System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-1079, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-1079 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1079
- **State**: PUBLISHED
- **Published Date**: February 07, 2024 at 07:32 UTC
- **Last Updated**: August 22, 2024 at 15:30 UTC
- **Reserved Date**: January 30, 2024 at 18:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Quiz Maker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ays_show_results() function in all versions up to, and including, 6.5.2.4. This makes it possible for unauthenticated attackers to fetch arbitrary quiz results which can contain PII.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**ays-pro - Quiz Maker**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/602df370-cd5b-46dc-a653-6522aef0c62f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3032035/quiz-maker/tags/6.5.2.5/admin/class-quiz-maker-admin.php?old=3030468&old_path=quiz-maker%2Ftags%2F6.5.2.4%2Fadmin%2Fclass-quiz-maker-admin.php)
### Credits
- Lucio Sá
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-20359, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-20359 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20359
- **State**: PUBLISHED
- **Published Date**: December 22, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 11:58 UTC
- **Reserved Date**: December 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An invalid memory address dereference was discovered in the sbrDecodeSingleFramePS function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/knik0/faad2/issues/29)
2. [DSA-4522](https://www.debian.org/security/2019/dsa-4522)
3. [20190916 [SECURITY] [DSA 4522-1] faad2 security update](https://seclists.org/bugtraq/2019/Sep/28)
4. [GLSA-202006-17](https://security.gentoo.org/glsa/202006-17)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-37255, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-37255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37255
- **State**: PUBLISHED
- **Published Date**: April 16, 2023 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 18:33 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tp-link.com/)
2. [](http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1390, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1390
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 18:52 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
### Affected Products
**Microsoft - Internet Explorer 9**
Affected versions:
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows Server 2012 R2 (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows Server 2019 (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Internet Explorer 11 on Windows Server 2012**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 10**
Affected versions:
- Windows Server 2012 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1390)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-50059, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-50059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50059
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 19:39 UTC
- **Last Updated**: May 04, 2025 at 09:44 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
In the switchtec_ntb_add function, it can call switchtec_ntb_init_sndev
function, then &sndev->check_link_status_work is bound with
check_link_status_work. switchtec_ntb_link_notification may be called
to start the work.
If we remove the module which will call switchtec_ntb_remove to make
cleanup, it will free sndev through kfree(sndev), while the work
mentioned above will be used. The sequence of operations that may lead
to a UAF bug is as follows:
CPU0 CPU1
| check_link_status_work
switchtec_ntb_remove |
kfree(sndev); |
| if (sndev->link_force_down)
| // use sndev
Fix it by ensuring that the work is canceled before proceeding with
the cleanup in switchtec_ntb_remove.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.285 (Status: unaffected)
- 5.10.227 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.57 (Status: unaffected)
- 6.11.4 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5126d8f5567f49b52e21fca320eaa97977055099)
2. [](https://git.kernel.org/stable/c/b650189687822b705711f0567a65a164a314d8df)
3. [](https://git.kernel.org/stable/c/92728fceefdaa2a0a3aae675f86193b006eeaa43)
4. [](https://git.kernel.org/stable/c/3ae45be8492460a35b5aebf6acac1f1d32708946)
5. [](https://git.kernel.org/stable/c/fa840ba4bd9f3bad7f104e5b32028ee73af8b3dd)
6. [](https://git.kernel.org/stable/c/177925d9c8715a897bb79eca62628862213ba956)
7. [](https://git.kernel.org/stable/c/e51aded92d42784313ba16c12f4f88cc4f973bbb)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4781, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4781 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4781
- **State**: PUBLISHED
- **Published Date**: August 16, 2024 at 14:17 UTC
- **Last Updated**: August 19, 2024 at 18:28 UTC
- **Reserved Date**: May 10, 2024 at 18:54 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A denial-of-service vulnerability was reported in some Lenovo printers that could allow an unauthenticated attacker on a shared network to crash printer communications until the system is rebooted.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Lenovo - Printers**
Affected versions:
- various (Status: affected)
### References
1. [](https://iknow.lenovo.com.cn/detail/422688)
### Credits
- Lenovo thanks Jia-Ju Bai, Rui-Nan Hu, Cheng Li, Dong Zhang, Yu-Chen Sun, Wen-Han Xu, Zhen-Yu Guan, and Jian-Wei Liu from School of Cyber Science and Technology of Beihang University for reporting these issues.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12779
- **State**: PUBLISHED
- **Published Date**: June 07, 2019 at 19:44 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ClusterLabs/libqb/issues/338)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1695948)
3. [](https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5)
4. [](https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4)
5. [108691](http://www.securityfocus.com/bid/108691)
6. [openSUSE-SU-2019:1718](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html)
7. [openSUSE-SU-2019:1752](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html)
8. [openSUSE-SU-2019:1891](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html)
9. [RHSA-2019:3610](https://access.redhat.com/errata/RHSA-2019:3610)
10. [GLSA-202107-03](https://security.gentoo.org/glsa/202107-03)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20969, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20969
- **State**: PUBLISHED
- **Published Date**: November 03, 2022 at 19:31 UTC
- **Last Updated**: November 20, 2024 at 14:32 UTC
- **Reserved Date**: November 02, 2021 at 13:28 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in multiple management dashboard pages of Cisco Umbrella could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the Cisco Umbrella dashboard.
