secomea SiteManager all versions prior to 9.7. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Secomea - SiteManager** Affected versions: - all (Status: affected) ### References 1. [](https://www.secomea.com/support/cybersecurity-advisory/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0415, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0415 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0415 - **State**: PUBLISHED - **Published Date**: January 24, 2023 at 00:00 UTC - **Last Updated**: April 02, 2025 at 15:13 UTC - **Reserved Date**: January 20, 2023 at 00:00 UTC - **Assigned By**: GitLab ### Vulnerability Description iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L` ### Affected Products **Wireshark Foundation - Wireshark** Affected versions: - >=4.0.0, <4.0.3 (Status: affected) - >=3.6.0, <3.6.11 (Status: affected) ### References 1. [](https://www.wireshark.org/security/wnpa-sec-2023-05.html) 2. [](https://gitlab.com/wireshark/wireshark/-/issues/18796) 3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json) 4. [[debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update](https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23030 - **State**: PUBLISHED - **Published Date**: January 13, 2025 at 23:34 UTC - **Last Updated**: January 14, 2025 at 15:36 UTC - **Reserved Date**: January 10, 2025 at 15:11 UTC - **Assigned By**: GitHub_M ### Vulnerability Description WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **LabRedesCefetRJ - WeGIA** Affected versions: - < 3.2.6 (Status: affected) ### References 1. [https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-88c9-gpgh-6vvr](https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-88c9-gpgh-6vvr) 2. [https://github.com/LabRedesCefetRJ/WeGIA/commit/420b88e7aceed53c42e9eff7d21beee8465f93b8](https://github.com/LabRedesCefetRJ/WeGIA/commit/420b88e7aceed53c42e9eff7d21beee8465f93b8)