System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38550 - **State**: PUBLISHED - **Published Date**: June 19, 2024 at 13:35 UTC - **Last Updated**: May 04, 2025 at 12:56 UTC - **Reserved Date**: June 18, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ASoC: kirkwood: Fix potential NULL dereference In kirkwood_dma_hw_params() mv_mbus_dram_info() returns NULL if CONFIG_PLAT_ORION macro is not defined. Fix this bug by adding NULL check. Found by Linux Verification Center (linuxtesting.org) with SVACE. ### Affected Products **Linux - Linux** Affected versions: - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - bb6a40fc5a830cae45ddd5cd6cfa151b008522ed (Status: affected) - 145951900b763dc32bf31bd770f3f036a8348424 (Status: affected) **Linux - Linux** Affected versions: - 5.14 (Status: affected) - 0 (Status: unaffected) - 5.15.161 (Status: unaffected) - 6.1.93 (Status: unaffected) - 6.6.33 (Status: unaffected) - 6.8.12 (Status: unaffected) - 6.9.3 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/d48d0c5fd733bd6d8d3ddb2ed553777ab4724169) 2. [](https://git.kernel.org/stable/c/de9987cec6fde1dd41dfcb971433e05945852489) 3. [](https://git.kernel.org/stable/c/1a7254525ca7a6f3e37d7882d7f7ad97f6235f7c) 4. [](https://git.kernel.org/stable/c/5bf5154739cd676b6d0958079070557c8d96afb6) 5. [](https://git.kernel.org/stable/c/802b49e39da669b54bd9b77dc3c649999a446bf6) 6. [](https://git.kernel.org/stable/c/ea60ab95723f5738e7737b56dda95e6feefa5b50)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45060, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45060 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45060 - **State**: PUBLISHED - **Published Date**: October 07, 2024 at 20:15 UTC - **Last Updated**: October 08, 2024 at 18:28 UTC - **Reserved Date**: August 21, 2024 at 17:53 UTC - **Assigned By**: GitHub_M ### Vulnerability Description PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. One of the sample scripts in PhpSpreadsheet is susceptible to a cross-site scripting (XSS) vulnerability due to improper handling of input where a number is expected leading to formula injection. The code in in `45_Quadratic_equation_solver.php` concatenates the user supplied parameters directly into spreadsheet formulas. This allows an attacker to take control over the formula and output unsanitized data into the page, resulting in JavaScript execution. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PHPOffice - PhpSpreadsheet** Affected versions: - < 1.29.2 (Status: affected) - >= 2.0.0, < 2.1.1 (Status: affected) - >= 2.2.0, < 2.3.0 (Status: affected) ### References 1. [https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-v66g-p9x6-v98p](https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-v66g-p9x6-v98p) 2. [https://github.com/PHPOffice/PhpSpreadsheet/blob/d50b8b5de7e30439fb57eae7df9ea90e79fa0f2d/samples/Basic/45_Quadratic_equation_solver.php#L56](https://github.com/PHPOffice/PhpSpreadsheet/blob/d50b8b5de7e30439fb57eae7df9ea90e79fa0f2d/samples/Basic/45_Quadratic_equation_solver.php#L56)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13600, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13600 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13600 - **State**: PUBLISHED - **Published Date**: February 12, 2025 at 05:28 UTC - **Last Updated**: February 12, 2025 at 16:08 UTC - **Reserved Date**: January 21, 2025 at 17:58 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Majestic Support – The Leading-Edge Help Desk & Customer Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.5 via the 'majesticsupportdata' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/majesticsupportdata directory which can contain file attachments included in support tickets. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **ahmadmj - Majestic Support – The Leading-Edge Help Desk & Customer Support Plugin** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a8fd90-49dd-4a5e-88f2-cd6b338da2d6?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/majestic-support/tags/1.0.5/includes/classes/uploads.php) 3. [](https://plugins.trac.wordpress.org/changeset/3231938/) ### Credits - Tim Coen
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35950, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35950 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35950 - **State**: PUBLISHED - **Published Date**: October 09, 2023 at 13:06 UTC - **Last Updated**: September 19, 2024 at 13:58 UTC - **Reserved Date**: July 15, 2022 at 23:52 UTC - **Assigned By**: GitHub_M ### Vulnerability Description OroCommerce is an open-source Business to Business Commerce application. In versions 4.1.0 through 4.1.13, 4.2.0 through 4.2.10, 5.0.0 prior to 5.0.11, and 5.1.0 prior to 5.1.1, the JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it. Versions 5.0.11 and 5.1.1 contain a fix for this issue. ### CVSS Metrics - **CVSS Base Score**: 6.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **oroinc - orocommerce** Affected versions: - >= 4.1.0, <= 4.1.13 (Status: affected) - >= 4.2.0, <= 4.2.10 (Status: affected) - >= 5.0.0, < 5.0.11 (Status: affected) - >= 5.1.0, < 5.1.1 (Status: affected) ### References 1. [https://github.com/oroinc/orocommerce/security/advisories/GHSA-2jc6-3fhj-8q84](https://github.com/oroinc/orocommerce/security/advisories/GHSA-2jc6-3fhj-8q84)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5195, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5195 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5195 - **State**: PUBLISHED - **Published Date**: January 13, 2020 at 17:29 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements) 2. [](https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities) 3. [](https://www.cerberusftp.com/xss-vulnerability-in-public-shares-fixed-in-cerberus-ftp-server-version-11-0-1-and-10-0-17/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0189, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0189 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0189 - **State**: REJECTED - **Published Date**: January 16, 2008 at 23:00 UTC - **Last Updated**: September 16, 2024 at 18:55 UTC - **Reserved Date**: January 09, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35698, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35698 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35698 - **State**: PUBLISHED - **Published Date**: June 08, 2024 at 14:19 UTC - **Last Updated**: August 02, 2024 at 03:14 UTC - **Reserved Date**: May 17, 2024 at 10:09 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Tab Manager allows Stored XSS.This issue affects YITH WooCommerce Tab Manager: from n/a through 1.35.0. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **YITH - YITH WooCommerce Tab Manager** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/yith-woocommerce-tab-manager/wordpress-yith-woocommerce-tab-manager-plugin-1-35-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Savphill (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-3895, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-3895 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-3895 - **State**: PUBLISHED - **Published Date**: June 03, 2019 at 18:04 UTC - **Last Updated**: August 04, 2024 at 19:26 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image. ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Red Hat - openstack-tripleo-common** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3895) 2. [RHSA-2019:1683](https://access.redhat.com/errata/RHSA-2019:1683) 3. [RHSA-2019:1742](https://access.redhat.com/errata/RHSA-2019:1742)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30160, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30160 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30160 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 00:00 UTC - **Last Updated**: March 22, 2025 at 14:21 UTC - **Reserved Date**: March 24, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0005)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1222, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1222 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1222 - **State**: PUBLISHED - **Published Date**: August 16, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 02:19 UTC - **Reserved Date**: August 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9034](http://www.securityfocus.com/bid/9034) 2. [BEA03-41.00](http://dev2dev.bea.com/pub/advisory/63)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0711, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0711 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0711 - **State**: PUBLISHED - **Published Date**: February 23, 2009 at 15:00 UTC - **Last Updated**: August 07, 2024 at 04:48 UTC - **Reserved Date**: February 23, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description filter.php in PHPFootball 1.6 and earlier allows remote attackers to retrieve password hashes via a request with an Accounts value for the dbtable parameter, in conjunction with a Password value for the dbfield parameter. NOTE: this has been reported as a SQL injection vulnerability by some sources, but the provenance of that information is unknown. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [51102](http://www.osvdb.org/51102) 2. [33367](http://secunia.com/advisories/33367) 3. [7636](https://www.exploit-db.com/exploits/7636)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5671, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5671 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5671 - **State**: PUBLISHED - **Published Date**: December 18, 2008 at 21:00 UTC - **Last Updated**: August 07, 2024 at 11:04 UTC - **Reserved Date**: December 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in Joomla! 1.0.11 through 1.0.14, when RG_EMULATION is enabled in configuration.php, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20080214 Joomla 1.0.13 - 1.0.14 / (remote) PHP file inclusion possible if old configuration.php](http://www.securityfocus.com/archive/1/488126/100/200/threaded) 2. [](http://www.joomla.org/announcements/release-news/4609-joomla-1015-released.html) 3. [29106](http://secunia.com/advisories/29106) 4. [27795](http://www.securityfocus.com/bid/27795) 5. [20080215 Re: Joomla 1.0.13 - 1.0.14 / (remote) PHP file inclusion possible if old configuration.php](http://www.securityfocus.com/archive/1/488199/100/200/threaded) 6. [4787](http://securityreason.com/securityalert/4787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28661 - **State**: PUBLISHED - **Published Date**: April 12, 2022 at 09:08 UTC - **Last Updated**: August 03, 2024 at 06:03 UTC - **Reserved Date**: April 05, 2022 at 00:00 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Simcenter Femap (All versions < V2022.1.2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15114) ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **Siemens - Simcenter Femap** Affected versions: - All versions < V2022.1.2 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-998762.