This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to the web application and persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Umbrella Dashboard**
Affected versions:
- N/A (Status: affected)
### References
1. [cisco-sa-umbrella-xss-LfeYQV3](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-xss-LfeYQV3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9449, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9449
- **State**: PUBLISHED
- **Published Date**: October 09, 2024 at 06:44 UTC
- **Last Updated**: October 09, 2024 at 13:28 UTC
- **Reserved Date**: October 02, 2024 at 20:49 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Auto iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**gregross - Auto iFrame**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1a09dcc4-37ee-425d-b824-a593c22d711f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/auto-iframe/trunk/auto-iframe.php#L127)
3. [](https://wordpress.org/plugins/auto-iframe/#developers)
4. [](https://plugins.trac.wordpress.org/browser/auto-iframe/trunk/auto-iframe.php#L173)
5. [](https://plugins.trac.wordpress.org/changeset/3164574/)
### Credits
- Christofer Roth
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-9138, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-9138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9138
- **State**: PUBLISHED
- **Published Date**: March 30, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: March 30, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=23008)
2. [USN-4326-1](https://usn.ubuntu.com/4326-1/)
3. [USN-4336-1](https://usn.ubuntu.com/4336-1/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-26115, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-26115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26115
- **State**: PUBLISHED
- **Published Date**: June 22, 2023 at 05:00 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: February 20, 2023 at 10:28 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P`
### Affected Products
**n/a - word-wrap**
Affected versions:
- 0 (Status: affected)
**n/a - org.webjars.npm:word-wrap**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973)
2. [](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657)
3. [](https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39)
4. [](https://github.com/jonschlinkert/word-wrap/releases/tag/1.2.4)
5. [](https://security.netapp.com/advisory/ntap-20240621-0006/)
### Credits
- Carter Snook
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-23925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-23925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23925
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:07 UTC
- **Last Updated**: January 17, 2025 at 18:56 UTC
- **Reserved Date**: January 16, 2025 at 11:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jimmy Peña Feedburner Optin Form allows Stored XSS.This issue affects Feedburner Optin Form: from n/a through 0.2.8.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Jimmy Peña - Feedburner Optin Form**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/feedburner-optin-form/vulnerability/wordpress-feedburner-optin-form-plugin-0-2-8-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-27164, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-27164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27164
- **State**: PUBLISHED
- **Published Date**: June 14, 2024 at 03:42 UTC
- **Last Updated**: February 13, 2025 at 17:46 UTC
- **Reserved Date**: February 21, 2024 at 02:11 UTC
- **Assigned By**: Toshiba
### Vulnerability Description
Toshiba printers contain hardcoded credentials. As for the affected products/models/versions, see the reference URL.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**Toshiba Tec Corporation - Toshiba Tec e-Studio multi-function peripheral (MFP)**
Affected versions:
- see the reference URL (Status: affected)
### References
1. [](https://www.toshibatec.com/information/20240531_01.html)
2. [](https://www.toshibatec.com/information/pdf/information20240531_01.pdf)
3. [](https://jvn.jp/en/vu/JVNVU97136265/index.html)
4. [](http://seclists.org/fulldisclosure/2024/Jul/1)
### Credits
- We expresses its gratitude to Pierre Barre for reporting relevant security vulnerabilities for our products.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-0463, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-0463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0463
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: May 12, 2004 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-18374, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-18374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18374
- **State**: PUBLISHED
- **Published Date**: November 25, 2019 at 16:22 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Symantec Critical System Protection (CSP), versions 8.0, 8.0 HF1 & 8.0 MP1, may be susceptible to an authentication bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing authentication controls.
### Affected Products
**Symantec - Critical System Protection (CSP)**
Affected versions:
- 8.0 (Status: affected)
- 8.0 HF1 (Status: affected)
- 8.0 MP1 (Status: affected)
### References
1. [](https://support.symantec.com/us/en/article.SYMSA1498.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21918
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 15:40 UTC
- **Last Updated**: May 04, 2025 at 07:24 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Fix NULL pointer access
Resources should be released only after all threads that utilize them
have been destroyed.
This commit ensures that resources are not released prematurely by waiting
for the associated workqueue to complete before deallocating them.
### Affected Products
**Linux - Linux**
Affected versions:
- b9aa02ca39a49740926c2c450a1505a4a0f8954a (Status: affected)
- b9aa02ca39a49740926c2c450a1505a4a0f8954a (Status: affected)
- b9aa02ca39a49740926c2c450a1505a4a0f8954a (Status: affected)
- b9aa02ca39a49740926c2c450a1505a4a0f8954a (Status: affected)
- b9aa02ca39a49740926c2c450a1505a4a0f8954a (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 6.1.133 (Status: unaffected)
- 6.6.83 (Status: unaffected)
- 6.12.19 (Status: unaffected)
- 6.13.7 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7a735a8a46f6ebf898bbefd96659ca5da798bce0)
2. [](https://git.kernel.org/stable/c/46fba7be161bb89068958138ea64ec33c0b446d4)
3. [](https://git.kernel.org/stable/c/079a3e52f3e751bb8f5937195bdf25c5d14fdff0)
4. [](https://git.kernel.org/stable/c/592a0327d026a122e97e8e8bb7c60cbbe7697344)
5. [](https://git.kernel.org/stable/c/b13abcb7ddd8d38de769486db5bd917537b32ab1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13917, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13917
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-22954, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-22954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22954
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 19:37 UTC
- **Last Updated**: February 04, 2025 at 14:20 UTC
- **Reserved Date**: January 10, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
### Affected Products
**n/a - VMware Workspace ONE Access and Identity Manager**
Affected versions:
- Access 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0. Identity Manager 3.3.6, 3.3.5, 3.3.4, 3.3.3. (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2022-0011.html)
2. [](http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-24128, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-24128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24128
- **State**: PUBLISHED
- **Published Date**: March 01, 2023 at 00:00 UTC
- **Last Updated**: March 07, 2025 at 17:46 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://eagle.com)
2. [](http://jensen.com)
3. [](https://oxnan.com/posts/WifiBasic_wepkey2_DoS)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10693, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10693
- **State**: PUBLISHED
- **Published Date**: June 04, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
pm2-kafka is a PM2 module that installs and runs a kafka server pm2-kafka downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - pm2-kafka node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/299)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12605, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12605
- **State**: PUBLISHED
- **Published Date**: August 07, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 18:43 UTC
- **Reserved Date**: August 06, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OpenCV (Open Source Computer Vision Library) through 3.3 has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20180722 [SECURITY] [DLA 1438-1] opencv security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html)
2. [GLSA-201712-02](https://security.gentoo.org/glsa/201712-02)
3. [](https://github.com/xiaoqx/pocs/blob/master/opencv.md)
4. [](https://github.com/opencv/opencv/issues/9309)
5. [[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update](https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-31121, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-31121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31121
- **State**: REJECTED
- **Published Date**: August 24, 2021 at 18:53 UTC
- **Last Updated**: August 24, 2021 at 18:53 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-9677, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-9677 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9677
- **State**: PUBLISHED
- **Published Date**: July 22, 2020 at 19:19 UTC
- **Last Updated**: August 04, 2024 at 10:34 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Prelude versions 9.0 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Prelude**
Affected versions:
- 9.0 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/prelude/apsb20-46.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-8635, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-8635 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8635
- **State**: PUBLISHED
- **Published Date**: August 01, 2018 at 13:00 UTC
- **Last Updated**: August 06, 2024 at 02:27 UTC
- **Reserved Date**: October 12, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
### Weakness Classification (CWE)
- CWE-358: Security Weakness
### Affected Products
**Mozilla - nss**
Affected versions:
- 3.21.x (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8635)
2. [RHSA-2016:2779](http://rhn.redhat.com/errata/RHSA-2016-2779.html)
3. [GLSA-201701-46](https://security.gentoo.org/glsa/201701-46)
4. [94346](http://www.securityfocus.com/bid/94346)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7595, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7595
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23646, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23646
- **State**: PUBLISHED
- **Published Date**: February 17, 2022 at 20:35 UTC
- **Last Updated**: April 23, 2025 at 19:02 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-451: Security Weakness
### Affected Products
**vercel - next.js**
Affected versions:
- >= 10.0.0, < 12.1.0 (Status: affected)
### References
1. [](https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj)
2. [](https://github.com/vercel/next.js/pull/34075)
3. [](https://github.com/vercel/next.js/releases/tag/v12.1.0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10217, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10217
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 19:12 UTC
- **Last Updated**: November 21, 2024 at 16:15 UTC
- **Reserved Date**: October 21, 2024 at 18:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility), monitoringconsolecommon.jar in TIBCO Software Inc TIBCO Hawk and TIBCO Operational Intelligence
### Affected Products
**TIBCO Software Inc - TIBCO Hawk**
Affected versions:
- 6.2 (Status: affected)
**TIBCO Software Inc - TIBCO Operational Intelligence**
Affected versions:
- 7.3 (Status: affected)
### References
1. [](https://community.tibco.com/advisories)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-5330, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-5330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5330
- **State**: PUBLISHED
- **Published Date**: October 19, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 18, 2014 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in BirdBlog allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70610](http://www.securityfocus.com/bid/70610)
2. [JVNDB-2014-000121](http://jvndb.jvn.jp/jvndb/JVNDB-2014-000121)
3. [JVN#87373393](http://jvn.jp/en/jp/JVN87373393/index.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1212, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1212
- **State**: PUBLISHED
- **Published Date**: March 06, 2023 at 00:00 UTC
- **Last Updated**: March 06, 2025 at 18:32 UTC
- **Reserved Date**: March 06, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**phpipam - phpipam/phpipam**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499)
2. [](https://github.com/phpipam/phpipam/commit/78e0470100a6cb143fe9af2e336dce80e4620960)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-22637, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-22637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22637
- **State**: PUBLISHED
- **Published Date**: March 27, 2025 at 15:26 UTC
- **Last Updated**: March 27, 2025 at 16:15 UTC
- **Reserved Date**: January 07, 2025 at 21:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in verkkovaraani Print PDF Generator and Publisher allows Cross Site Request Forgery.This issue affects Print PDF Generator and Publisher: from n/a through 1.2.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**verkkovaraani - Print PDF Generator and Publisher**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/nopeamedia/vulnerability/wordpress-print-pdf-generator-and-publisher-plugin-1-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Khang Duong (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0250, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0250
- **State**: PUBLISHED
- **Published Date**: March 24, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 04:03 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2548-1](http://www.ubuntu.com/usn/USN-2548-1)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21963275)
3. [MDVSA-2015:203](http://www.mandriva.com/security/advisories?name=MDVSA-2015:203)
4. [DSA-3205](http://www.debian.org/security/2015/dsa-3205)
5. [1032781](http://www.securitytracker.com/id/1032781)
6. [](http://advisories.mageia.org/MGASA-2015-0138.html)
7. [20150322 [CVE-2015-0250] Apache Batik Information Disclosure Vulnerability (XXE Injection)](http://seclists.org/fulldisclosure/2015/Mar/142)
8. [RHSA-2016:0042](http://rhn.redhat.com/errata/RHSA-2016-0042.html)
9. [](http://xmlgraphics.apache.org/security.html)
10. [RHSA-2016:0041](http://rhn.redhat.com/errata/RHSA-2016-0041.html)
11. [](http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-4372, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-4372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4372
- **State**: PUBLISHED
- **Published Date**: January 02, 2023 at 21:49 UTC
- **Last Updated**: April 10, 2025 at 17:55 UTC
- **Reserved Date**: December 09, 2022 at 03:21 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Web Invoice WordPress plugin through 2.1.3 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL Injection exploitable by high privilege users such as admin by default. However, depending on the plugin configuration, other users, such as subscriber could exploit this as well
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - Web Invoice**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae)
2. [](https://bulletin.iese.de/post/web-invoice_2-1-3_2)
### Credits
- Daniel Krohmer
- Kunal Sharma
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11880, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11880 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11880
- **State**: PUBLISHED
- **Published Date**: November 15, 2017 at 03:00 UTC
- **Last Updated**: September 17, 2024 at 04:28 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to run a specially crafted application and obtain information to further compromise the user's system due to the Windows kernel improperly initializing objects in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11831.
### Affected Products
**Microsoft Corporation - Windows Kernel**
Affected versions:
- Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016. (Status: affected)
### References
1. [101755](http://www.securityfocus.com/bid/101755)
2. [1039782](http://www.securitytracker.com/id/1039782)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11880)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-2761, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-2761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2761
- **State**: PUBLISHED
- **Published Date**: December 06, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 14, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm)
2. [RHSA-2011:1797](http://www.redhat.com/support/errata/RHSA-2011-1797.html)
3. [SUSE-SR:2011:001](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html)
4. [FEDORA-2011-0653](http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html)
5. [43068](http://secunia.com/advisories/43068)
6. [[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)](http://openwall.com/lists/oss-security/2010/12/01/2)
7. [69588](http://osvdb.org/69588)
8. [43165](http://secunia.com/advisories/43165)
9. [[oss-security] 20101201 Re: CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)](http://openwall.com/lists/oss-security/2010/12/01/3)
10. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=591165)
12. [](https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380)
13. [](http://www.bugzilla.org/security/3.2.9/)
14. [](https://bugzilla.mozilla.org/show_bug.cgi?id=600464)
15. [FEDORA-2011-0741](http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html)
16. [SUSE-SR:2011:005](http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html)
17. [ADV-2011-0271](http://www.vupen.com/english/advisories/2011/0271)
18. [43033](http://secunia.com/advisories/43033)
19. [ADV-2011-0207](http://www.vupen.com/english/advisories/2011/0207)
20. [42877](http://secunia.com/advisories/42877)
21. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
22. [](http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1)
23. [ADV-2011-0249](http://www.vupen.com/english/advisories/2011/0249)
24. [FEDORA-2011-0755](http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html)
25. [MDVSA-2010:250](http://www.mandriva.com/security/advisories?name=MDVSA-2010:250)
26. [](http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html)
27. [MDVSA-2010:237](http://www.mandriva.com/security/advisories?name=MDVSA-2010:237)
28. [69589](http://osvdb.org/69589)
29. [ADV-2011-0076](http://www.vupen.com/english/advisories/2011/0076)
30. [[oss-security] 20101201 CVE Request -- perl-CGI two ids, perl-CGI-Simple one id (CVE-2010-3172 already assigned for Bugzilla part)](http://openwall.com/lists/oss-security/2010/12/01/1)
31. [](http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes)
32. [FEDORA-2011-0631](http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html)
33. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705)
34. [43147](http://secunia.com/advisories/43147)
35. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0957, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0957
- **State**: PUBLISHED
- **Published Date**: April 25, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: December 08, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0957)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-47507, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-47507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47507
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 19:12 UTC
- **Reserved Date**: December 15, 2022 at 00:00 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**SolarWinds - SolarWinds Platform**
Affected versions:
- 2022.4.1 and prior versions (Status: affected)
### References
1. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-1_release_notes.htm)
2. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-47507)
### Credits
- SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-9092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-9092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9092
- **State**: PUBLISHED
- **Published Date**: March 27, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: March 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a CSRF vulnerability in mc-admin/conf.php in MiniCMS 1.10 that can change the administrator account password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bg5sbk/MiniCMS/issues/14)
2. [44362](https://www.exploit-db.com/exploits/44362/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10739, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10739
- **State**: PUBLISHED
- **Published Date**: January 21, 2019 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 03:30 UTC
- **Reserved Date**: January 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=20018)
2. [106672](http://www.securityfocus.com/bid/106672)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1347549)
4. [openSUSE-SU-2019:1250](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html)
5. [RHSA-2019:2118](https://access.redhat.com/errata/RHSA-2019:2118)
6. [RHSA-2019:3513](https://access.redhat.com/errata/RHSA-2019:3513)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0351, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0351
- **State**: PUBLISHED
- **Published Date**: April 09, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in (1) termsh, (2) atcronsh, and (3) auditsh in SCO OpenServer 5.0.6 and 5.0.7 might allow local users to execute arbitrary code via a long HOME environment variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [13062](http://www.securityfocus.com/bid/13062)
2. [SCOSA-2005.15](ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.15/SCOSA-2005.15.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-46576, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-46576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46576
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 01:16 UTC
- **Last Updated**: April 28, 2025 at 15:34 UTC
- **Reserved Date**: April 25, 2025 at 00:28 UTC
- **Assigned By**: zte
### Vulnerability Description
There is a Permission Management and Access Control vulnerability in the GoldenDB database product. Attackers can manipulate requests to bypass privilege restrictions and delete content.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**ZTE - GoldenDB**
Affected versions:
- 6.1.03.09 (Status: affected)
- 7.2.01.01 (Status: unaffected)
- Lite7.2.01.01 (Status: affected)
### References
1. [](https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1036467615091601464)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17057, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17057
- **State**: PUBLISHED
- **Published Date**: December 04, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: November 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a reflected XSS vulnerability in ZKTime Web 2.0.1.12280. The vulnerability exists due to insufficient filtration of user-supplied data in the 'Range' field of the 'Department' module in a Personnel Advanced Query. A remote attacker can execute arbitrary HTML and script code in the browser in the context of the vulnerable application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/145159/ZKTeco-ZKTime-Web-2.0.1.12280-Cross-Site-Scripting.html)
2. [102006](http://www.securityfocus.com/bid/102006)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12380, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12380
- **State**: PUBLISHED
- **Published Date**: March 13, 2025 at 05:56 UTC
- **Last Updated**: March 14, 2025 at 14:35 UTC
- **Reserved Date**: December 09, 2024 at 18:30 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue was discovered in GitLab EE/CE affecting all versions starting from 11.5 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2. Certain user inputs in repository mirroring settings could potentially expose sensitive authentication information.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-209: Improper Input Validation
### Affected Products
**GitLab - GitLab**
Affected versions:
- 11.5 (Status: affected)
- 17.8 (Status: affected)
- 17.9 (Status: affected)
### References
1. [GitLab Issue #508557](https://gitlab.com/gitlab-org/gitlab/-/issues/508557)
2. [HackerOne Bug Bounty Report #2868951](https://hackerone.com/reports/2868951)
### Credits
- Thanks [sigitsetiawansss](https://hackerone.com/sigitsetiawansss) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-23824, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-23824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23824
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 15:18 UTC
- **Last Updated**: August 01, 2024 at 23:13 UTC
- **Reserved Date**: January 22, 2024 at 22:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**mailcow - mailcow-dockerized**
Affected versions:
- < 2024-01 (Status: affected)
### References
1. [https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7](https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7)
2. [https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed](https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed)
3. [https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack](https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20868, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20868 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20868
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 00:00 UTC
- **Last Updated**: January 16, 2025 at 14:40 UTC
- **Reserved Date**: November 01, 2022 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
NSX-T contains a reflected cross-site scripting vulnerability due to a lack of input validation. A remote attacker can inject HTML or JavaScript to redirect to malicious pages.
### Affected Products
**n/a - NSX-T**
Affected versions:
- NSX-T 3.2.x VCF 4.5.x (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2023-0010.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-34773, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-34773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34773
- **State**: PUBLISHED
- **Published Date**: November 04, 2021 at 15:35 UTC
- **Last Updated**: November 07, 2024 at 21:43 UTC
- **Reserved Date**: June 15, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. These actions could include modifying the device configuration and deleting (but not creating) user accounts.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Cisco - Cisco Unified Communications Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [20211103 Cisco Unified Communications Products Cross-Site Request Forgery Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-xrTkDu3H)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3385, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3385
- **State**: PUBLISHED
- **Published Date**: August 01, 2023 at 23:35 UTC
- **Last Updated**: May 22, 2025 at 04:06 UTC
- **Reserved Date**: June 23, 2023 at 10:15 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project 'from export' could access and read unrelated files via uploading a specially crafted file. This was due to a bug in `tar`, fixed in [`tar-1.35`](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html).
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**GitLab - GitLab**
Affected versions:
- 8.10 (Status: affected)
- 16.1.0 (Status: affected)
- 16.2.0 (Status: affected)
### References
1. [GitLab Issue #416161](https://gitlab.com/gitlab-org/gitlab/-/issues/416161)
2. [HackerOne Bug Bounty Report #2032730](https://hackerone.com/reports/2032730)
### Credits
- Thanks [ubercomp](https://hackerone.com/ubercomp) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22855, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22855
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 16:11 UTC
- **Reserved Date**: January 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md)
2. [20230216 Remote Code Execution in Kardex MLOG](http://seclists.org/fulldisclosure/2023/Feb/10)
3. [](http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html)
4. [](http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html)
5. [](https://www.exploit-db.com/exploits/51239)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45591, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45591
- **State**: PUBLISHED
- **Published Date**: March 05, 2024 at 11:19 UTC
- **Last Updated**: August 23, 2024 at 20:21 UTC
- **Reserved Date**: October 09, 2023 at 08:26 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
A CWE-122 “Heap-based Buffer Overflow” vulnerability in the “logger_generic” function of the “Ax_rtu” binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**AiLux - imx6 bundle**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591)
### Credits
- Andrea Palanca of Nozomi Networks found this bug during a security research activity.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-43225, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-43225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43225
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 21:17 UTC
- **Last Updated**: August 14, 2024 at 13:49 UTC
- **Reserved Date**: August 09, 2024 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeLooks Enter Addons allows Stored XSS.This issue affects Enter Addons: from n/a through 2.1.7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ThemeLooks - Enter Addons**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/enteraddons/wordpress-enter-addons-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Michael (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24029, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24029 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24029
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 21:17 UTC
- **Last Updated**: April 15, 2025 at 18:54 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the rp-pppoe.so binary.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**TCL - LinkHub Mesh Wifi**
Affected versions:
- MS1G_00_01.00_14 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10792, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10792 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10792
- **State**: PUBLISHED
- **Published Date**: July 02, 2017 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a NULL Pointer Dereference in the function ll_insert() of the libpspp library in GNU PSPP before 0.11.0. For example, a crash was observed within the library code when attempting to convert invalid SPSS data into CSV format. A crafted input will lead to a remote denial of service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99385](http://www.securityfocus.com/bid/99385)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1467005)
3. [[pspp-announce] 20170812 pspp-0.11.0 released [stable]](http://lists.gnu.org/archive/html/pspp-announce/2017-08/msg00000.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-1520, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-1520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1520
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 15:20 UTC
- **Reserved Date**: April 28, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird < 91.9.
### Affected Products
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-18/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1745019)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-5402, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-5402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5402
- **State**: PUBLISHED
- **Published Date**: August 27, 2015 at 01:50 UTC
- **Last Updated**: August 06, 2024 at 06:50 UTC
- **Reserved Date**: July 07, 2015 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP Systems Insight Manager (SIM) before 7.5.0, as used in HP Matrix Operating Environment before 7.5.0 and other products, allows local users to gain privileges, and consequently obtain sensitive information, modify data, or cause a denial of service, via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04762744)
2. [](https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04774019)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-29842, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-29842 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29842
- **State**: PUBLISHED
- **Published Date**: September 16, 2021 at 15:50 UTC
- **Last Updated**: September 17, 2024 at 01:16 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 21.0.0.9 could allow a remote user to enumerate usernames due to a difference of responses from valid and invalid login attempts. IBM X-Force ID: 205202.
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 7.0 (Status: affected)
- 8.0 (Status: affected)
- 8.5 (Status: affected)
- 9.0 (Status: affected)
**IBM - WebSphere Application Server Liberty**
Affected versions:
- 17.0.0.3 (Status: affected)
- 21.0.0.9 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6489485)
2. [ibm-websphere-cve202129842-info-disc (205202)](https://exchange.xforce.ibmcloud.com/vulnerabilities/205202)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4440, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4440
- **State**: PUBLISHED
- **Published Date**: August 20, 2023 at 23:00 UTC
- **Last Updated**: August 02, 2024 at 07:24 UTC
- **Reserved Date**: August 20, 2023 at 07:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0. It has been classified as critical. This affects an unknown part of the file appointment.php. The manipulation of the argument sheduledate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237561 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Free Hospital Management System for Small Practices**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.237561)
2. [](https://vuldb.com/?ctiid.237561)
3. [](https://github.com/CookedMelon/cve/tree/master/hospital/patient)
### Credits
- CookedMelon (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-0562, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-0562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0562
- **State**: PUBLISHED
- **Published Date**: September 17, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: December 20, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://helpx.adobe.com/security/products/reader/apsb14-20.html)
2. [1030853](http://www.securitytracker.com/id/1030853)
3. [69822](http://www.securityfocus.com/bid/69822)
4. [adobe-reader-cve20140562-xss(95997)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95997)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3873, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3873
- **State**: PUBLISHED
- **Published Date**: January 03, 2011 at 19:26 UTC
- **Last Updated**: August 07, 2024 at 03:26 UTC
- **Reserved Date**: October 08, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[netdev] 20101102 [SECURITY] memory corruption in X.25 facilities parsing](http://www.spinics.net/lists/netdev/msg145786.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=649693)
3. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2)
4. [[oss-security] 20101104 Re: CVE request: X.25 remote DoS](http://openwall.com/lists/oss-security/2010/11/04/3)
5. [ADV-2011-0375](http://www.vupen.com/english/advisories/2011/0375)
6. [[oss-security] 20101103 CVE request: X.25 remote DoS](http://openwall.com/lists/oss-security/2010/11/03/2)
7. [openSUSE-SU-2013:0925](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html)
8. [SUSE-SA:2011:008](http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html)
9. [MDVSA-2011:029](http://www.mandriva.com/security/advisories?name=MDVSA-2011:029)
10. [43291](http://secunia.com/advisories/43291)
11. [[netdev] 20101104 Re: [SECURITY] memory corruption in X.25 facilities parsing](http://www.spinics.net/lists/netdev/msg145873.html)
12. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6331d6f9a4298173b413cf99a40cc86a9d92c37)
13. [DSA-2126](http://www.debian.org/security/2010/dsa-2126)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6428, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6428
- **State**: PUBLISHED
- **Published Date**: March 20, 2020 at 13:52 UTC
- **Last Updated**: August 04, 2024 at 09:02 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html)
2. [](https://crbug.com/1057593)
3. [openSUSE-SU-2020:0365](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html)
4. [DSA-4645](https://www.debian.org/security/2020/dsa-4645)
5. [FEDORA-2020-7fd051b378](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/)
6. [GLSA-202003-53](https://security.gentoo.org/glsa/202003-53)
7. [FEDORA-2020-17149a4f3d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/)
8. [openSUSE-SU-2020:0389](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html)
9. [FEDORA-2020-39e0b8bd14](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-13852, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-13852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13852
- **State**: PUBLISHED
- **Published Date**: June 11, 2020 at 02:15 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 04, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Artica Pandora FMS 7.44 allows arbitrary file upload (leading to remote command execution) via the File Manager feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.coresecurity.com/advisories)
2. [](https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-2107, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-2107 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2107
- **State**: PUBLISHED
- **Published Date**: August 05, 2005 at 04:00 UTC
- **Last Updated**: September 16, 2024 at 20:36 UTC
- **Reserved Date**: August 05, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the lookup script in Veridis OpenKeyServer (OKS) 1.2 allows remote attackers to inject arbitrary web script or HTML via the search parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openkeyserver-web-interface-css(8651)](http://www.iss.net/security_center/static/8651.php)
2. [4369](http://www.securityfocus.com/bid/4369)
3. [](http://www.securiteam.com/securitynews/5BP0R1P6KE.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-3434, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-3434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3434
- **State**: PUBLISHED
- **Published Date**: August 01, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: August 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apple iTunes before 10.5.1 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5030)
2. [](http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf)
3. [APPLE-SA-2011-11-14-1](http://lists.apple.com/archives/Security-announce/2011/Nov/msg00003.html)
4. [oval:org.mitre.oval:def:17136](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17136)
5. [](http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz)
6. [20080728 Tool release: [evilgrade] - Using DNS cache poisoning to exploit poor update implementations](http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3548, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3548
- **State**: PUBLISHED
- **Published Date**: May 26, 2021 at 20:32 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - dmg2img**
Affected versions:
- dmg2img through 20170502 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1959585)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-30491, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-30491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30491
- **State**: PUBLISHED
- **Published Date**: August 05, 2023 at 22:35 UTC
- **Last Updated**: September 25, 2024 at 16:52 UTC
- **Reserved Date**: April 11, 2023 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CodeBard CodeBard's Patron Button and Widgets for Patreon plugin <= 2.1.8 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CodeBard - CodeBard's Patron Button and Widgets for Patreon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/patron-button-and-widgets-by-codebard/wordpress-codebard-s-patron-button-and-widgets-for-patreon-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LOURCODE (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-0859, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-0859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0859
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 09:21 UTC
- **Last Updated**: February 12, 2025 at 19:51 UTC
- **Reserved Date**: January 29, 2025 at 21:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Post and Page Builder by BoldGrid – Visual Drag and Drop Editor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.27.6 via the template_via_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**boldgrid - Post and Page Builder by BoldGrid – Visual Drag and Drop Editor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve)
2. [](https://wordpress.org/plugins/post-and-page-builder/#developers)
3. [](https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178)
4. [](https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php)
5. [](https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471)
### Credits
- Michael Mazzolini
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-5939, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-5939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5939
- **State**: PUBLISHED
- **Published Date**: August 20, 2024 at 02:03 UTC
- **Last Updated**: September 03, 2024 at 15:15 UTC
- **Reserved Date**: June 12, 2024 at 21:48 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'setup_wizard' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to read the setup wizard administrative pages.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**webdevmattcrom - GiveWP – Donation Plugin and Fundraising Platform**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a104f88b-deae-465d-b4c1-9a1fc78e5ee9?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/Onboarding/Wizard/Page.php#L78)
3. [](https://plugins.trac.wordpress.org/changeset/3120745/)
### Credits
- Villu Orav
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-54919, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-54919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54919
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 00:00 UTC
- **Last Updated**: December 10, 2024 at 17:10 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stored Cross Site Scripting (XSS ) was found in /teacher_avatar.php of kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary java script via the filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/XSS%20by%20File%20Upload%20-%20Update%20Avatar.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8152, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8152
- **State**: PUBLISHED
- **Published Date**: January 21, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:10 UTC
- **Reserved Date**: October 10, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Santuario XML Security for Java 2.0.x before 2.0.3 allows remote attackers to bypass the streaming XML signature protection mechanism via a crafted XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [apache-santuario-cve20148152-sec-bypass(99993)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99993)
2. [](http://santuario.apache.org/secadv.data/CVE-2014-8152.txt.asc)
3. [72115](http://www.securityfocus.com/bid/72115)
4. [1031556](http://www.securitytracker.com/id/1031556)
5. [[oss-security] 20150119 New Apache Santuario security advisory CVE-2014-8152](http://seclists.org/oss-sec/2015/q1/181)
6. [[santuario-commits] 20190823 svn commit: r1049214 - in /websites/production/santuario/content: cache/main.pageCache download.html index.html javaindex.html javareleasenotes.html secadv.data/CVE-2019-12400.asc secadv.html](https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E)
7. [[santuario-commits] 20210917 svn commit: r1076843 - in /websites/production/santuario/content: cache/main.pageCache index.html javaindex.html secadv.data/CVE-2021-40690.txt.asc secadv.html](https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2392, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2392
- **State**: PUBLISHED
- **Published Date**: June 16, 2016 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 16, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [83274](http://www.securityfocus.com/bid/83274)
2. [[qemu-devel] 20160211 [Qemu-devel] [PATCH] usb: check USB configuration descriptor object](https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg02553.html)
3. [[oss-security] 20160216 CVE request Qemu: usb: null pointer dereference in remote NDIS control message handling](http://www.openwall.com/lists/oss-security/2016/02/16/7)
4. [GLSA-201604-01](https://security.gentoo.org/glsa/201604-01)
5. [USN-2974-1](http://www.ubuntu.com/usn/USN-2974-1)
6. [](http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=80eecda8e5d09c442c24307f340840a5b70ea3b9)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=1302299)
8. [[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html)
9. [[qemu-stable] 20160329 [Qemu-stable] [ANNOUNCE] QEMU 2.5.1 Stable released](http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10645, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10645
- **State**: PUBLISHED
- **Published Date**: May 02, 2018 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Golden Frog VyprVPN 2.12.1.8015 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "VyprVPN" service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. The "SetProperty" method allows an attacker to configure the "AdditionalOpenVpnParameters" property and control the OpenVPN command line. Using the OpenVPN "plugin" parameter, an attacker may specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. This attack may be conducted using "VyprVPN Free" account credentials and the VyprVPN Desktop Client.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VerSprite/research/blob/master/advisories/VS-2018-025.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48659, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48659
- **State**: PUBLISHED
- **Published Date**: November 17, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:37 UTC
- **Reserved Date**: November 17, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MISP before 2.4.176. app/Controller/AppController.php mishandles parameter parsing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176)
2. [](https://github.com/MISP/MISP/commit/37ecf81b84a01baa4d4b1fade4de94a9018c32ed)
3. [](https://zigrin.com/advisories/misp-reflected-cross-site-scripting-in-galaxies/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-56924, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-56924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56924
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 00:00 UTC
- **Last Updated**: January 23, 2025 at 16:25 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross Site Request Forgery (CSRF) vulnerability in Code Astro Internet banking system 2.0.0 allows remote attackers to execute arbitrary JavaScript on the admin page (pages_account), potentially leading to unauthorized actions such as changing account settings or stealing sensitive user information. This vulnerability occurs due to improper validation of user requests, which enables attackers to exploit the system by tricking the admin user into executing malicious scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ipratheep/CVE-2024-56924)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-37354, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-37354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37354
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:58 UTC
- **Last Updated**: August 02, 2024 at 17:09 UTC
- **Reserved Date**: June 30, 2023 at 17:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PNG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20458.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Kofax - Power PDF**
Affected versions:
- 5.0.0.19 (Status: affected)
### References
1. [ZDI-23-949](https://www.zerodayinitiative.com/advisories/ZDI-23-949/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1291, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1291
- **State**: PUBLISHED
- **Published Date**: April 30, 2009 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: April 13, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in TIBCO SmartSockets before 6.8.2, SmartSockets Product Family (aka RTworks) before 4.0.5, and Enterprise Message Service (EMS) 4.0.0 through 5.1.1, as used in SmartSockets Server and RTworks Server (aka RTserver), SmartSockets client libraries and add-on products, RTworks libraries and components, EMS Server (aka tibemsd), SmartMQ, iProcess Engine, ActiveMatrix products, and CA Enterprise Communicator, allows remote attackers to execute arbitrary code via "inbound data," as demonstrated by requests to the UDP interface of the RTserver component, and data injection into the TCP stream to tibemsd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tibco.com/multimedia/security_advisory_rtworks_tcm8-7559.txt)
2. [](http://www.tibco.com/services/support/advisories/default.jsp)
3. [1022129](http://securitytracker.com/id?1022129)
4. [34754](http://www.securityfocus.com/bid/34754)
5. [](http://www.tibco.com/multimedia/security_advisory_smartsockets_tcm8-7560.txt)
6. [20090428 TIBCO SmartSockets Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=785)
7. [smartsockets-udp-bo(50214)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50214)
8. [ADV-2009-1198](http://www.vupen.com/english/advisories/2009/1198)
9. [](http://www.harmonysecurity.com/blog/2009/04/tibco-smartsockets-stack-buffer.html)
10. [](http://www.tibco.com/services/support/advisories/smartsockets-sspfm-ems_advisory_20090428.jsp)
11. [34911](http://secunia.com/advisories/34911)
12. [](http://www.tibco.com/multimedia/security_advisory_ems_tcm8-7558.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-12678, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-12678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12678
- **State**: PUBLISHED
- **Published Date**: June 22, 2018 at 18:00 UTC
- **Last Updated**: September 17, 2024 at 00:21 UTC
- **Reserved Date**: June 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Portainer before 1.18.0 supports unauthenticated requests to the websocket endpoint with an unvalidated id query parameter for the /websocket/exec endpoint, which allows remote attackers to bypass intended access restrictions or conduct SSRF attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/portainer/portainer/pull/1979)
2. [](https://github.com/portainer/portainer/releases/tag/1.18.0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-17180, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-17180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17180
- **State**: PUBLISHED
- **Published Date**: May 17, 2019 at 15:58 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in OpenEMR before 5.0.1 Patch 7. Directory Traversal exists via docid=../ to /portal/lib/download_template.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#5.0.1_Patch_.289.2F9.2F18.29)
2. [](https://github.com/openemr/openemr/commit/4963fe4932a0a4e1e982642226174e9931d09541)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1409, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1409
- **State**: PUBLISHED
- **Published Date**: March 20, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 19, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in the Default theme in Exero CMS 1.0.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the theme parameter to (1) index.php, (2) editpassword.php, and (3) avatar.php in usercp/; (4) custompage.php; (5) errors/404.php; (6) memberslist.php and (7) profile.php in members/; (8) index.php and (9) fullview.php in news/; and (10) nopermission.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-0909](http://www.vupen.com/english/advisories/2008/0909/references)
2. [28273](http://www.securityfocus.com/bid/28273)
3. [exerocms-theme-file-include(41238)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41238)
4. [5265](https://www.exploit-db.com/exploits/5265)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-4415, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-4415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4415
- **State**: PUBLISHED
- **Published Date**: April 23, 2020 at 13:10 UTC
- **Last Updated**: September 17, 2024 at 00:20 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Spectrum Protect 7.1 and 8.1 server is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. This could allow a remote attacker to execute arbitrary code on the system with the privileges of an administrator or user associated with the Spectrum Protect server or cause the Spectrum Protect server to crash. IBM X-Force ID: 179990.
### Affected Products
**IBM - Spectrum Protect**
Affected versions:
- 7.1.0.0 (Status: affected)
- 7.1.10.0 (Status: affected)
- 8.1.0.0 (Status: affected)
- 8.1.9.200 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6195706)
2. [ibm-spectrum-cve20204415-bo (179990)](https://exchange.xforce.ibmcloud.com/vulnerabilities/179990)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0537, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0537
- **State**: PUBLISHED
- **Published Date**: March 08, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An information disclosure vulnerability in the kernel USB gadget driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-31614969.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-03-01)
2. [1037968](http://www.securitytracker.com/id/1037968)
3. [96831](http://www.securityfocus.com/bid/96831)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49628, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49628 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49628
- **State**: PUBLISHED
- **Published Date**: October 20, 2024 at 10:10 UTC
- **Last Updated**: October 20, 2024 at 13:50 UTC
- **Reserved Date**: October 17, 2024 at 09:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in WhileTrue Most And Least Read Posts Widget allows Cross Site Request Forgery.This issue affects Most And Least Read Posts Widget: from n/a through 2.5.18.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**WhileTrue - Most And Least Read Posts Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/most-and-least-read-posts-widget/wordpress-most-and-least-read-posts-widget-plugin-2-5-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4569, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4569
- **State**: PUBLISHED
- **Published Date**: January 05, 2010 at 18:31 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: January 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in elkagroup Image Gallery allows remote attackers to execute arbitrary SQL commands via the id parameter to the default URI under news/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/0912-exploits/elkagroupv-sql.txt)
2. [10330](http://www.exploit-db.com/exploits/10330)
3. [elkagroup-id-sql-injection(54585)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54585)
4. [37229](http://www.securityfocus.com/bid/37229)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-1575, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-1575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1575
- **State**: PUBLISHED
- **Published Date**: July 08, 2021 at 18:30 UTC
- **Last Updated**: November 07, 2024 at 22:07 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Virtualized Voice Browser could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Virtualized Voice Browser**
Affected versions:
- n/a (Status: affected)
### References
1. [20210707 Cisco Virtualized Voice Browser Cross-Site Scripting Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vvb-xss-wG4zXRp3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5457, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5457
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:37 UTC
- **Reserved Date**: June 16, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to LUMAIN.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036408](http://www.securitytracker.com/id/1036408)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [91995](http://www.securityfocus.com/bid/91995)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-2864, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-2864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2864
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 13:23 UTC
- **Last Updated**: March 28, 2025 at 14:32 UTC
- **Reserved Date**: March 27, 2025 at 10:59 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
SaTECH BCU in its firmware version 2.1.3 allows an attacker to inject malicious code into the legitimate website owning the affected device, once the cookie is set. This attack only impacts the victim's browser (reflected XSS).
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Arteche - saTECH BCU**
Affected versions:
- 2.1.3 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu)
### Credits
- Aarón Flecha
- Gabriel Vía Echezarreta
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3826, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3826
- **State**: PUBLISHED
- **Published Date**: October 16, 2013 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55322](http://secunia.com/advisories/55322)
2. [oval:org.mitre.oval:def:18671](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18671)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20258, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20258
- **State**: REJECTED
- **Published Date**: January 02, 2020 at 20:33 UTC
- **Last Updated**: September 29, 2022 at 16:51 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7904, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7904
- **State**: PUBLISHED
- **Published Date**: August 18, 2024 at 08:31 UTC
- **Last Updated**: August 19, 2024 at 16:50 UTC
- **Reserved Date**: August 17, 2024 at 17:05 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in DedeBIZ 6.3.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/file_manage_control.php of the component File Extension Handler. The manipulation of the argument upfile1 leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**n/a - DedeBIZ**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [VDB-275030 | DedeBIZ File Extension file_manage_control.php unrestricted upload](https://vuldb.com/?id.275030)
2. [VDB-275030 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275030)
3. [Submit #388361 | dedebiz.com DedeBIZ v6.3.0 FileUpload](https://vuldb.com/?submit.388361)
4. [](https://github.com/DeepMountains/Mirage/blob/main/CVE17-2.md)
### Credits
- Dee.Mirage (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-15085, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-15085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15085
- **State**: PUBLISHED
- **Published Date**: June 30, 2020 at 16:25 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.
### CVSS Metrics
- **CVSS Base Score**: 6.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**mirumee - saleor-storefront**
Affected versions:
- < 2.10.3 (Status: affected)
### References
1. [](https://github.com/mirumee/saleor-storefront/security/advisories/GHSA-4279-h39w-2jqm)
2. [](https://github.com/mirumee/saleor-storefront/blob/master/CHANGELOG.md#2103)
3. [](https://github.com/mirumee/saleor-storefront/commit/7c331e1be805022c9a7be719bd69d050b2577458)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-15116, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-15116 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15116
- **State**: PUBLISHED
- **Published Date**: August 16, 2019 at 20:12 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9334)
2. [](https://wordpress.org/plugins/easy-digital-downloads/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-57636, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-57636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57636
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 15:35 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the itc_sample_row_check component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openlink/virtuoso-opensource/issues/1194)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2339, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2339
- **State**: PUBLISHED
- **Published Date**: May 12, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:43 UTC
- **Reserved Date**: May 11, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in evoTopsites 2.x and evoTopsites Pro 2.x allows remote attackers to execute arbitrary SQL commands via the (1) cat_id and (2) id parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [evotopsites-index-sql-injection(26328)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26328)
2. [19989](http://secunia.com/advisories/19989)
3. [17893](http://www.securityfocus.com/bid/17893)
4. [ADV-2006-1689](http://www.vupen.com/english/advisories/2006/1689)
5. [](http://www.hamid.ir/security/evotopsites.txt)
6. [1016062](http://securitytracker.com/id?1016062)
7. [25440](http://www.osvdb.org/25440)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-2734, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-2734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2734
- **State**: PUBLISHED
- **Published Date**: May 16, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:44 UTC
- **Reserved Date**: March 28, 2013 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb13-15.html)
2. [SUSE-SU-2013:0809](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html)
3. [oval:org.mitre.oval:def:16145](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16145)
4. [RHSA-2013:0826](http://rhn.redhat.com/errata/RHSA-2013-0826.html)
5. [GLSA-201308-03](http://security.gentoo.org/glsa/glsa-201308-03.xml)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-40961, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-40961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40961
- **State**: PUBLISHED
- **Published Date**: June 09, 2022 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMS Made Simple <=2.2.15 is affected by SQL injection in modules/News/function.admin_articlestab.php. The $sortby variable is concatenated with $query1, but it is possible to inject arbitrary SQL language without using the '.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://seclists.org/fulldisclosure/2021/Mar/49)
2. [](https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md)
3. [](https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html)
4. [](https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-3776, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-3776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3776
- **State**: PUBLISHED
- **Published Date**: April 24, 2025 at 08:23 UTC
- **Last Updated**: April 24, 2025 at 13:06 UTC
- **Reserved Date**: April 17, 2025 at 17:19 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Verification SMS with TargetSMS plugin for WordPress is vulnerable to limited Remote Code Execution in all versions up to, and including, 1.5 via the 'targetvr_ajax_handler' function. This is due to a lack of validation on the type of function that can be called. This makes it possible for unauthenticated attackers to execute any callable function on the site, such as phpinfo().
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**cajka - Verification SMS with TargetSMS**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/ed08d248-7467-4a3b-91a2-4286d91b9c50?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/verification-sms-targetsms/trunk/inc/ajax.php#L7)
3. [](https://plugins.trac.wordpress.org/browser/verification-sms-targetsms/trunk/inc/ajax.php#L9)
### Credits
- Cheng Liu
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-6367, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-6367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6367
- **State**: PUBLISHED
- **Published Date**: January 29, 2018 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 06:01 UTC
- **Reserved Date**: January 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL Injection exists in Vastal I-Tech Buddy Zone Facebook Clone 2.9.9 via the /chat_im/chat_window.php request_id parameter or the /search_events.php category parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/146136/Vastal-I-Tech-Facebook-Clone-2.9.9-SQL-Injection.html)
2. [43918](https://www.exploit-db.com/exploits/43918/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-0304, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-0304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0304
- **State**: PUBLISHED
- **Published Date**: January 19, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:34 UTC
- **Reserved Date**: January 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Dual DHCP DNS Server 1.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the DHCP options field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1015495](http://securitytracker.com/id?1015495)
2. [](http://aluigi.altervista.org/adv/dualsbof-adv.txt)
3. [16298](http://www.securityfocus.com/bid/16298)
4. [ADV-2006-0245](http://www.vupen.com/english/advisories/2006/0245)
5. [dualdhcpdns-options-field-bo(24191)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24191)
6. [18486](http://secunia.com/advisories/18486)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-25498, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-25498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25498
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 17:11 UTC
- **Last Updated**: August 03, 2024 at 20:03 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
A possible buffer overflow vulnerability in maetd_eco_cb_mode of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Samsung Mobile - Samsung Notes**
Affected versions:
- - (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=10)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0709, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0709
- **State**: PUBLISHED
- **Published Date**: March 01, 2013 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 22:36 UTC
- **Reserved Date**: December 28, 2012 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in dopvSTAR* 0091 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header, which is not properly handled during display of the access log.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#36339873](http://jvn.jp/en/jp/JVN36339873/index.html)
2. [](http://tech.bayashi.net/ds/)
3. [JVNDB-2013-000014](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000014)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-5264, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-5264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5264
- **State**: PUBLISHED
- **Published Date**: October 08, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: October 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Battlefront Dropteam 1.3.3 and earlier sends the client's online account name and password to the game server, which allows malicious game servers to steal account information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aluigi.altervista.org/adv/dropteamz-adv.txt)
2. [20071005 Multiple vulnerabilities in Dropteam 1.3.3](http://www.securityfocus.com/archive/1/481616/100/0/threaded)
3. [dropteam-account-information-disclosure(36978)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36978)
4. [25943](http://www.securityfocus.com/bid/25943)
5. [27107](http://secunia.com/advisories/27107)
6. [3202](http://securityreason.com/securityalert/3202)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5669, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5669
- **State**: PUBLISHED
- **Published Date**: January 24, 2013 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1027921](http://www.securitytracker.com/id?1027921)
2. [](http://www.freetype.org/)
3. [USN-1686-1](http://www.ubuntu.com/usn/USN-1686-1)
4. [](http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d)
5. [openSUSE-SU-2013:0189](http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html)
6. [[oss-security] 20121224 Re: CVE Request - Multiple security fixes in freetype - 2.4.11](http://www.openwall.com/lists/oss-security/2012/12/25/2)
7. [openSUSE-SU-2013:0165](http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html)
8. [RHSA-2013:0216](http://rhn.redhat.com/errata/RHSA-2013-0216.html)
9. [](https://savannah.nongnu.org/bugs/?37906)
10. [SSA:2013-015-01](http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186)
11. [51900](http://secunia.com/advisories/51900)
12. [openSUSE-SU-2013:0177](http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html)
13. [51826](http://secunia.com/advisories/51826)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-12740, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-12740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12740
- **State**: PUBLISHED
- **Published Date**: May 08, 2020 at 17:03 UTC
- **Last Updated**: August 04, 2024 at 12:04 UTC
- **Reserved Date**: May 08, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/appneta/tcpreplay/issues/576)
2. [FEDORA-2020-f47830961a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4YAT4AGTHQKB74ETOQPJMV67TSDIAPOC/)
3. [FEDORA-2020-256ac53cc7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UOSEIQ3D2OONCJEVMGC2TYBC2QX4E5EJ/)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.