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47436 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 06:19 UTC - **Last Updated**: May 04, 2025 at 12:41 UTC - **Reserved Date**: May 21, 2024 at 14:58 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: usb: musb: dsps: Fix the probe error path Commit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after initializing musb") has inverted the calls to dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without updating correctly the error path. dsps_create_musb_pdev() allocates and registers a new platform device which must be unregistered and freed with platform_device_unregister(), and this is missing upon dsps_setup_optional_vbus_irq() error. While on the master branch it seems not to trigger any issue, I observed a kernel crash because of a NULL pointer dereference with a v5.10.70 stable kernel where the patch mentioned above was backported. With this kernel version, -EPROBE_DEFER is returned the first time dsps_setup_optional_vbus_irq() is called which triggers the probe to error out without unregistering the platform device. Unfortunately, on the Beagle Bone Black Wireless, the platform device still living in the system is being used by the USB Ethernet gadget driver, which during the boot phase triggers the crash. My limited knowledge of the musb world prevents me to revert this commit which was sent to silence a robot warning which, as far as I understand, does not make sense. The goal of this patch was to prevent an IRQ to fire before the platform device being registered. I think this cannot ever happen due to the fact that enabling the interrupts is done by the ->enable() callback of the platform musb device, and this platform device must be already registered in order for the core or any other user to use this callback. Hence, I decided to fix the error path, which might prevent future errors on mainline kernels while also fixing older ones. ### Affected Products **Linux - Linux** Affected versions: - 5269937d1483d3159d5b51907346e4f4b13ef079 (Status: affected) - ffc825049ed2e8c849d318e987fd5073e0be462f (Status: affected) - 9a4a6805294fa7d2653e82972bdaf9e3e1f3d3c9 (Status: affected) - 8de01a896c1bc14b6b65b8d26013626597a45eda (Status: affected) - 72bb3eafcfdd156713a3ea0c9c95d536bd6e6e55 (Status: affected) - 7c75bde329d7e2a93cf86a5c15c61f96f1446cdc (Status: affected) - f5b4df24b4209cc3b9ccc768897415be18807e46 (Status: affected) **Linux - Linux** Affected versions: - 4.14.247 (Status: affected) - 4.19.207 (Status: affected) - 5.4.148 (Status: affected) - 5.10.67 (Status: affected) - 5.14.6 (Status: affected) ### References 1. [](https://git.kernel.org/stable/c/5ed60a430fb5f3d93e7fef66264daef466b4d10c) 2. [](https://git.kernel.org/stable/c/e923bce31ffefe4f60edfc6b84f62d4a858f3676) 3. [](https://git.kernel.org/stable/c/9ab5d539bc975b8dcde86eca1b58d836b657732e) 4. [](https://git.kernel.org/stable/c/9d89e287116796bf987cc48f5c8632ef3048f8eb) 5. [](https://git.kernel.org/stable/c/ff9249aab39820be11b6975a10d94253b7d426fc) 6. [](https://git.kernel.org/stable/c/c2115b2b16421d93d4993f3fe4c520e91d6fe801)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-3612, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-3612 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-3612 - **State**: PUBLISHED - **Published Date**: July 21, 2016 at 10:00 UTC - **Last Updated**: October 11, 2024 at 20:40 UTC - **Reserved Date**: March 17, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.22 allows remote attackers to affect confidentiality via vectors related to Core. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91860](http://www.securityfocus.com/bid/91860) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html) 3. [1036384](http://www.securitytracker.com/id/1036384) 4. [91787](http://www.securityfocus.com/bid/91787)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-20861, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-20861 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-20861 - **State**: PUBLISHED - **Published Date**: July 30, 2019 at 18:32 UTC - **Last Updated**: August 05, 2024 at 12:12 UTC - **Reserved Date**: July 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libopenmpt before 0.3.11 allows a crash with certain malformed custom tunings in MPTM files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/) 2. [openSUSE-SU-2019:2212](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00085.html) 3. [openSUSE-SU-2019:2213](http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00084.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6772 - **State**: PUBLISHED - **Published Date**: August 17, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 21:57 UTC - **Reserved Date**: March 09, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in Cisco Elastic Services Controller (ESC) could allow an authenticated, remote attacker to view sensitive information. The vulnerability is due to insufficient protection of sensitive data. An attacker could exploit this vulnerability by authenticating to the application and navigating to certain configuration files. An exploit could allow the attacker to view sensitive system configuration files. Cisco Bug IDs: CSCvd29408. Known Affected Releases: 2.3(2). ### Affected Products **Cisco Systems, Inc. - Elastic Services Controller** Affected versions: - 2.3(2) (Status: affected) ### References 1. [100388](http://www.securityfocus.com/bid/100388) 2. [20170816 Cisco Elastic Services Controller Configuration Files Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2650, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2650 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2650 - **State**: PUBLISHED - **Published Date**: January 15, 2020 at 16:34 UTC - **Last Updated**: September 30, 2024 at 15:59 UTC - **Reserved Date**: December 10, 2019 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Retail Customer Management and Segmentation Foundation** Affected versions: - 16.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpujan2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000248, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000248 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000248 - **State**: PUBLISHED - **Published Date**: November 17, 2017 at 04:00 UTC - **Last Updated**: September 17, 2024 at 01:27 UTC - **Reserved Date**: November 16, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Redis-store <=v1.3.0 allows unsafe objects to be loaded from redis ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-0996, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-0996 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-0996 - **State**: PUBLISHED - **Published Date**: April 10, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 16:56 UTC - **Reserved Date**: March 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [675](http://securityreason.com/securityalert/675) 2. [19775](http://secunia.com/advisories/19775) 3. [21252](http://secunia.com/advisories/21252) 4. [24484](http://www.osvdb.org/24484) 5. [20222](http://secunia.com/advisories/20222) 6. [20210](http://secunia.com/advisories/20210) 7. [](http://www.php.net/ChangeLog-4.php#4.4.3) 8. [](http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm) 9. [17362](http://www.securityfocus.com/bid/17362) 10. [RHSA-2006:0276](http://rhn.redhat.com/errata/RHSA-2006-0276.html) 11. [GLSA-200605-08](http://security.gentoo.org/glsa/glsa-200605-08.xml) 12. [](http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261) 13. [ADV-2006-1290](http://www.vupen.com/english/advisories/2006/1290) 14. [USN-320-1](http://www.ubuntu.com/usn/usn-320-1) 15. [RHSA-2006:0501](http://www.redhat.com/support/errata/RHSA-2006-0501.html) 16. [1015879](http://securitytracker.com/id?1015879) 17. [20060408 phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2](http://securityreason.com/achievement_securityalert/34) 18. [19979](http://secunia.com/advisories/19979) 19. [RHSA-2006:0549](http://rhn.redhat.com/errata/RHSA-2006-0549.html) 20. [20951](http://secunia.com/advisories/20951) 21. [21125](http://secunia.com/advisories/21125) 22. [oval:org.mitre.oval:def:10997](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997) 23. [](http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm) 24. [19599](http://secunia.com/advisories/19599) 25. [MDKSA-2006:074](http://www.mandriva.com/security/advisories?name=MDKSA-2006:074) 26. [19832](http://secunia.com/advisories/19832) 27. [20060501-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc) 28. [](http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c) 29. [20052](http://secunia.com/advisories/20052) 30. [21564](http://secunia.com/advisories/21564) 31. [php-phpinfo-long-array-xss(25702)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25702) 32. [ADV-2006-2685](http://www.vupen.com/english/advisories/2006/2685) 33. [SUSE-SA:2006:024](http://www.novell.com/linux/security/advisories/05-05-2006.html) 34. [[php-cvs] 20060330 cvs: php-src /ext/standard info.c](http://marc.info/?l=php-cvs&m=114374620416389&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-33187, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-33187 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-33187 - **State**: PUBLISHED - **Published Date**: December 09, 2022 at 01:48 UTC - **Last Updated**: April 22, 2025 at 20:26 UTC - **Reserved Date**: June 13, 2022 at 17:49 UTC - **Assigned By**: brocade ### Vulnerability Description Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-532: Security Weakness ### Affected Products **Brocade - Brocade SANnav** Affected versions: - Brocade SANnav versions before v2.2.1 (Status: affected) ### References 1. [](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2122)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7860 - **State**: PUBLISHED - **Published Date**: April 14, 2017 at 04:30 UTC - **Last Updated**: August 05, 2024 at 16:19 UTC - **Reserved Date**: April 14, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google gRPC before 2017-02-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the parse_unix function in core/ext/client_channel/parse_address.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=661) 2. [97695](http://www.securityfocus.com/bid/97695) 3. [](https://github.com/grpc/grpc/pull/9833)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0122, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0122 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0122 - **State**: PUBLISHED - **Published Date**: February 08, 2018 at 07:00 UTC - **Last Updated**: December 02, 2024 at 21:23 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series Aggregation Services Routers could allow an authenticated, local attacker to overwrite system files that are stored in the flash memory of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the affected operating system. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command for the affected operating system. A successful exploit could allow the attacker to overwrite or modify arbitrary files that are stored in the flash memory of an affected system. To exploit this vulnerability, the attacker would need to authenticate to an affected system by using valid administrator credentials. Cisco Bug IDs: CSCvf93335. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - Cisco StarOS for Cisco ASR 5000 Series Aggregation Services Routers** Affected versions: - Cisco StarOS for Cisco ASR 5000 Series Aggregation Services Routers (Status: affected) ### References 1. [1040340](http://www.securitytracker.com/id/1040340) 2. [103028](http://www.securityfocus.com/bid/103028) 3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5533 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 06:42 UTC - **Last Updated**: June 06, 2025 at 16:09 UTC - **Reserved Date**: June 03, 2025 at 14:59 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Knowledge Base plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'kbalert' shortcode in all versions up to, and including, 2.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **ajay - Knowledge Base** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/400564ba-70f8-4566-b2e7-cfa6450b609e?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3306850%40knowledgebase&new=3306850%40knowledgebase&sfp_email=&sfph_mail=) ### Credits - muhammad yudha
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4571, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4571 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4571 - **State**: PUBLISHED - **Published Date**: May 12, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 16:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10](http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5042 - **State**: PUBLISHED - **Published Date**: September 18, 2019 at 20:41 UTC - **Last Updated**: August 04, 2024 at 19:47 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable Use-After-Free vulnerability exists in the way FunctionType 0 PDF elements are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free. An attacker can send a malicious PDF to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Talos - Aspose.PDF for C++** Affected versions: - 19.2 (Status: affected) ### References 1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0809)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29973 - **State**: PUBLISHED - **Published Date**: May 02, 2022 at 05:09 UTC - **Last Updated**: August 03, 2024 at 06:40 UTC - **Reserved Date**: May 02, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description relan exFAT 1.3.0 allows local users to obtain sensitive information (data from deleted files in the filesystem) in certain situations involving offsets beyond ValidDataLength. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/relan/exfat/issues/185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0453 - **State**: PUBLISHED - **Published Date**: May 22, 2024 at 03:17 UTC - **Last Updated**: August 01, 2024 at 18:04 UTC - **Reserved Date**: January 12, 2024 at 00:09 UTC - **Assigned By**: Wordfence ### Vulnerability Description The AI ChatBot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the openai_file_delete_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete files from a linked OpenAI account. ### CVSS Metrics - **CVSS Base Score**: 5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N` ### Affected Products **quantumcloud - AI ChatBot for WordPress – WPBot** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7e0ef4a5-42d7-4cea-b19f-51917e3ee55f?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L133) 3. [](https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1289, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1289 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1289 - **State**: PUBLISHED - **Published Date**: April 09, 2013 at 22:00 UTC - **Last Updated**: August 06, 2024 at 14:57 UTC - **Reserved Date**: January 12, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA13-100A](http://www.us-cert.gov/ncas/alerts/TA13-100A) 2. [oval:org.mitre.oval:def:16599](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16599) 3. [MS13-035](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-035)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1684, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1684 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1684 - **State**: PUBLISHED - **Published Date**: April 10, 2006 at 23:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 10, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in ecotwo Shopsystem 1.0-192 and earlier allows remote attackers to include arbitrary local files via (1) the lang parameter in news.php and (2) other unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://pridels0.blogspot.com/2006/04/ecotwo-shopsystem-vuln.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-28902, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-28902 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-28902 - **State**: PUBLISHED - **Published Date**: March 11, 2025 at 21:00 UTC - **Last Updated**: March 12, 2025 at 13:50 UTC - **Reserved Date**: March 11, 2025 at 08:09 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Benjamin Pick Contact Form 7 Select Box Editor Button allows Cross Site Request Forgery. This issue affects Contact Form 7 Select Box Editor Button: from n/a through 0.6. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Benjamin Pick - Contact Form 7 Select Box Editor Button** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/contact-form-7-select-box-editor-button/vulnerability/wordpress-contact-form-7-select-box-editor-button-plugin-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve) ### Credits - Nguyen Xuan Chien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2787 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 22:31 UTC - **Last Updated**: October 01, 2024 at 16:41 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Automount). Supported versions that are affected are 11.4 and 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via NFS to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data as well as unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N). ### Affected Products **Oracle Corporation - Solaris Operating System** Affected versions: - 11.4 (Status: affected) - 10 (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7396 - **State**: PUBLISHED - **Published Date**: August 05, 2024 at 13:20 UTC - **Last Updated**: September 03, 2024 at 15:36 UTC - **Reserved Date**: August 01, 2024 at 21:46 UTC - **Assigned By**: CyberDanube ### Vulnerability Description Missing encryption of sensitive data in Korenix JetPort 5601v3 allows Eavesdropping.This issue affects JetPort 5601v3: through 1.2. ### Weakness Classification (CWE) - CWE-311: Security Weakness ### Affected Products **Korenix - JetPort 5601v3** Affected versions: - 0 (Status: affected) ### References 1. [](https://cyberdanube.com/de/en-multiple-vulnerabilities-in-korenix-jetport/) ### Credits - S. Dietz (CyberDanube)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49372, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49372 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49372 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 02:11 UTC - **Last Updated**: May 04, 2025 at 08:36 UTC - **Reserved Date**: February 26, 2025 at 02:08 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_rtx_synack() can be called from process context Laurent reported the enclosed report [1] This bug triggers with following coditions: 0) Kernel built with CONFIG_DEBUG_PREEMPT=y 1) A new passive FastOpen TCP socket is created. This FO socket waits for an ACK coming from client to be a complete ESTABLISHED one. 2) A socket operation on this socket goes through lock_sock() release_sock() dance. 3) While the socket is owned by the user in step 2), a retransmit of the SYN is received and stored in socket backlog. 4) At release_sock() time, the socket backlog is processed while in process context. 5) A SYNACK packet is cooked in response of the SYN retransmit. 6) -> tcp_rtx_synack() is called in process context. Before blamed commit, tcp_rtx_synack() was always called from BH handler, from a timer handler. Fix this by using TCP_INC_STATS() & NET_INC_STATS() which do not assume caller is in non preemptible context. [1] BUG: using __this_cpu_add() in preemptible [00000000] code: epollpep/2180 caller is tcp_rtx_synack.part.0+0x36/0xc0 CPU: 10 PID: 2180 Comm: epollpep Tainted: G OE 5.16.0-0.bpo.4-amd64 #1 Debian 5.16.12-1~bpo11+1 Hardware name: Supermicro SYS-5039MC-H8TRF/X11SCD-F, BIOS 1.7 11/23/2021 Call Trace: <TASK> dump_stack_lvl+0x48/0x5e check_preemption_disabled+0xde/0xe0 tcp_rtx_synack.part.0+0x36/0xc0 tcp_rtx_synack+0x8d/0xa0 ? kmem_cache_alloc+0x2e0/0x3e0 ? apparmor_file_alloc_security+0x3b/0x1f0 inet_rtx_syn_ack+0x16/0x30 tcp_check_req+0x367/0x610 tcp_rcv_state_process+0x91/0xf60 ? get_nohz_timer_target+0x18/0x1a0 ? lock_timer_base+0x61/0x80 ? preempt_count_add+0x68/0xa0 tcp_v4_do_rcv+0xbd/0x270 __release_sock+0x6d/0xb0 release_sock+0x2b/0x90 sock_setsockopt+0x138/0x1140 ? __sys_getsockname+0x7e/0xc0 ? aa_sk_perm+0x3e/0x1a0 __sys_setsockopt+0x198/0x1e0 __x64_sys_setsockopt+0x21/0x30 do_syscall_64+0x38/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae ### Affected Products **Linux - Linux** Affected versions: - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) - 168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef (Status: affected) **Linux - Linux** Affected versions: - 3.7 (Status: affected) - 0 (Status: unaffected) - 4.9.318 (Status: unaffected) - 4.14.283 (Status: unaffected) - 4.19.247 (Status: unaffected) - 5.4.198 (Status: unaffected) - 5.10.122 (Status: unaffected) - 5.15.47 (Status: unaffected) - 5.17.15 (Status: unaffected) - 5.18.4 (Status: unaffected) - 5.19 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3db889f883e65bbd3b1401279bfc1e9ed255c481) 2. [](https://git.kernel.org/stable/c/c348b0f8d035fc4bdc040796889beec7218bd1b8) 3. [](https://git.kernel.org/stable/c/58bd38cbc961fd799842b7be8c5222310f04b908) 4. [](https://git.kernel.org/stable/c/d05c2fdf8e10528bb6751bd95243e862d5402a9b) 5. [](https://git.kernel.org/stable/c/0a0f7f84148445c9f02f226928803a870139d820) 6. [](https://git.kernel.org/stable/c/88cd232146207ff1d41dededed5e77c0d4438113) 7. [](https://git.kernel.org/stable/c/bdc28a8fb43cc476e33b11519235adb816ce00e8) 8. [](https://git.kernel.org/stable/c/d8e1bc6029acac796293310aacef7b7336f35b6a) 9. [](https://git.kernel.org/stable/c/0a375c822497ed6ad6b5da0792a12a6f1af10c0b)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34642, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34642 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34642 - **State**: PUBLISHED - **Published Date**: July 18, 2022 at 22:45 UTC - **Last Updated**: August 03, 2024 at 09:15 UTC - **Reserved Date**: June 26, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The component mcontrol.action in RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 contains the incorrect mask which can cause a Denial of Service (DoS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/riscv-software-src/riscv-isa-sim/issues/1032)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4963, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4963 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4963 - **State**: PUBLISHED - **Published Date**: November 06, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 10:31 UTC - **Reserved Date**: November 06, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32573](http://secunia.com/advisories/32573) 2. [20081105 Cisco VLAN Trunking Protocol Vulnerability](http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html) 3. [1021143](http://securitytracker.com/id?1021143) 4. [1021144](http://www.securitytracker.com/id?1021144) 5. [cisco-ios-catos-vtp-dos(46346)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46346) 6. [32120](http://www.securityfocus.com/bid/32120) 7. [49601](http://osvdb.org/49601)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14505, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14505 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14505 - **State**: PUBLISHED - **Published Date**: July 15, 2020 at 01:59 UTC - **Last Updated**: August 04, 2024 at 12:46 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection”) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that creates a command string without any validation. The attacker may then remotely execute code. ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **n/a - Advantech iView** Affected versions: - Versions 5.6 and prior (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-196-01) 2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-831/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1803 - **State**: PUBLISHED - **Published Date**: May 28, 2009 at 14:00 UTC - **Last Updated**: September 16, 2024 at 22:51 UTC - **Reserved Date**: May 28, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [54263](http://www.osvdb.org/54263) 2. [](http://freepbx.org/trac/ticket/3660) 3. [34772](http://secunia.com/advisories/34772) 4. [34857](http://www.securityfocus.com/bid/34857)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14496 - **State**: PUBLISHED - **Published Date**: August 01, 2019 at 17:28 UTC - **Last Updated**: August 05, 2024 at 00:19 UTC - **Reserved Date**: August 01, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description LoaderXM::load in LoaderXM.cpp in milkyplay in MilkyTracker 1.02.00 has a stack-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/milkytracker/MilkyTracker/issues/183) 2. [[debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00029.html) 3. [[debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00023.html) 4. [USN-4499-1](https://usn.ubuntu.com/4499-1/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3021 - **State**: PUBLISHED - **Published Date**: June 05, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 13:57 UTC - **Reserved Date**: June 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, does not initialize a critical variable, which allows attackers to create arbitrary executable files via unknown manipulations of a file that is created during data export. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.symantec.com/avcenter/security/Content/2007.06.05a.html) 2. [24313](http://www.securityfocus.com/bid/24313) 3. [36109](http://osvdb.org/36109) 4. [1018196](http://www.securitytracker.com/id?1018196) 5. [ADV-2007-2074](http://www.vupen.com/english/advisories/2007/2074) 6. [symantec-reporting-code-execution(34744)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34744) 7. [25543](http://secunia.com/advisories/25543)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6141, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6141 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6141 - **State**: PUBLISHED - **Published Date**: November 28, 2006 at 02:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: November 27, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Tftpd32 3.01 allows remote attackers to cause a denial of service via a long GET or PUT request, which is not properly handled when the request is displayed in the title of the gauge window. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1923](http://securityreason.com/securityalert/1923) 2. [21148](http://www.securityfocus.com/bid/21148) 3. [22968](http://secunia.com/advisories/22968) 4. [VU#632633](http://www.kb.cert.org/vuls/id/632633) 5. [30502](http://www.osvdb.org/30502) 6. [20061117 TFTPD32 v3.01 TFTP Server Long File Name Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/451951/100/200/threaded) 7. [tftpd32-gauge-dos(30439)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30439) 8. [ADV-2006-4606](http://www.vupen.com/english/advisories/2006/4606)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1388, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1388 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1388 - **State**: PUBLISHED - **Published Date**: October 19, 2007 at 10:00 UTC - **Last Updated**: August 08, 2024 at 02:28 UTC - **Reserved Date**: October 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Opera 7.02 Build 2668 allows remote attackers to crash Opera via a long HTTP request ending in a .ZIP extension. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [opera-long-url-bo(11740)](https://exchange.xforce.ibmcloud.com/vulnerabilities/11740) 2. [20030407 Unchecked Buffer in Opera 7.02](http://archives.neohapsis.com/archives/bugtraq/2003-04/0116.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1785 - **State**: PUBLISHED - **Published Date**: March 24, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:10 UTC - **Reserved Date**: January 13, 2016 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The Page Loading implementation in WebKit in Apple iOS before 9.3 and Safari before 9.1 mishandles character encoding during access to cached data, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2016-03-21-6](http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html) 2. [1035353](http://www.securitytracker.com/id/1035353) 3. [APPLE-SA-2016-03-21-1](http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html) 4. [20160331 WebKitGTK+ Security Advisory WSA-2016-0003](http://www.securityfocus.com/archive/1/537948/100/0/threaded) 5. [](https://support.apple.com/HT206171) 6. [](https://support.apple.com/HT206166)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13252 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 17:00 UTC - **Last Updated**: August 05, 2024 at 09:00 UTC - **Reserved Date**: July 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Entrust Datacard Syntera CS 5.x has XSS via the name field of "Domain or Computer Name" in the login page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/herwonowr/CVE/tree/master/CVE-2018-13252)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38091 - **State**: PUBLISHED - **Published Date**: September 20, 2021 at 15:20 UTC - **Last Updated**: August 04, 2024 at 01:30 UTC - **Reserved Date**: August 04, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://trac.ffmpeg.org/ticket/8263) 2. [](https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-22865, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-22865 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-22865 - **State**: PUBLISHED - **Published Date**: April 02, 2021 at 17:25 UTC - **Last Updated**: August 03, 2024 at 18:51 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: GitHub_P ### Vulnerability Description An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program. ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **GitHub - GitHub Enterprise Server** Affected versions: - 3.0 (Status: affected) - 2.22 (Status: affected) - 2.21 (Status: affected) ### References 1. [](https://docs.github.com/en/enterprise-server%403.0/admin/release-notes#3.0.4) 2. [](https://docs.github.com/en/enterprise-server%402.22/admin/release-notes#2.22.10) 3. [](https://docs.github.com/en/enterprise-server%402.21/admin/release-notes#2.21.18) ### Credits - djcruz93
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-33086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-33086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-33086 - **State**: PUBLISHED - **Published Date**: March 04, 2024 at 10:48 UTC - **Last Updated**: August 26, 2024 at 20:49 UTC - **Reserved Date**: May 17, 2023 at 09:28 UTC - **Assigned By**: qualcomm ### Vulnerability Description Transient DOS while processing multiple IKEV2 Informational Request to device from IPSEC server with different identifiers. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-401: Security Weakness ### Affected Products **Qualcomm, Inc. - Snapdragon** Affected versions: - 315 5G IoT Modem (Status: affected) - AQT1000 (Status: affected) - AR8035 (Status: affected) - CSRA6620 (Status: affected) - CSRA6640 (Status: affected) - CSRB31024 (Status: affected) - FastConnect 6200 (Status: affected) - FastConnect 6700 (Status: affected) - FastConnect 6800 (Status: affected) - FastConnect 6900 (Status: affected) - FastConnect 7800 (Status: affected) - QCA6174A (Status: affected) - QCA6391 (Status: affected) - QCA6420 (Status: affected) - QCA6421 (Status: affected) - QCA6426 (Status: affected) - QCA6430 (Status: affected) - QCA6431 (Status: affected) - QCA6436 (Status: affected) - QCA6564AU (Status: affected) - QCA6574A (Status: affected) - QCA6574AU (Status: affected) - QCA6584AU (Status: affected) - QCA6595AU (Status: affected) - QCA6696 (Status: affected) - QCA6698AQ (Status: affected) - QCA8081 (Status: affected) - QCA8337 (Status: affected) - QCA9377 (Status: affected) - QCC710 (Status: affected) - QCM2290 (Status: affected) - QCM4290 (Status: affected) - QCM4325 (Status: affected) - QCM4490 (Status: affected) - QCM6125 (Status: affected) - QCM6490 (Status: affected) - QCM8550 (Status: affected) - QCN6024 (Status: affected) - QCN6224 (Status: affected) - QCN6274 (Status: affected) - QCN9024 (Status: affected) - QCS2290 (Status: affected) - QCS410 (Status: affected) - QCS4290 (Status: affected) - QCS4490 (Status: affected) - QCS610 (Status: affected) - QCS6125 (Status: affected) - QCS6490 (Status: affected) - QCS8550 (Status: affected) - QEP8111 (Status: affected) - QFW7114 (Status: affected) - QFW7124 (Status: affected) - Qualcomm Video Collaboration VC1 Platform (Status: affected) - Qualcomm Video Collaboration VC3 Platform (Status: affected) - SC8180X+SDX55 (Status: affected) - SD 675 (Status: affected) - SD675 (Status: affected) - SD730 (Status: affected) - SD855 (Status: affected) - SD865 5G (Status: affected) - SD888 (Status: affected) - SDX55 (Status: affected) - SG4150P (Status: affected) - SG8275P (Status: affected) - SM6250 (Status: affected) - SM6250P (Status: affected) - SM7250P (Status: affected) - SM7315 (Status: affected) - SM7325P (Status: affected) - SM8550P (Status: affected) - Smart Audio 400 Platform (Status: affected) - Snapdragon 4 Gen 1 Mobile Platform (Status: affected) - Snapdragon 460 Mobile Platform (Status: affected) - Snapdragon 480 5G Mobile Platform (Status: affected) - Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected) - Snapdragon 662 Mobile Platform (Status: affected) - Snapdragon 665 Mobile Platform (Status: affected) - Snapdragon 675 Mobile Platform (Status: affected) - Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected) - Snapdragon 680 4G Mobile Platform (Status: affected) - Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected) - Snapdragon 690 5G Mobile Platform (Status: affected) - Snapdragon 695 5G Mobile Platform (Status: affected) - Snapdragon 720G Mobile Platform (Status: affected) - Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected) - Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected) - Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected) - Snapdragon 750G 5G Mobile Platform (Status: affected) - Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected) - Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected) - Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected) - Snapdragon 778G 5G Mobile Platform (Status: affected) - Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected) - Snapdragon 780G 5G Mobile Platform (Status: affected) - Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected) - Snapdragon 7c Compute Platform (SC7180-AC) (Status: affected) - Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" (Status: affected) - Snapdragon 7c+ Gen 3 Compute (Status: affected) - Snapdragon 8 Gen 1 Mobile Platform (Status: affected) - Snapdragon 8 Gen 2 Mobile Platform (Status: affected) - Snapdragon 8 Gen 3 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 1 Mobile Platform (Status: affected) - Snapdragon 8+ Gen 2 Mobile Platform (Status: affected) - Snapdragon 855 Mobile Platform (Status: affected) - Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected) - Snapdragon 865 5G Mobile Platform (Status: affected) - Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected) - Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected) - Snapdragon 888 5G Mobile Platform (Status: affected) - Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected) - Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" (Status: affected) - Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" (Status: affected) - Snapdragon 8cx Compute Platform (SC8180X-AA, AB) (Status: affected) - Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" (Status: affected) - Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" (Status: affected) - Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) (Status: affected) - Snapdragon Auto 5G Modem-RF (Status: affected) - Snapdragon Auto 5G Modem-RF Gen 2 (Status: affected) - Snapdragon W5+ Gen 1 Wearable Platform (Status: affected) - Snapdragon X24 LTE Modem (Status: affected) - Snapdragon X35 5G Modem-RF System (Status: affected) - Snapdragon X50 5G Modem-RF System (Status: affected) - Snapdragon X55 5G Modem-RF System (Status: affected) - Snapdragon X65 5G Modem-RF System (Status: affected) - Snapdragon X70 Modem-RF System (Status: affected) - Snapdragon X75 5G Modem-RF System (Status: affected) - Snapdragon XR2 5G Platform (Status: affected) - Snapdragon Auto 4G Modem (Status: affected) - SW5100 (Status: affected) - SW5100P (Status: affected) - SXR2130 (Status: affected) - WCD9335 (Status: affected) - WCD9340 (Status: affected) - WCD9341 (Status: affected) - WCD9360 (Status: affected) - WCD9370 (Status: affected) - WCD9371 (Status: affected) - WCD9375 (Status: affected) - WCD9380 (Status: affected) - WCD9385 (Status: affected) - WCD9390 (Status: affected) - WCD9395 (Status: affected) - WCN3910 (Status: affected) - WCN3950 (Status: affected) - WCN3980 (Status: affected) - WCN3988 (Status: affected) - WCN3990 (Status: affected) - WCN6740 (Status: affected) - WSA8810 (Status: affected) - WSA8815 (Status: affected) - WSA8830 (Status: affected) - WSA8832 (Status: affected) - WSA8835 (Status: affected) - WSA8840 (Status: affected) - WSA8845 (Status: affected) - WSA8845H (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35732, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35732 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35732 - **State**: PUBLISHED - **Published Date**: June 08, 2024 at 12:52 UTC - **Last Updated**: August 02, 2024 at 03:14 UTC - **Reserved Date**: May 17, 2024 at 10:09 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH Custom Login allows Stored XSS.This issue affects YITH Custom Login: from n/a through 1.7.0. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **YITH - YITH Custom Login** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/yith-custom-login/wordpress-yith-custom-login-plugin-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - STEALIEN (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-2801, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-2801 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-2801 - **State**: PUBLISHED - **Published Date**: June 03, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:06 UTC - **Reserved Date**: June 02, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Unak CMS 1.5 RC2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) u_a or (2) u_s parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20410](http://secunia.com/advisories/20410) 2. [ADV-2006-2116](http://www.vupen.com/english/advisories/2006/2116) 3. [18253](http://www.securityfocus.com/bid/18253) 4. [unakcms-ua-us-sql-injection(26895)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26895) 5. [](http://pridels0.blogspot.com/2006/06/unak-cms-vuln.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1510, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1510 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1510 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:26 UTC - **Reserved Date**: February 19, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description xdm, with the authComplain variable set to false, allows arbitrary attackers to connect to the X server if the xdm auth directory does not exist. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [CLA-2002:533](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000533) 2. [RHSA-2003:064](http://www.redhat.com/support/errata/RHSA-2003-064.html) 3. [RHSA-2003:065](http://www.redhat.com/support/errata/RHSA-2003-065.html) 4. [55602](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55602) 5. [](http://wuarchive.wustl.edu/mirrors/NetBSD/NetBSD-current/xsrc/xfree/xc/programs/Xserver/hw/xfree86/CHANGELOG) 6. [xfree86-xdm-unauth-access(11389)](http://www.iss.net/security_center/static/11389.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-48202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-48202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-48202 - **State**: PUBLISHED - **Published Date**: October 30, 2024 at 00:00 UTC - **Last Updated**: October 31, 2024 at 14:32 UTC - **Reserved Date**: October 08, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description icecms <=3.4.7 has a File Upload vulnerability in FileUtils.java,uploadFile. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Lunax0/LogLunax/blob/main/icecms/CVE-2024-48202.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-5143, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-5143 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-5143 - **State**: PUBLISHED - **Published Date**: August 04, 2015 at 10:00 UTC - **Last Updated**: August 07, 2024 at 07:32 UTC - **Reserved Date**: September 29, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description GE Healthcare Discovery 530C has a password of #bigguy1 for the (1) acqservice user and (2) wsservice user of the Xeleris System, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/) 2. [](https://twitter.com/digitalbond/status/619250429751222277) 3. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02) 4. [](http://apps.gehealthcare.com/servlet/ClientServlet/5323167-1EN_r2.pdf?REQ=RAA&DIRECTION=5323167-1EN&FILENAME=5323167-1EN_r2.pdf&FILEREV=2&DOCREV_ORG=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-4862, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-4862 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-4862 - **State**: PUBLISHED - **Published Date**: January 03, 2018 at 09:00 UTC - **Last Updated**: August 05, 2024 at 05:18 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Octopus Deploy versions 3.2.11 - 4.1.5 (fixed in 4.1.6), an authenticated user with ProcessEdit permission could reference an Azure account in such a way as to bypass the scoping restrictions, resulting in a potential escalation of privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/OctopusDeploy/Issues/issues/4134)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42264, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42264 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42264 - **State**: PUBLISHED - **Published Date**: March 16, 2022 at 14:03 UTC - **Last Updated**: April 23, 2025 at 18:48 UTC - **Reserved Date**: October 12, 2021 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-476: NULL Pointer Dereference ### Affected Products **Adobe - Premiere** Affected versions: - unspecified (Status: affected) - unspecified (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7002, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7002 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7002 - **State**: PUBLISHED - **Published Date**: March 18, 2020 at 12:59 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 14, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Delta Industrial Automation CNCSoft ScreenEditor, v1.00.96 and prior. Multiple stack-based buffer overflows can be exploited when a valid user opens a specially crafted, malicious input file. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **n/a - Delta Industrial Automation CNCSoft ScreenEditor** Affected versions: - CNCSoft ScreenEditor v1.00.96 and prior (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-20-077-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14597 - **State**: PUBLISHED - **Published Date**: October 17, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:29 UTC - **Reserved Date**: July 25, 2018 at 00:00 UTC - **Assigned By**: ca ### Vulnerability Description CA Technologies Identity Governance 12.6, 14.0, 14.1, and 14.2 and CA Identity Suite Virtual Appliance 14.0, 14.1, and 14.2 provide telling error messages that may allow remote attackers to enumerate account names. ### Weakness Classification (CWE) - CWE-203: Improper Input Validation ### Affected Products **CA Technologies - CA Identity Governance** Affected versions: - 14.x (Status: affected) ### References 1. [](https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20181017-01-security-notice-for-ca-identity-governance.html) 2. [105688](http://www.securityfocus.com/bid/105688)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3120, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3120 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3120 - **State**: PUBLISHED - **Published Date**: August 11, 2017 at 19:00 UTC - **Last Updated**: September 16, 2024 at 16:32 UTC - **Reserved Date**: December 02, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA parsing engine when handling certain types of internal instructions. Successful exploitation could lead to arbitrary code execution. ### Affected Products **Adobe Systems Incorporated - Acrobat Reader** Affected versions: - 2017.009.20058 and earlier (Status: affected) - 2017.008.30051 and earlier (Status: affected) - 2015.006.30306 and earlier (Status: affected) - 11.0.20 and earlier (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb17-24.html) 2. [1039098](http://www.securitytracker.com/id/1039098) 3. [100182](http://www.securityfocus.com/bid/100182)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2162, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2162 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2162 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 15:33 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.7.33 and prior (Status: affected) - 8.0.23 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) 2. [](https://security.netapp.com/advisory/ntap-20210513-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1010200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1010200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1010200 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 17:15 UTC - **Last Updated**: August 05, 2024 at 03:07 UTC - **Reserved Date**: March 20, 2019 at 00:00 UTC - **Assigned By**: dwf ### Vulnerability Description Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the servers. The component is: Two web servers in the projects expose three vulnerable endpoints that can be accessed remotely. The endpoints are defined at: - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/merlin_model_server/api.js#L34 - /alignment: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L28 - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L65. The attack vector is: Attacker sends a GET request to the vulnerable endpoint with a specially formatted query parameter. The fixed version is: After commit f6660e6d8f0d1d931359d591dbdec580fef36d36. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Voice Builder - Voice Builder** Affected versions: - Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 [fixed: After commit f6660e6d8f0d1d931359d591dbdec580fef36d36] (Status: affected) ### References 1. [](https://github.com/google/voice-builder/commit/c145d4604df67e6fc625992412eef0bf9a85e26b) 2. [](https://github.com/google/voice-builder/commit/f6660e6d8f0d1d931359d591dbdec580fef36d36)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6040 - **State**: PUBLISHED - **Published Date**: February 01, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 01:22 UTC - **Reserved Date**: June 29, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Jazz Foundation could allow an authenticated user to take over a previously logged in user due to session expiration not being enforced. ### Affected Products **IBM Corporation - Rational Collaborative Lifecycle Management** Affected versions: - 3.0.1 (Status: affected) - 4.0 (Status: affected) - 3.0.1.6 (Status: affected) - 4.0.1 (Status: affected) - 4.0.2 (Status: affected) - 4.0.3 (Status: affected) - 4.0.4 (Status: affected) - 4.0.5 (Status: affected) - 4.0.6 (Status: affected) - 5.0 (Status: affected) - 4.0.7 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) ### References 1. [95115](http://www.securityfocus.com/bid/95115) 2. [](https://www.ibm.com/support/docview.wss?uid=swg21996097)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-28803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-28803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-28803 - **State**: PUBLISHED - **Published Date**: March 13, 2025 at 00:00 UTC - **Last Updated**: March 19, 2025 at 18:46 UTC - **Reserved Date**: March 11, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Italtel S.p.A. i-MCS NFV v.12.1.0-20211215 allows unauthenticated remote attackers to inject arbitrary web script or HTML into HTTP/POST parameter ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.gruppotim.it/it/footer/red-team.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2686, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2686 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2686 - **State**: PUBLISHED - **Published Date**: December 02, 2009 at 16:00 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: August 05, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in HP NonStop G06.12.00 through G06.32.00, H06.08.00 through H06.18.01, and J06.04.00 through J06.07.01 allows local users to gain privileges, cause a denial of service, or obtain "access to data" via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBNS02475](https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01923646) 2. [37560](http://secunia.com/advisories/37560) 3. [ADV-2009-3373](http://www.vupen.com/english/advisories/2009/3373) 4. [SSRT090068](https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01923646)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49273, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49273 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49273 - **State**: PUBLISHED - **Published Date**: December 12, 2023 at 19:05 UTC - **Last Updated**: August 02, 2024 at 21:53 UTC - **Reserved Date**: November 24, 2023 at 16:45 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.8.1, and 12.3.4, users with low privileges (Editor, etc.) are able to access some unintended endpoints. Versions 8.18.10, 10.8.1, and 12.3.4 contain a patch for this issue. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **umbraco - Umbraco-CMS** Affected versions: - >= 8.0.0, < 8.18.10 (Status: affected) - >= 9.0.0-rc001, < 10.8.1 (Status: affected) - >= 11.0.0-rc1, < 12.3.4 (Status: affected) ### References 1. [https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-cfr5-7p54-4qg8](https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-cfr5-7p54-4qg8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20858, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20858 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20858 - **State**: PUBLISHED - **Published Date**: December 01, 2021 at 02:15 UTC - **Last Updated**: August 03, 2024 at 17:53 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability in ELECOM LAN router WRC-2533GHBK-I firmware v1.20 and prior allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. ### Affected Products **ELECOM CO.,LTD. - ELECOM LAN router** Affected versions: - WRC-2533GHBK-I firmware v1.20 and prior (Status: affected) ### References 1. [](https://www.elecom.co.jp/news/security/20211130-01/) 2. [](https://jvn.jp/en/jp/JVN88993473/index.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9578, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9578 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9578 - **State**: PUBLISHED - **Published Date**: January 08, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 08, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VDG Security SENSE (formerly DIVA) 2.3.13 performs authentication with a password hash instead of a password, which allows remote attackers to gain login access by leveraging knowledge of a password hash. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20141218 SEC Consult SA-20141218-0 :: Multiple critical vulnerabilities in VDG Security SENSE (formerly DIVA)](http://seclists.org/fulldisclosure/2014/Dec/76) 2. [](http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html) 3. [](https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5201, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5201 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5201 - **State**: PUBLISHED - **Published Date**: May 23, 2024 at 19:11 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 22, 2024 at 15:03 UTC - **Assigned By**: OpenText ### Vulnerability Description Privilege Escalation in OpenText Dimensions RM allows an authenticated user to escalate there privilege to the privilege of another user via HTTP Request ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **OpenText - Dimensions RM** Affected versions: - 12.11.1.1 (Status: affected) - 12.11.2 (Status: affected) ### References 1. [](https://portal.microfocus.com/s/article/KM000029985) ### Credits - Telekom MMS GmbH (Researcher: P. Graf, M. Seidel, O. Vogel)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1323, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1323 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1323 - **State**: PUBLISHED - **Published Date**: May 15, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 14:57 UTC - **Reserved Date**: January 12, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Publisher 2003 SP3 does not properly handle NULL values for unspecified data items, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Incorrect NULL Value Handling Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [TA13-134A](http://www.us-cert.gov/ncas/alerts/TA13-134A) 2. [MS13-042](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042) 3. [oval:org.mitre.oval:def:16733](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16733)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0610, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0610 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0610 - **State**: PUBLISHED - **Published Date**: March 06, 2019 at 00:00 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655. ### Affected Products **Microsoft - Microsoft Edge** Affected versions: - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) - Windows Server 2019 (Status: affected) - Windows 10 Version 1709 for ARM64-based Systems (Status: affected) **Microsoft - ChakraCore** Affected versions: - unspecified (Status: affected) ### References 1. [106908](http://www.securityfocus.com/bid/106908) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0610)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0361 - **State**: PUBLISHED - **Published Date**: April 08, 2025 at 05:38 UTC - **Last Updated**: April 08, 2025 at 14:50 UTC - **Reserved Date**: January 09, 2025 at 08:02 UTC - **Assigned By**: Axis ### Vulnerability Description During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-203: Improper Input Validation ### Affected Products **Axis Communications AB - AXIS OS** Affected versions: - 11.11.0 (Status: affected) - 12.0.0 (Status: affected) ### References 1. [](https://www.axis.com/dam/public/f4/9b/13/cve-2025-0361pdf-en-US-474511.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5770, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5770 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5770 - **State**: PUBLISHED - **Published Date**: March 20, 2018 at 15:00 UTC - **Last Updated**: August 05, 2024 at 05:40 UTC - **Reserved Date**: January 18, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Tenda AC15 devices. A remote, unauthenticated attacker can make a request to /goform/telnet, creating a telnetd service on the device. This service is password protected; however, several default accounts exist on the device that are root accounts, which can be used to log in. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.fidusinfosec.com/tenda-ac15-unauthenticated-telnetd-start-cve-2018-5770/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5499, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5499 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5499 - **State**: PUBLISHED - **Published Date**: June 03, 2025 at 13:31 UTC - **Last Updated**: June 03, 2025 at 13:42 UTC - **Reserved Date**: June 03, 2025 at 05:14 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical has been found in slackero phpwcms up to 1.9.45/1.10.8. Affected is the function is_file/getimagesize of the file image_resized.php. The manipulation of the argument imgfile leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data - CWE-20: Improper Input Validation ### Affected Products **slackero - phpwcms** Affected versions: - 1.9.0 (Status: affected) - 1.9.1 (Status: affected) - 1.9.2 (Status: affected) - 1.9.3 (Status: affected) - 1.9.4 (Status: affected) - 1.9.5 (Status: affected) - 1.9.6 (Status: affected) - 1.9.7 (Status: affected) - 1.9.8 (Status: affected) - 1.9.9 (Status: affected) - 1.9.10 (Status: affected) - 1.9.11 (Status: affected) - 1.9.12 (Status: affected) - 1.9.13 (Status: affected) - 1.9.14 (Status: affected) - 1.9.15 (Status: affected) - 1.9.16 (Status: affected) - 1.9.17 (Status: affected) - 1.9.18 (Status: affected) - 1.9.19 (Status: affected) - 1.9.20 (Status: affected) - 1.9.21 (Status: affected) - 1.9.22 (Status: affected) - 1.9.23 (Status: affected) - 1.9.24 (Status: affected) - 1.9.25 (Status: affected) - 1.9.26 (Status: affected) - 1.9.27 (Status: affected) - 1.9.28 (Status: affected) - 1.9.29 (Status: affected) - 1.9.30 (Status: affected) - 1.9.31 (Status: affected) - 1.9.32 (Status: affected) - 1.9.33 (Status: affected) - 1.9.34 (Status: affected) - 1.9.35 (Status: affected) - 1.9.36 (Status: affected) - 1.9.37 (Status: affected) - 1.9.38 (Status: affected) - 1.9.39 (Status: affected) - 1.9.40 (Status: affected) - 1.9.41 (Status: affected) - 1.9.42 (Status: affected) - 1.9.43 (Status: affected) - 1.9.44 (Status: affected) - 1.9.45 (Status: affected) - 1.10.0 (Status: affected) - 1.10.1 (Status: affected) - 1.10.2 (Status: affected) - 1.10.3 (Status: affected) - 1.10.4 (Status: affected) - 1.10.5 (Status: affected) - 1.10.6 (Status: affected) - 1.10.7 (Status: affected) - 1.10.8 (Status: affected) ### References 1. [VDB-310914 | slackero phpwcms image_resized.php getimagesize deserialization](https://vuldb.com/?id.310914) 2. [VDB-310914 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.310914) 3. [Submit #578082 | phpwcms 1.10.8 phar/php filter vulnerability](https://vuldb.com/?submit.578082) 4. [Submit #578083 | phpwcms 1.10.8 phar/php filter vulnerability (Duplicate)](https://vuldb.com/?submit.578083) 5. [](https://github.com/3em0/cve_repo/blob/main/phpwcms/image_resized%23getimagesize.md) 6. [](https://github.com/slackero/phpwcms/releases/tag/v1.10.9) ### Credits - Dem0 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35851, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35851 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35851 - **State**: PUBLISHED - **Published Date**: September 18, 2023 at 02:33 UTC - **Last Updated**: September 25, 2024 at 15:44 UTC - **Reserved Date**: June 19, 2023 at 02:28 UTC - **Assigned By**: twcert ### Vulnerability Description SUNNET WMPro portal's FAQ function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to obtain sensitive information via a database. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SUNNET - WMPro** Affected versions: - V5 (Status: affected) ### References 1. [](https://www.twcert.org.tw/tw/cp-132-7372-3994a-1.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0088, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0088 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0088 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 06:00 UTC - **Last Updated**: December 02, 2024 at 21:46 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in one of the diagnostic test CLI commands on Cisco Industrial Ethernet 4010 Series Switches running Cisco IOS Software could allow an authenticated, local attacker to impact the stability of the device. This could result in arbitrary code execution or a denial of service (DoS) condition. The attacker has to have valid user credentials at privilege level 15. The vulnerability is due to a diagnostic test CLI command that allows the attacker to write to the device memory. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic test command at the CLI. An exploit could allow the attacker to overwrite system memory locations, which could have a negative impact on the stability of the device. Cisco Bug IDs: CSCvf71150. ### Weakness Classification (CWE) - CWE-399: Security Weakness ### Affected Products **n/a - Cisco IOS** Affected versions: - Cisco IOS (Status: affected) ### References 1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-iess) 2. [1040240](http://www.securitytracker.com/id/1040240)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54221, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54221 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54221 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 23:27 UTC - **Last Updated**: December 05, 2024 at 15:11 UTC - **Reserved Date**: December 02, 2024 at 12:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Roninwp FAT Services Booking.This issue affects FAT Services Booking: from n/a through 5.6. ### CVSS Metrics - **CVSS Base Score**: 9.3/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Roninwp - FAT Services Booking** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/fat-services-booking/vulnerability/wordpress-fat-services-booking-plugin-5-6-unauthenticated-sql-injection-vulnerability?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52595, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52595 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52595 - **State**: PUBLISHED - **Published Date**: March 06, 2024 at 06:45 UTC - **Last Updated**: May 04, 2025 at 07:39 UTC - **Reserved Date**: March 02, 2024 at 21:55 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: restart beacon queue when hardware reset When a hardware reset is triggered, all registers are reset, so all queues are forced to stop in hardware interface. However, mac80211 will not automatically stop the queue. If we don't manually stop the beacon queue, the queue will be deadlocked and unable to start again. This patch fixes the issue where Apple devices cannot connect to the AP after calling ieee80211_restart_hw(). ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.4.269 (Status: unaffected) - 5.10.210 (Status: unaffected) - 5.15.149 (Status: unaffected) - 6.1.77 (Status: unaffected) - 6.6.16 (Status: unaffected) - 6.7.4 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48) 2. [](https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e) 3. [](https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c) 4. [](https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957) 5. [](https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83) 6. [](https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb) 7. [](https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3994, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3994 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3994 - **State**: PUBLISHED - **Published Date**: December 08, 2009 at 17:00 UTC - **Last Updated**: August 07, 2024 at 06:45 UTC - **Reserved Date**: November 19, 2009 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Stack-based buffer overflow in the GetUID function in src-IL/src/il_dicom.c in DevIL 1.7.8 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted DICOM file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [FEDORA-2009-13255](http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033809.html) 2. [FEDORA-2009-13219](http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033806.html) 3. [20091204 Secunia Research: DevIL DICOM "GetUID()" Buffer Overflow Vulnerability](http://www.securityfocus.com/archive/1/508217/100/0/threaded) 4. [](http://secunia.com/secunia_research/2009-51/) 5. [](http://sourceforge.net/tracker/download.php?group_id=4470&atid=304470&file_id=353841&aid=2908728) 6. [37955](http://secunia.com/advisories/37955) 7. [37507](http://secunia.com/advisories/37507) 8. [devil-getuid-bo(54547)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54547) 9. [37207](http://www.securityfocus.com/bid/37207) 10. [](http://sourceforge.net/tracker/?func=detail&aid=2908728&group_id=4470&atid=304470)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0897 - **State**: PUBLISHED - **Published Date**: September 18, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 22:38 UTC - **Reserved Date**: December 17, 2015 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Pivotal Cloud Foundry (PCF) Ops Manager before 1.6.17 and 1.7.x before 1.7.8, when vCloud or vSphere is used, does not properly enable SSH access for operators, which has unspecified impact and remote attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://pivotal.io/security/cve-2016-0897)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11357 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:45 UTC - **Last Updated**: December 20, 2021 at 22:45 UTC - **Reserved Date**: March 31, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3713 - **State**: PUBLISHED - **Published Date**: July 19, 2006 at 10:00 UTC - **Last Updated**: August 07, 2024 at 18:39 UTC - **Reserved Date**: July 18, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in OC4J for Oracle Application Server 10.1.3.0 has unknown impact and attack vectors, aka Oracle Vuln# AS09. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016529](http://securitytracker.com/id?1016529) 2. [19054](http://www.securityfocus.com/bid/19054) 3. [oracle-cpu-july-2006(27897)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27897) 4. [21165](http://secunia.com/advisories/21165) 5. [HPSBMA02133](http://www.securityfocus.com/archive/1/440758/100/100/threaded) 6. [ADV-2006-2947](http://www.vupen.com/english/advisories/2006/2947) 7. [](http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html) 8. [SSRT061201](http://www.securityfocus.com/archive/1/440758/100/100/threaded) 9. [TA06-200A](http://www.us-cert.gov/cas/techalerts/TA06-200A.html) 10. [21111](http://secunia.com/advisories/21111) 11. [](http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html) 12. [ADV-2006-2863](http://www.vupen.com/english/advisories/2006/2863)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-34820, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-34820 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-34820 - **State**: PUBLISHED - **Published Date**: June 11, 2024 at 14:57 UTC - **Last Updated**: August 02, 2024 at 02:59 UTC - **Reserved Date**: May 09, 2024 at 12:39 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in If So Plugin If-So Dynamic Content Personalization.This issue affects If-So Dynamic Content Personalization: from n/a through 1.7.1. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **If So Plugin - If-So Dynamic Content Personalization** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/if-so/wordpress-if-so-dynamic-content-personalization-plugin-1-7-1-broken-access-control-vulnerability?_s_id=cve) ### Credits - Dhabaleshwar Das (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6673, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6673 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6673 - **State**: PUBLISHED - **Published Date**: January 08, 2008 at 11:00 UTC - **Last Updated**: August 07, 2024 at 16:18 UTC - **Reserved Date**: January 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Makale Scripti allows remote attackers to inject arbitrary web script or HTML via the ara parameter to the default URI under Ara/ in a search action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [makalescripti-default-xss(39456)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39456) 2. [27067](http://www.securityfocus.com/bid/27067) 3. [28262](http://secunia.com/advisories/28262) 4. [](http://www.packetstormsecurity.org/0712-exploits/makale-xss.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4216, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4216 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4216 - **State**: PUBLISHED - **Published Date**: November 01, 2011 at 19:00 UTC - **Last Updated**: August 07, 2024 at 00:01 UTC - **Reserved Date**: November 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Investintech.com SlimPDF Reader does not properly restrict write operations, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [slimpdf-write-operations-code-exec(71100)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71100) 2. [VU#275036](http://www.kb.cert.org/vuls/id/275036)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39420 - **State**: PUBLISHED - **Published Date**: October 18, 2022 at 00:00 UTC - **Last Updated**: September 23, 2024 at 15:22 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Data, Functional Security). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Affected Products **Oracle Corporation - Transportation Management** Affected versions: - 6.4.3 (Status: affected) - 6.5.1 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2022.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1376 - **State**: PUBLISHED - **Published Date**: June 17, 2010 at 16:00 UTC - **Last Updated**: September 16, 2024 at 20:31 UTC - **Reserved Date**: April 15, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Multiple format string vulnerabilities in Network Authorization in Apple Mac OS X 10.6 before 10.6.4 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a (1) afp, (2) cifs, or (3) smb URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [APPLE-SA-2010-06-15-1](http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html) 2. [ADV-2010-1481](http://www.vupen.com/english/advisories/2010/1481) 3. [40871](http://www.securityfocus.com/bid/40871) 4. [1024103](http://securitytracker.com/id?1024103) 5. [](http://support.apple.com/kb/HT4188) 6. [40220](http://secunia.com/advisories/40220)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4083, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4083 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4083 - **State**: PUBLISHED - **Published Date**: December 08, 2005 at 01:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: December 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in xs_edit.php in the eXtreme Styles phpBB module 2.2.1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the edit parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20051203 eXtreme Styles mod <= 2.2.1 Multiple Vulnerabilities](http://www.securityfocus.com/archive/1/418518/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19767 - **State**: PUBLISHED - **Published Date**: September 07, 2021 at 21:59 UTC - **Last Updated**: August 04, 2024 at 14:15 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A lack of target address verification in the destroycontract() function of 0xRACER 1.0 allows attackers to steal tokens from victim users via a crafted script. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/OSUPlayer/CVEs/blob/master/Suicidal/2019-07-09-03.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1880, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1880 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1880 - **State**: PUBLISHED - **Published Date**: April 05, 2023 at 00:00 UTC - **Last Updated**: February 10, 2025 at 19:50 UTC - **Reserved Date**: April 05, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **thorsten - thorsten/phpmyfaq** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e) 2. [](https://github.com/thorsten/phpmyfaq/commit/bbc5d4aa4a4375c14e34dd9fcad2042066fe476d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8220, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8220 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8220 - **State**: PUBLISHED - **Published Date**: October 17, 2019 at 20:26 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions, 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-49.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-27495, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-27495 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-27495 - **State**: PUBLISHED - **Published Date**: April 20, 2023 at 17:05 UTC - **Last Updated**: February 05, 2025 at 16:07 UTC - **Reserved Date**: March 01, 2023 at 19:03 UTC - **Assigned By**: GitHub_M ### Vulnerability Description @fastify/csrf-protection is a plugin which helps protect Fastify servers against CSRF attacks. The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions. @fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism. As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the userInfo parameter, making tokens non-spoofable by attackers. This protection is effective as long as the userInfo parameter is unique for each user. This is patched in versions 6.3.0 and v4.1.0. Users are advised to upgrade. Users unable to upgrade may use a random, non-predictable userInfo parameter for each user as a mitigation. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **fastify - csrf-protection** Affected versions: - < 4.1.0 (Status: affected) - >= 5.0.0, < 6.3.0 (Status: affected) ### References 1. [https://github.com/fastify/csrf-protection/security/advisories/GHSA-qrgf-9gpc-vrxw](https://github.com/fastify/csrf-protection/security/advisories/GHSA-qrgf-9gpc-vrxw) 2. [https://github.com/fastify/csrf-protection/commit/be3e5761f37aa05c7c1ac8ed44499c51ecec8058](https://github.com/fastify/csrf-protection/commit/be3e5761f37aa05c7c1ac8ed44499c51ecec8058) 3. [https://www.cvedetails.com/cve/CVE-2021-29624](https://www.cvedetails.com/cve/CVE-2021-29624)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3746, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3746 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3746 - **State**: PUBLISHED - **Published Date**: November 22, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:24 UTC - **Reserved Date**: November 22, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in thread.php in APBoard allows remote attackers to execute arbitrary SQL commands via the start parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21289](http://www.osvdb.org/21289) 2. [198](http://securityreason.com/securityalert/198) 3. [15513](http://www.securityfocus.com/bid/15513) 4. [apboard-thread-sql-injection(23200)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23200) 5. [20051120 APBoard v [all] ---> [SQL injection]](http://www.securityfocus.com/archive/1/417298)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-10885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-10885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-10885 - **State**: PUBLISHED - **Published Date**: December 04, 2024 at 03:37 UTC - **Last Updated**: December 04, 2024 at 21:05 UTC - **Reserved Date**: November 05, 2024 at 16:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SearchIQ – The Search Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'siq_searchbox' shortcode in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **searchiq - SearchIQ – The Search Solution** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/86e8e16f-9d93-457a-9093-2fd236e51682?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/searchiq/tags/4.6/library/shortcode.php#L66) 3. [](https://plugins.trac.wordpress.org/changeset/3198694/searchiq/trunk/library/shortcode.php) ### Credits - Peter Thaleikis
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25403, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25403 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25403 - **State**: PUBLISHED - **Published Date**: February 23, 2022 at 21:11 UTC - **Last Updated**: August 03, 2024 at 04:36 UTC - **Reserved Date**: February 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HMS v1.0 was discovered to contain a SQL injection vulnerability via the component admin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0792, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0792 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0792 - **State**: PUBLISHED - **Published Date**: February 12, 2023 at 00:00 UTC - **Last Updated**: March 21, 2025 at 18:47 UTC - **Reserved Date**: February 12, 2023 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-94: Code Injection ### Affected Products **thorsten - thorsten/phpmyfaq** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/9e21156b-ab1d-4c60-88ef-8c9f3e2feb7f) 2. [](https://github.com/thorsten/phpmyfaq/commit/d8964568d69488de02f0a0a58acc822eeb5c3cb1) ### Credits - Ahmed Hassan (ahmedvienna) - Josef Hassan (josefjku)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37364 - **State**: PUBLISHED - **Published Date**: October 26, 2021 at 13:23 UTC - **Last Updated**: August 04, 2024 at 01:16 UTC - **Reserved Date**: July 21, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/projects/open-clinic/) 2. [](https://sourceforge.net/projects/open-clinic/files/latest/download) 3. [](https://www.exploit-db.com/exploits/50448)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11797 - **State**: PUBLISHED - **Published Date**: November 27, 2024 at 23:34 UTC - **Last Updated**: November 29, 2024 at 16:59 UTC - **Reserved Date**: November 26, 2024 at 16:02 UTC - **Assigned By**: zdi ### Vulnerability Description Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24662. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **Fuji Electric - Monitouch V-SFT** Affected versions: - 6.2.3.0 (Status: affected) ### References 1. [ZDI-24-1623](https://www.zerodayinitiative.com/advisories/ZDI-24-1623/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2854, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2854 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2854 - **State**: PUBLISHED - **Published Date**: September 08, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 20:52 UTC - **Reserved Date**: September 08, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CRLF injection vulnerability in thesitewizard.com chfeedback.pl Feedback Form Perl Script 2.0.1 allows remote attackers to use the script as a mail relay (spam proxy) via CRLF sequences in the (1) name or (2) email fields, which are injected into mail headers. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [14749](http://www.securityfocus.com/bid/14749) 2. [20050905 thesitewizard.com chfeedback.pl CRLF Injection](http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0094.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1545, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1545 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1545 - **State**: PUBLISHED - **Published Date**: July 14, 2005 at 04:00 UTC - **Last Updated**: September 16, 2024 at 16:59 UTC - **Reserved Date**: July 14, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.macromedia.com/v1/handlers/index.cfm?ID=22291&Method=Full) 2. [allaire-jrun-jsessionid-appended(7679)](http://www.iss.net/security_center/static/7679.php) 3. [3665](http://www.securityfocus.com/bid/3665)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14440, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14440 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14440 - **State**: PUBLISHED - **Published Date**: April 24, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 02:31 UTC - **Reserved Date**: September 13, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a stack overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. ### Affected Products **Sam Lantinga and Mattias Engdegård - Simple DirectMedia Layer** Affected versions: - SDL2_image 2.0.2 (Status: affected) ### References 1. [DSA-4177](https://www.debian.org/security/2018/dsa-4177) 2. [[debian-lts-announce] 20180406 [SECURITY] [DLA 1341-1] sdl-image1.2 security update](https://lists.debian.org/debian-lts-announce/2018/04/msg00005.html) 3. [DSA-4184](https://www.debian.org/security/2018/dsa-4184) 4. [GLSA-201903-17](https://security.gentoo.org/glsa/201903-17) 5. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0489)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0869, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0869 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0869 - **State**: PUBLISHED - **Published Date**: March 26, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 26, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description phpSysInfo 2.3 allows remote attackers to obtain sensitive information via a direct request to (1) class.OpenBSD.inc.php, (2) class.NetBSD.inc.php, (3) class.FreeBSD.inc.php, (4) class.Darwin.inc.php, (5) XPath.class.php, (6) system_header.php, or (7) system_footer.php, which reveal the path in a PHP error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [phpsysinfo-path-disclosure(19808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19808) 2. [14690](http://secunia.com/advisories/14690/) 3. [20050323 [SECURITYREASON.COM] phpSysInfo 2.3 Multiple vulnerabilities](http://marc.info/?l=bugtraq&m=111161017209422&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2137, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2137 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2137 - **State**: PUBLISHED - **Published Date**: July 22, 2022 at 14:57 UTC - **Last Updated**: April 16, 2025 at 16:14 UTC - **Reserved Date**: June 20, 2022 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description The affected product is vulnerable to two SQL injections that require high privileges for exploitation and may allow an unauthorized attacker to disclose information ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Advantech iView - iView** Affected versions: - All (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-03) ### Credits - rgod, working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA