System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24275, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24275 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24275 - **State**: PUBLISHED - **Published Date**: July 20, 2023 at 00:00 UTC - **Last Updated**: October 24, 2024 at 19:48 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/swoole/swoole-src/pull/3539) 2. [](https://github.com/swoole/swoole-src/pull/3545) 3. [](https://blog.cal1.cn/post/HTTP%20Response%20Header%20Injection%20in%20Swoole%3C%3D4.5.2) 4. [](https://portswigger.net/kb/issues/00200200_http-response-header-injection)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4489, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4489 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4489 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-5253, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-5253 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-5253 - **State**: PUBLISHED - **Published Date**: March 10, 2020 at 16:35 UTC - **Last Updated**: August 04, 2024 at 08:22 UTC - **Reserved Date**: January 02, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0. ### CVSS Metrics - **CVSS Base Score**: 3.9/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-184: Security Weakness ### Affected Products **NetHack - NetHack** Affected versions: - < 3.6.0 (Status: affected) ### References 1. [](https://github.com/NetHack/NetHack/security/advisories/GHSA-2c7p-3fj4-223m) 2. [](https://github.com/NetHack/NetHack/commits/612755bfb5c412079795c68ba392df5d93874ed8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1371, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1371 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1371 - **State**: PUBLISHED - **Published Date**: July 21, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 22:36 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Builder tools running in the IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 contains a vulnerability that could allow an authenticated user to execute Builder tool actions they do not have access to. IBM X-Force ID: 126864. ### Affected Products **IBM - TRIRIGA Application Platform** Affected versions: - 3.3.2 (Status: affected) - 3.4 (Status: affected) - 3.4.1 (Status: affected) - 3.4.2 (Status: affected) - 3.5 (Status: affected) - 3.5.1 (Status: affected) - 3.5.2 (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/126864) 2. [](http://www.ibm.com/support/docview.wss?uid=swg22004674)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0333, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0333 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0333 - **State**: PUBLISHED - **Published Date**: February 10, 2021 at 16:49 UTC - **Last Updated**: August 03, 2024 at 15:39 UTC - **Reserved Date**: November 06, 2020 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491 ### Affected Products **n/a - Android** Affected versions: - Android-8.1 Android-9 Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2021-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-4211, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-4211 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-4211 - **State**: PUBLISHED - **Published Date**: July 13, 2016 at 01:00 UTC - **Last Updated**: August 06, 2024 at 00:25 UTC - **Reserved Date**: April 27, 2016 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91716](http://www.securityfocus.com/bid/91716) 2. [1036281](http://www.securitytracker.com/id/1036281) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb16-26.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40035, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40035 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40035 - **State**: PUBLISHED - **Published Date**: January 07, 2022 at 22:39 UTC - **Last Updated**: August 04, 2024 at 02:27 UTC - **Reserved Date**: August 23, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. ### Affected Products **Huawei - EMUI** Affected versions: - 12.0.0 (Status: affected) - 11.0.1 (Status: affected) - 11.0.0 (Status: affected) - 10.1.1 (Status: affected) - 10.1.0 (Status: affected) - 10.0.0 (Status: affected) **Huawei - Magic UI** Affected versions: - 4.0.0 (Status: affected) - 3.1.1 (Status: affected) - 3.1.0 (Status: affected) - 3.0.0 (Status: affected) **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/1/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-14750, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-14750 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-14750 - **State**: PUBLISHED - **Published Date**: August 07, 2019 at 16:38 UTC - **Last Updated**: August 05, 2024 at 00:26 UTC - **Reserved Date**: August 07, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/osTicket/osTicket/releases/tag/v1.12.1) 2. [](https://github.com/osTicket/osTicket/releases/tag/v1.10.7) 3. [](https://github.com/osTicket/osTicket/commit/c3ba5b78261e07a883ad8fac28c214486c854e12) 4. [](http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html) 5. [47226](https://www.exploit-db.com/exploits/47226)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6287, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6287 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6287 - **State**: PUBLISHED - **Published Date**: December 04, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:19 UTC - **Reserved Date**: December 04, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in AtomixMP3 2.3 and earlier allows remote attackers to execute arbitrary code via a long pathname in an M3U file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [23151](http://secunia.com/advisories/23151) 2. [21380](http://www.securityfocus.com/bid/21380) 3. [atomixmp3-plsm3u-bo(30633)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30633) 4. [2873](https://www.exploit-db.com/exploits/2873) 5. [ADV-2006-4804](http://www.vupen.com/english/advisories/2006/4804)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-56070, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-56070 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-56070 - **State**: PUBLISHED - **Published Date**: December 31, 2024 at 13:35 UTC - **Last Updated**: December 31, 2024 at 16:09 UTC - **Reserved Date**: December 14, 2024 at 19:43 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Azzaroco - WP SuperBackup** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/indeed-wp-superbackup/vulnerability/wordpress-wp-superbackup-plugin-2-3-3-multiple-subscriber-broken-access-control-vulnerabilities?_s_id=cve) ### Credits - Dave Jong (Patchstack)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-7050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-7050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-7050 - **State**: PUBLISHED - **Published Date**: July 26, 2024 at 15:14 UTC - **Last Updated**: August 01, 2024 at 21:45 UTC - **Reserved Date**: July 23, 2024 at 19:16 UTC - **Assigned By**: OpenText ### Vulnerability Description Improper Authentication vulnerability in OpenText OpenText Directory Services may allow Multi-factor Authentication Bypass in particular scenarios.This issue affects OpenText Directory Services: 24.2. ### Weakness Classification (CWE) - CWE-287: Improper Authentication ### Affected Products **OpenText - OpenText Directory Services** Affected versions: - 24.2 (Status: affected) ### References 1. [](https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0821213)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3172, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3172 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3172 - **State**: PUBLISHED - **Published Date**: July 10, 2013 at 01:00 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 17, 2013 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to cause a denial of service (system hang) via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overflow Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:17188](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17188) 2. [MS13-053](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-2441, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-2441 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-2441 - **State**: PUBLISHED - **Published Date**: January 16, 2019 at 19:00 UTC - **Last Updated**: October 02, 2024 at 16:14 UTC - **Reserved Date**: December 14, 2018 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Application Container - JavaEE). The supported version that is affected is 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). ### Affected Products **Oracle Corporation - WebLogic Server** Affected versions: - 12.2.1.3 (Status: affected) ### References 1. [106593](http://www.securityfocus.com/bid/106593) 2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53788, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53788 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53788 - **State**: PUBLISHED - **Published Date**: November 30, 2024 at 21:05 UTC - **Last Updated**: December 01, 2024 at 23:07 UTC - **Reserved Date**: November 22, 2024 at 13:53 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Portfoliohub WordPress Portfolio Builder – Portfolio Gallery allows Stored XSS.This issue affects WordPress Portfolio Builder – Portfolio Gallery: from n/a through 1.1.7. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Portfoliohub - WordPress Portfolio Builder – Portfolio Gallery** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/uber-grid/vulnerability/wordpress-wordpress-portfolio-builder-portfolio-gallery-plugin-1-1-7-cross-site-scripting-xss-vulnerability-2?_s_id=cve) ### Credits - Hakiduck (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2130, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2130 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2130 - **State**: PUBLISHED - **Published Date**: March 09, 2025 at 22:00 UTC - **Last Updated**: March 10, 2025 at 17:52 UTC - **Reserved Date**: March 09, 2025 at 07:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in OpenXE up to 1.12. It has been declared as problematic. This vulnerability affects unknown code of the component Ticket Bearbeiten Page. The manipulation of the argument Notizen leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **n/a - OpenXE** Affected versions: - 1.0 (Status: affected) - 1.1 (Status: affected) - 1.2 (Status: affected) - 1.3 (Status: affected) - 1.4 (Status: affected) - 1.5 (Status: affected) - 1.6 (Status: affected) - 1.7 (Status: affected) - 1.8 (Status: affected) - 1.9 (Status: affected) - 1.10 (Status: affected) - 1.11 (Status: affected) - 1.12 (Status: affected) ### References 1. [VDB-299050 | OpenXE Ticket Bearbeiten Page cross site scripting](https://vuldb.com/?id.299050) 2. [VDB-299050 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299050) 3. [Submit #511529 | OpenXE Org OpenXE 1.12 Improper Neutralization of Alternate XSS Syntax](https://vuldb.com/?submit.511529) 4. [](https://github.com/janssensjelle/published-pocs/blob/main/openxe-xss-ticket.md) 5. [](https://www.singto.io/pocsforexploits/openxe/openxe-xss-ticket.html) ### Credits - Jelle Janssens (VulDB User) - Jelle Janssens (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-7521, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-7521 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-7521 - **State**: PUBLISHED - **Published Date**: March 21, 2018 at 20:00 UTC - **Last Updated**: September 16, 2024 at 19:04 UTC - **Reserved Date**: February 26, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **ICS-CERT - Omron CX-Supervisor** Affected versions: - Version 3.30 and prior (Status: affected) ### References 1. [103394](http://www.securityfocus.com/bid/103394) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-32230, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-32230 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-32230 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 08:09 UTC - **Last Updated**: April 10, 2025 at 18:58 UTC - **Reserved Date**: April 04, 2025 at 10:01 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Themeum Tutor LMS. This issue affects Tutor LMS: from n/a through 3.4.0. ### CVSS Metrics - **CVSS Base Score**: 4.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-80: Security Weakness ### Affected Products **Themeum - Tutor LMS** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/tutor/vulnerability/wordpress-tutor-lms-plugin-3-4-0-html-injection-vulnerability?_s_id=cve) ### Credits - Revan Arifio (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1542, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1542 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1542 - **State**: PUBLISHED - **Published Date**: March 30, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: March 30, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31492](http://secunia.com/advisories/31492) 2. [RHSA-2008:0629](http://www.redhat.com/support/errata/RHSA-2008-0629.html) 3. [1591](https://www.exploit-db.com/exploits/1591) 4. [](http://www.gotfault.net/research/exploit/gexp-python.py)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4422, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4422 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4422 - **State**: PUBLISHED - **Published Date**: August 18, 2007 at 21:00 UTC - **Last Updated**: August 07, 2024 at 14:53 UTC - **Reserved Date**: August 18, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The login interface in Symantec Enterprise Firewall 6.x, when a VPN with pre-shared key (PSK) authentication is enabled, generates different responses depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [26511](http://secunia.com/advisories/26511) 2. [1018578](http://www.securitytracker.com/id?1018578) 3. [25338](http://www.securityfocus.com/bid/25338) 4. [](http://www.symantec.com/avcenter/security/Content/2007.08.16.html) 5. [36489](http://www.osvdb.org/36489) 6. [sef-username-enumeration(36081)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36081) 7. [ADV-2007-2909](http://www.vupen.com/english/advisories/2007/2909)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0795 - **State**: PUBLISHED - **Published Date**: March 02, 2024 at 21:16 UTC - **Last Updated**: August 15, 2024 at 18:40 UTC - **Reserved Date**: January 22, 2024 at 22:19 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated privileges on the instance ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **mintplex-labs - mintplex-labs/anything-llm** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec) 2. [](https://github.com/mintplex-labs/anything-llm/commit/9a237db3d1f66cdbcf5079599258f5fb251c5564)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21526, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21526 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21526 - **State**: PUBLISHED - **Published Date**: April 20, 2021 at 16:45 UTC - **Last Updated**: September 17, 2024 at 00:06 UTC - **Reserved Date**: January 04, 2021 at 00:00 UTC - **Assigned By**: dell ### Vulnerability Description Dell PowerScale OneFS 8.1.0 - 9.1.0 contains a privilege escalation in SmartLock compliance mode that may allow compadmin to execute arbitrary commands as root. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Dell - PowerScale OneFS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000185202)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-5384, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-5384 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-5384 - **State**: PUBLISHED - **Published Date**: June 05, 2019 at 14:52 UTC - **Last Updated**: August 04, 2024 at 19:54 UTC - **Reserved Date**: January 04, 2019 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. ### Affected Products **n/a - HPE Intelligent Management Center (IMC) PLAT** Affected versions: - 7.3 E0506P09 and earlier (Status: affected) ### References 1. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03930en_us)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-2540, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-2540 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-2540 - **State**: PUBLISHED - **Published Date**: July 20, 2009 at 18:00 UTC - **Last Updated**: August 07, 2024 at 05:52 UTC - **Reserved Date**: July 20, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.g-sec.lu/one-bug-to-rule-them-all.html) 2. [20090715 Re:[GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....](http://www.securityfocus.com/archive/1/504988/100/0/threaded) 3. [oval:org.mitre.oval:def:5957](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5957) 4. [opera-integer-value-dos(52874)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52874) 5. [20090716 Re[2]: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....](http://www.securityfocus.com/archive/1/505006/100/0/threaded) 6. [9160](http://www.exploit-db.com/exploits/9160) 7. [20090715 [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....](http://www.securityfocus.com/archive/1/504969/100/0/threaded) 8. [20090715 Re: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....](http://www.securityfocus.com/archive/1/504989/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000024, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000024 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000024 - **State**: PUBLISHED - **Published Date**: July 13, 2017 at 20:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Shotwell version 0.24.4 or earlier and 0.25.3 or earlier is vulnerable to an information disclosure in the web publishing plugins resulting in potential password and oauth token plaintext transmission ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[shotwell] 20170131 ATTENTION! Shotwell 0.24.5 and 0.25.4 released](https://mail.gnome.org/archives/shotwell-list/2017-January/msg00048.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9026 - **State**: PUBLISHED - **Published Date**: June 13, 2017 at 20:00 UTC - **Last Updated**: August 06, 2024 at 08:36 UTC - **Reserved Date**: April 18, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in WideVine DRM. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-06-01) 2. [98874](http://www.securityfocus.com/bid/98874) 3. [1038623](http://www.securitytracker.com/id/1038623)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-14651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-14651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-14651 - **State**: PUBLISHED - **Published Date**: October 31, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 09:38 UTC - **Reserved Date**: July 27, 2018 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths. ### Weakness Classification (CWE) - CWE-59: Security Weakness ### Affected Products **[UNKNOWN] - glusterfs** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651) 2. [RHSA-2018:3431](https://access.redhat.com/errata/RHSA-2018:3431) 3. [[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html) 4. [RHSA-2018:3432](https://access.redhat.com/errata/RHSA-2018:3432) 5. [GLSA-201904-06](https://security.gentoo.org/glsa/201904-06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6386, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6386 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6386 - **State**: PUBLISHED - **Published Date**: October 05, 2016 at 17:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco IOS XE 3.1 through 3.17 and 16.1 on 64-bit platforms allows remote attackers to cause a denial of service (data-structure corruption and device reload) via fragmented IPv4 packets, aka Bug ID CSCux66005. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1036914](http://www.securitytracker.com/id/1036914) 2. [20160928 Cisco IOS XE Software IP Fragment Reassembly Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag) 3. [93202](http://www.securityfocus.com/bid/93202)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1002019, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1002019 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1002019 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 13:00 UTC - **Last Updated**: September 16, 2024 at 20:32 UTC - **Reserved Date**: September 14, 2017 at 00:00 UTC - **Assigned By**: larry_cashdollar ### Vulnerability Description Vulnerability in wordpress plugin eventr v1.02.2, The edit.php form and event_form.php code do not sanitize input, this allows for blind SQL injection via the event parameter. ### Affected Products **Binny V A - eventr** Affected versions: - unspecified (Status: affected) ### References 1. [](https://wordpress.org/plugins/eventr/) 2. [](http://www.vapidlabs.com/advisory.php?v=192)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21427 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: May 05, 2025 at 12:50 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceforge.net/p/freeimage/bugs/298/) 2. [FEDORA-2023-a8b26b910d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RUEK2JOVJBQZVNQIIZZO3JFMTVB4R5KS/) 3. [FEDORA-2023-2840932fa8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UGOMCRAANNCQYJYPPMGRQWKRZGIP6NME/) 4. [[debian-lts-announce] 20231125 [SECURITY] [DLA 3662-1] freeimage security update](https://lists.debian.org/debian-lts-announce/2023/11/msg00020.html) 5. [DSA-5579](https://www.debian.org/security/2023/dsa-5579)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-0299, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-0299 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-0299 - **State**: PUBLISHED - **Published Date**: October 19, 2021 at 18:16 UTC - **Last Updated**: September 16, 2024 at 19:46 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or directly received malformed IPv6 packet in Juniper Networks Junos OS results in a kernel crash, causing the device to restart, leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with IPv6 configured. Devices with only IPv4 configured are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.4R1. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-755: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - unspecified (Status: unaffected) - 19.4 (Status: affected) - 20.1 (Status: affected) - 20.2 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA11213)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-1443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-1443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-1443 - **State**: PUBLISHED - **Published Date**: July 07, 2016 at 14:00 UTC - **Last Updated**: August 05, 2024 at 22:55 UTC - **Reserved Date**: January 04, 2016 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description The virtual network stack on Cisco AMP Threat Grid Appliance devices before 2.1.1 allows remote attackers to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20160706 Cisco AMP Threat Grid Unauthorized Clean IP Access Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160706-tg)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4523, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4523 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4523 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38357, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38357 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38357 - **State**: PUBLISHED - **Published Date**: September 10, 2021 at 13:34 UTC - **Last Updated**: May 02, 2025 at 19:43 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **SMS OVH - SMS OVH** Affected versions: - 0.1 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38357) 2. [](https://plugins.trac.wordpress.org/browser/sms-ovh/trunk/sms-ovh-sent.php#L44) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-0401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-0401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-0401 - **State**: PUBLISHED - **Published Date**: September 17, 2020 at 15:28 UTC - **Last Updated**: August 04, 2024 at 06:02 UTC - **Reserved Date**: October 17, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In setInstallerPackageName of PackageManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and granting spurious permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150857253 ### Affected Products **n/a - Android** Affected versions: - Android-8.0 Android-8.1 Android-9 Android-10 Android-11 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2020-09-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13194 - **State**: PUBLISHED - **Published Date**: July 05, 2018 at 02:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: July 04, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mintToken function of a smart contract implementation for TongTong Coin (TTCoin), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md) 2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TTCoin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3910, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3910 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3910 - **State**: PUBLISHED - **Published Date**: April 17, 2024 at 12:00 UTC - **Last Updated**: August 01, 2024 at 20:26 UTC - **Reserved Date**: April 17, 2024 at 05:42 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in Tenda AC500 2.0.1.9(1307). Affected by this issue is the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261146 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **Tenda - AC500** Affected versions: - 2.0.1.9(1307) (Status: affected) ### References 1. [VDB-261146 | Tenda AC500 DhcpListClient fromDhcpListClient stack-based overflow](https://vuldb.com/?id.261146) 2. [VDB-261146 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.261146) 3. [Submit #313805 | Tenda AC500 V2.0.1.9(1307) buffer overflow](https://vuldb.com/?submit.313805) 4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md) ### Credits - yhryhryhr_tu (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45667 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:25 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R8000P before 1.4.1.66, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:H/AV:A/A:L/C:L/I:H/PR:H/S:C/UI:R` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064481/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0256)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-2952, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-2952 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-2952 - **State**: PUBLISHED - **Published Date**: May 29, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 19:50 UTC - **Reserved Date**: May 29, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in add_ons.php in Jaow 2.4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the add_ons parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.jaow.net/Article-97) 2. [49266](http://secunia.com/advisories/49266) 3. [53677](http://www.securityfocus.com/bid/53677) 4. [jaow-addons-sql-injection(75866)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75866) 5. [82231](http://osvdb.org/82231) 6. [18921](http://www.exploit-db.com/exploits/18921)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11091 - **State**: PUBLISHED - **Published Date**: June 03, 2020 at 22:55 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it's pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them. By sending rogue router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container. Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. If by chance you also have on the host a vulnerability like last year's RCE in apt (CVE-2019-3462), you can now escalate to the host. Weave Net version 2.6.3 disables the accept_ra option on the veth devices that it creates. ### CVSS Metrics - **CVSS Base Score**: 5.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-350: Security Weakness ### Affected Products **weaveworks - Weave** Affected versions: - < 2.6.3 (Status: affected) ### References 1. [](https://github.com/weaveworks/weave/security/advisories/GHSA-59qg-grp7-5r73) 2. [](https://github.com/weaveworks/weave/commit/15f21f1899060f7716c70a8555a084e836f39a60)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26349 - **State**: PUBLISHED - **Published Date**: May 11, 2022 at 16:24 UTC - **Last Updated**: September 17, 2024 at 01:05 UTC - **Reserved Date**: January 29, 2021 at 00:00 UTC - **Assigned By**: AMD ### Vulnerability Description Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA). ### Affected Products **AMD - EPYC™ Processors** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11102 - **State**: PUBLISHED - **Published Date**: December 18, 2019 at 21:09 UTC - **Last Updated**: August 04, 2024 at 22:40 UTC - **Reserved Date**: April 11, 2019 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description Insufficient input validation in Intel(R) DAL software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access. ### Affected Products **n/a - Intel(R) DAL software for Intel(R) CSME** Affected versions: - See provided reference (Status: affected) ### References 1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-3640, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-3640 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-3640 - **State**: PUBLISHED - **Published Date**: July 25, 2012 at 20:00 UTC - **Last Updated**: August 06, 2024 at 20:13 UTC - **Reserved Date**: June 19, 2012 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT5485) 2. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html) 3. [](http://support.apple.com/kb/HT5503) 4. [APPLE-SA-2012-09-12-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html) 5. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html) 6. [](http://support.apple.com/kb/HT5400)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-2373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-2373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-2373 - **State**: PUBLISHED - **Published Date**: February 14, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 04:14 UTC - **Reserved Date**: December 15, 2017 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description Under certain circumstances, a specific endpoint of the Controller's API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0. ### Affected Products **SAP SE - SAP HANA Extended Application Services** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://launchpad.support.sap.com/#/notes/2589129) 2. [](https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-44975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-44975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-44975 - **State**: PUBLISHED - **Published Date**: May 24, 2022 at 14:40 UTC - **Last Updated**: August 04, 2024 at 04:32 UTC - **Reserved Date**: December 13, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/radareorg/radare2/issues/19476) 2. [](https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/) 3. [[oss-security] 20220525 multiple vulnerabilities in radare2](http://www.openwall.com/lists/oss-security/2022/05/25/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6720, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6720 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6720 - **State**: PUBLISHED - **Published Date**: March 06, 2014 at 11:00 UTC - **Last Updated**: August 06, 2024 at 17:46 UTC - **Reserved Date**: November 08, 2013 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Directory traversal vulnerability in download.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to bypass intended access restrictions via a .. (dot dot) in the log parameter, as demonstrated using a crafted request for a customer-support file, as demonstrated by a log file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [32546](http://www.exploit-db.com/exploits/32546) 2. [](https://tealeaf.support.ibmcloud.com/FileManagement/Download/19eb90ffb8334b398684b4350edc4b7a) 3. [ibm-tealeaf-cve20136720-lfi(89229)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89229)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7213 - **State**: PUBLISHED - **Published Date**: April 24, 2019 at 14:46 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: January 29, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.smartertools.com/smartermail/release-notes/current) 2. [](https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-smartermail/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2602, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2602 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2602 - **State**: PUBLISHED - **Published Date**: July 11, 2024 at 08:46 UTC - **Last Updated**: August 01, 2024 at 19:18 UTC - **Reserved Date**: March 18, 2024 at 13:19 UTC - **Assigned By**: schneider ### Vulnerability Description CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could result in remote code execution when an authenticated user executes a saved project file that has been tampered by a malicious actor. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Schneider Electric - FoxRTU Station** Affected versions: - All versions prior to v9.3.0 (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-03.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-14769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-14769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-14769 - **State**: PUBLISHED - **Published Date**: October 21, 2020 at 14:04 UTC - **Last Updated**: September 26, 2024 at 20:26 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 5.6.49 and prior (Status: affected) - 5.7.31 and prior (Status: affected) - 8.0.21 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2020.html) 2. [](https://security.netapp.com/advisory/ntap-20201023-0003/) 3. [FEDORA-2020-eee64a579c](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/) 4. [FEDORA-2020-4f9ee82bc5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/) 5. [FEDORA-2020-53df1c05be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/) 6. [GLSA-202105-27](https://security.gentoo.org/glsa/202105-27)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1270, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1270 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1270 - **State**: PUBLISHED - **Published Date**: April 06, 2007 at 00:00 UTC - **Last Updated**: August 07, 2024 at 12:50 UTC - **Reserved Date**: March 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Double free vulnerability in VMware ESX Server 3.0.0 and 3.0.1 allows attackers to cause a denial of service (crash), obtain sensitive information, or possibly execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1017875](http://www.securitytracker.com/id?1017875) 2. [20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates](http://www.securityfocus.com/archive/1/464745/100/0/threaded) 3. [ADV-2007-1267](http://www.vupen.com/english/advisories/2007/1267) 4. [](http://www.vmware.com/support/vi3/doc/esx-6431040-patch.html) 5. [24788](http://secunia.com/advisories/24788) 6. [](http://www.vmware.com/support/vi3/doc/esx-5754280-patch.html) 7. [oval:org.mitre.oval:def:5463](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5463) 8. [35268](http://osvdb.org/35268) 9. [23323](http://www.securityfocus.com/bid/23323) 10. [2524](http://securityreason.com/securityalert/2524)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-46948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-46948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-46948 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 18:40 UTC - **Last Updated**: May 04, 2025 at 07:00 UTC - **Reserved Date**: February 25, 2024 at 13:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: sfc: farch: fix TX queue lookup in TX event handling We're starting from a TXQ label, not a TXQ type, so efx_channel_get_tx_queue() is inappropriate (and could return NULL, leading to panics). ### Affected Products **Linux - Linux** Affected versions: - 12804793b17c0e19115a90d98f2f3df0cb79e233 (Status: affected) - 12804793b17c0e19115a90d98f2f3df0cb79e233 (Status: affected) - 12804793b17c0e19115a90d98f2f3df0cb79e233 (Status: affected) - 12804793b17c0e19115a90d98f2f3df0cb79e233 (Status: affected) **Linux - Linux** Affected versions: - 5.10 (Status: affected) - 0 (Status: unaffected) - 5.10.36 (Status: unaffected) - 5.11.20 (Status: unaffected) - 5.12.3 (Status: unaffected) - 5.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253) 2. [](https://git.kernel.org/stable/c/35c7a83ad1bb1d48ae249346e61b1132bcbf9052) 3. [](https://git.kernel.org/stable/c/e531db1ea6f98c9612cb2de093a107c7eadfb96c) 4. [](https://git.kernel.org/stable/c/83b09a1807415608b387c7bc748d329fefc5617e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52653, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52653 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52653 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 13:04 UTC - **Last Updated**: May 04, 2025 at 07:40 UTC - **Reserved Date**: March 06, 2024 at 09:52 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: SUNRPC: fix a memleak in gss_import_v2_context The ctx->mech_used.data allocated by kmemdup is not freed in neither gss_import_v2_context nor it only caller gss_krb5_import_sec_context, which frees ctx on error. Thus, this patch reform the last call of gss_import_v2_context to the gss_krb5_import_ctx_v2, preventing the memleak while keepping the return formation. ### Affected Products **Linux - Linux** Affected versions: - 47d84807762966c3611c38adecec6ea703ddda7a (Status: affected) - 47d84807762966c3611c38adecec6ea703ddda7a (Status: affected) - 47d84807762966c3611c38adecec6ea703ddda7a (Status: affected) - 47d84807762966c3611c38adecec6ea703ddda7a (Status: affected) **Linux - Linux** Affected versions: - 2.6.35 (Status: affected) - 0 (Status: unaffected) - 6.6.23 (Status: unaffected) - 6.7.11 (Status: unaffected) - 6.8.2 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c) 2. [](https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4) 3. [](https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822) 4. [](https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4310 - **State**: PUBLISHED - **Published Date**: August 23, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 19:06 UTC - **Reserved Date**: August 23, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Mozilla Firefox 1.5.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FTP response, when attempting to connect with a username and password via the FTP URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060822 (exploit) firefox 1.5.0.6 linux DoS](http://www.securityfocus.com/archive/1/444064/100/0/threaded) 2. [23235](http://secunia.com/advisories/23235) 3. [DSA-1225](http://www.debian.org/security/2006/dsa-1225) 4. [19678](http://www.securityfocus.com/bid/19678) 5. [DSA-1227](http://www.debian.org/security/2006/dsa-1227) 6. [23202](http://secunia.com/advisories/23202) 7. [23197](http://secunia.com/advisories/23197) 8. [1444](http://securityreason.com/securityalert/1444) 9. [DSA-1224](http://www.debian.org/security/2006/dsa-1224)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16754 - **State**: REJECTED - **Published Date**: December 20, 2021 at 22:51 UTC - **Last Updated**: December 20, 2021 at 22:51 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15943 - **State**: PUBLISHED - **Published Date**: October 12, 2018 at 18:00 UTC - **Last Updated**: August 05, 2024 at 10:10 UTC - **Reserved Date**: August 28, 2018 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **Adobe - Adobe Acrobat and Reader** Affected versions: - 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier versions (Status: affected) ### References 1. [1041809](http://www.securitytracker.com/id/1041809) 2. [105439](http://www.securityfocus.com/bid/105439) 3. [](https://helpx.adobe.com/security/products/acrobat/apsb18-30.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-36413, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-36413 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-36413 - **State**: PUBLISHED - **Published Date**: March 23, 2023 at 00:00 UTC - **Last Updated**: February 25, 2025 at 15:43 UTC - **Reserved Date**: July 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Zoho ManageEngine ADSelfService Plus through 6203 is vulnerable to a brute-force attack that leads to a password reset on IDM applications. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.manageengine.com/products/self-service-password/advisory/CVE-2022-36413.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24374 - **State**: PUBLISHED - **Published Date**: June 21, 2021 at 19:18 UTC - **Last Updated**: August 03, 2024 at 19:28 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Jetpack Carousel module of the JetPack WordPress plugin before 9.8 allows users to create a "carousel" type image gallery and allows users to comment on the images. A security vulnerability was found within the Jetpack Carousel module by nguyenhg_vcs that allowed the comments of non-published page/posts to be leaked. ### Weakness Classification (CWE) - CWE-639: Security Weakness ### Affected Products **Automattic - Jetpack – WP Security, Backup, Speed, & Growth** Affected versions: - 9.8 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/08a8a51c-49d3-4bce-b7e0-e365af1d8f33) 2. [](https://jetpack.com/2021/06/01/jetpack-9-8-engage-your-audience-with-wordpress-stories/) ### Credits - nguyenhg_vcs
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4185, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4185 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4185 - **State**: PUBLISHED - **Published Date**: October 10, 2012 at 17:00 UTC - **Last Updated**: August 06, 2024 at 20:28 UTC - **Reserved Date**: August 08, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [50904](http://secunia.com/advisories/50904) 2. [50984](http://secunia.com/advisories/50984) 3. [50935](http://secunia.com/advisories/50935) 4. [50856](http://secunia.com/advisories/50856) 5. [oval:org.mitre.oval:def:16009](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16009) 6. [50892](http://secunia.com/advisories/50892) 7. [86116](http://osvdb.org/86116) 8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=785753) 9. [RHSA-2012:1351](http://rhn.redhat.com/errata/RHSA-2012-1351.html) 10. [50936](http://secunia.com/advisories/50936) 11. [firefox-nschartraitslength-bo(79162)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79162) 12. [](http://www.mozilla.org/security/announce/2012/mfsa2012-86.html) 13. [56127](http://www.securityfocus.com/bid/56127) 14. [55318](http://secunia.com/advisories/55318) 15. [SUSE-SU-2012:1351](http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html) 16. [MDVSA-2012:163](http://www.mandriva.com/security/advisories?name=MDVSA-2012:163) 17. [USN-1611-1](http://www.ubuntu.com/usn/USN-1611-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4588, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4588 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4588 - **State**: PUBLISHED - **Published Date**: August 29, 2007 at 01:00 UTC - **Last Updated**: August 07, 2024 at 15:01 UTC - **Reserved Date**: August 28, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in InterWorx Hosting Control Panel (InterWorx-CP) Server Admin Level (NodeWorx) 3.0.2 (1) allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php; and allow remote authenticated users to inject arbitrary web script or HTML via the PATH_INFO to (2) nodeworx.php, (3) users.php, (4) lang.php, (5) themes.php, (6) setup.php, (7) siteworx.php, (8) packages.php, (9) backup.php, (10) import.php, (11) scriptworx.php, (12) resellers.php, (13) reseller-packages.php, (14) http.php, (15) mail.php, (16) ftp.php, (17) mysql.php, (18) sshd.php, (19) nfs.php, (20) cron.php, (21) ip.php, (22) firewall.php, (23) updates.php, (24) rrd.php, or (25) cluster.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [36762](http://osvdb.org/36762) 2. [36743](http://osvdb.org/36743) 3. [25451](http://www.securityfocus.com/bid/25451) 4. [3070](http://securityreason.com/securityalert/3070) 5. [36740](http://osvdb.org/36740) 6. [](http://interworx.com/forums/showthread.php?t=2501) 7. [36765](http://osvdb.org/36765) 8. [36761](http://osvdb.org/36761) 9. [36750](http://osvdb.org/36750) 10. [36759](http://osvdb.org/36759) 11. [36766](http://osvdb.org/36766) 12. [36746](http://osvdb.org/36746) 13. [36744](http://osvdb.org/36744) 14. [36758](http://osvdb.org/36758) 15. [36751](http://osvdb.org/36751) 16. [36757](http://osvdb.org/36757) 17. [interworx-nodeworx-multiple-file-include(36301)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36301) 18. [](http://www.hackerscenter.com/archive/view.asp?id=27884) 19. [36756](http://osvdb.org/36756) 20. [26586](http://secunia.com/advisories/26586) 21. [20070826 InterWorx-CP Multiple HTML Injections Vulnerabilitie](http://www.securityfocus.com/archive/1/477848/100/0/threaded) 22. [36739](http://osvdb.org/36739) 23. [36747](http://osvdb.org/36747) 24. [36764](http://osvdb.org/36764) 25. [36753](http://osvdb.org/36753) 26. [36745](http://osvdb.org/36745) 27. [36742](http://osvdb.org/36742) 28. [36748](http://osvdb.org/36748) 29. [36763](http://osvdb.org/36763) 30. [36749](http://osvdb.org/36749) 31. [interworxcp-index-xss(36297)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36297) 32. [36752](http://osvdb.org/36752) 33. [36755](http://osvdb.org/36755)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0991, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0991 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0991 - **State**: PUBLISHED - **Published Date**: February 02, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting vulnerability in Proxomitron Naoko-4 BetaFour and earlier allows remote attackers to execute arbitrary script on other clients via an incorrect URL containing the malicious script, which is printed back in an error message. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20010724 Proxomitron Cross-site Scripting Vulnerability](http://www.securityfocus.com/archive/1/198954) 2. [3087](http://www.securityfocus.com/bid/3087) 3. [proxomitron-cross-site-scripting(6887)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6887)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15894, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15894 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15894 - **State**: PUBLISHED - **Published Date**: December 08, 2017 at 16:00 UTC - **Last Updated**: September 16, 2024 at 19:31 UTC - **Reserved Date**: October 25, 2017 at 00:00 UTC - **Assigned By**: synology ### Vulnerability Description Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter. ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Synology - Synology DiskStation Manager (DSM)** Affected versions: - 6.0.x before 6.0.3-8754-3 (Status: affected) - before 5.2-5967-6 (Status: affected) ### References 1. [](https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33848 - **State**: PUBLISHED - **Published Date**: January 21, 2022 at 18:17 UTC - **Last Updated**: April 16, 2025 at 16:46 UTC - **Reserved Date**: November 30, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as stealing internal information and performing actions in context of an authenticated user. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Fresenius Kabi - Vigilant Software Suite (Mastermed Dashboard)** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.cisa.gov/uscert/ics/advisories/icsma-21-355-01) ### Credits - Julian Suleder (ERNW Research GmbH), Nils Emmerich (ERNW Research GmbH), Raphael Pavlidis (ERNW Research GmbH), and Dr. Oliver Matula (ERNW Enno Rey Netzwerke GmbH) reported these vulnerabilities to the German Federal Office for Information Security (BSI) in the context of the BSI project ManiMed (Medical Device Manipulation Project).
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3480 - **State**: PUBLISHED - **Published Date**: November 03, 2005 at 02:00 UTC - **Last Updated**: August 07, 2024 at 23:17 UTC - **Reserved Date**: November 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description login.asp in Ringtail CaseBook 6.1.0 displays different error messages depending on whether a user exists or not, which allows remote attackers to determine valid usernames. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.procheckup.com/Vulner_PR0413.php) 2. [17383](http://secunia.com/advisories/17383) 3. [20422](http://www.osvdb.org/20422)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3615, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3615 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3615 - **State**: PUBLISHED - **Published Date**: October 24, 2011 at 17:00 UTC - **Last Updated**: August 06, 2024 at 23:37 UTC - **Reserved Date**: September 21, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple SQL injection vulnerabilities in Simple Machines Forum (SMF) before 1.1.15 and 2.x before 2.0.1 allow remote attackers to execute arbitrary SQL commands via vectors involving a (1) HTML entity or (2) display name. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [simplemachines-spoofing-unspecified(70617)](https://exchange.xforce.ibmcloud.com/vulnerabilities/70617) 2. [46386](http://secunia.com/advisories/46386) 3. [[oss-security] 20111010 Re: CVE request: simple machines forum before 2.0.1 and 1.1.15](http://openwall.com/lists/oss-security/2011/10/10/6) 4. [[oss-security] 20111009 CVE request: simple machines forum before 2.0.1 and 1.1.15](http://openwall.com/lists/oss-security/2011/10/09/3) 5. [](http://www.simplemachines.org/community/index.php?topic=452888.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-43513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-43513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-43513 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 11:39 UTC - **Last Updated**: April 09, 2025 at 14:05 UTC - **Reserved Date**: October 19, 2022 at 13:06 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in Automation License Manager V5 (All versions), Automation License Manager V6 (All versions < V6.0 SP9 Upd4), TeleControl Server Basic V3 (All versions < V3.1.2). The affected components allow to rename license files with user chosen input without authentication. This could allow an unauthenticated remote attacker to rename and move files as SYSTEM user. ### CVSS Metrics - **CVSS Base Score**: 8.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-73: Security Weakness ### Affected Products **Siemens - Automation License Manager V5** Affected versions: - 0 (Status: affected) **Siemens - Automation License Manager V6** Affected versions: - All versions < V6.0 SP9 Upd4 (Status: affected) **Siemens - TeleControl Server Basic V3** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-476715.pdf) 2. [](https://cert-portal.siemens.com/productcert/html/ssa-476715.html) 3. [](https://cert-portal.siemens.com/productcert/html/ssa-556635.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4748, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4748 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4748 - **State**: PUBLISHED - **Published Date**: March 01, 2011 at 21:00 UTC - **Last Updated**: August 07, 2024 at 03:55 UTC - **Reserved Date**: March 01, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in pmwiki.php in PmWiki 2.2.20 allows remote attackers to inject arbitrary web script or HTML via the from parameter to Main/WikiSandbox. NOTE: some of these details are obtained from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.pmwiki.org/wiki/PmWiki/ChangeLog) 2. [20101214 xss in PmWiki](http://marc.info/?l=full-disclosure&m=129234473228351&w=2) 3. [8113](http://securityreason.com/securityalert/8113) 4. [](http://packetstormsecurity.org/files/view/96687/pm-wiki-xss.txt) 5. [42608](http://secunia.com/advisories/42608) 6. [](http://www.pmwiki.org/wiki/PmWiki/ReleaseNotes)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4345, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4345 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4345 - **State**: PUBLISHED - **Published Date**: December 17, 2005 at 23:00 UTC - **Last Updated**: August 07, 2024 at 23:38 UTC - **Reserved Date**: December 17, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Adobe (formerly Macromedia) ColdFusion MX 7.0 exposes the password hash of the Administrator in an API call, which allows local developers to obtain the hash and gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18078](http://secunia.com/advisories/18078) 2. [](http://www.macromedia.com/devnet/security/security_zone/mpsb05-14.html) 3. [15904](http://www.securityfocus.com/bid/15904) 4. [1015371](http://securitytracker.com/id?1015371) 5. [ADV-2005-2948](http://www.vupen.com/english/advisories/2005/2948)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20096 - **State**: PUBLISHED - **Published Date**: April 05, 2023 at 00:00 UTC - **Last Updated**: October 25, 2024 at 16:01 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack. This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by entering crafted text into various input fields within the web-based management interface. A successful exploit could allow the attacker to perform a stored XSS attack, which could allow the execution of scripts within the context of other users of the interface. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Cisco - Cisco Unified Contact Center Express ** Affected versions: - n/a (Status: affected) ### References 1. [20230405 Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-xss-GO9L9xxr)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26722, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26722 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26722 - **State**: PUBLISHED - **Published Date**: April 03, 2024 at 14:55 UTC - **Last Updated**: May 04, 2025 at 08:54 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() There is a path in rt5645_jack_detect_work(), where rt5645->jd_mutex is left locked forever. That may lead to deadlock when rt5645_jack_detect_work() is called for the second time. Found by Linux Verification Center (linuxtesting.org) with SVACE. ### Affected Products **Linux - Linux** Affected versions: - 48ce529c83522944f116f03884819051f44f0fb6 (Status: affected) - b67005b284ddaf62043468d1ce5905c17d85b0e6 (Status: affected) - ffe13302b8fd486f80c98019bdcb7f3e512d0eda (Status: affected) - 7a3ff8a2bb2620ba6a806f0967c38be1a8d306d9 (Status: affected) - 1613195bf31e68b192bc731bea71726773e3482f (Status: affected) - 8f82f2e4d9c4966282e494ae67b0bc05a6c2b904 (Status: affected) - cdba4301adda7c60a2064bf808e48fccd352aaa9 (Status: affected) - cdba4301adda7c60a2064bf808e48fccd352aaa9 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 4.19.307 (Status: unaffected) - 5.4.269 (Status: unaffected) - 5.10.210 (Status: unaffected) - 5.15.149 (Status: unaffected) - 6.1.79 (Status: unaffected) - 6.6.18 (Status: unaffected) - 6.7.6 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/3dd2d99e2352903d0e0b8769e6c9b8293c7454b2) 2. [](https://git.kernel.org/stable/c/422d5243b9f780abd3d39da2b746e3915677b07d) 3. [](https://git.kernel.org/stable/c/4a98bc739d0753a5810ce5630943cd7614c7717e) 4. [](https://git.kernel.org/stable/c/d14b8e2005f36319df9412d42037416d64827f6b) 5. [](https://git.kernel.org/stable/c/1f0d7792e9023e8658e901b7b76a555f6aa052ec) 6. [](https://git.kernel.org/stable/c/050ad2ca0ac169dd9e552075d2c6af1bbb46534c) 7. [](https://git.kernel.org/stable/c/ed5b8b735369b40d6c1f8ef3e62d369f74b4c491) 8. [](https://git.kernel.org/stable/c/6ef5d5b92f7117b324efaac72b3db27ae8bb3082)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1225, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1225 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1225 - **State**: PUBLISHED - **Published Date**: December 15, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: December 14, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in SugarCRM Sugar Sales before 2.0.1a allows remote attackers to execute arbitrary SQL commands and gain privileges via the record parameter in a DetailView action to index.php, and record parameters in other functionality. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041213 SugarSales Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=110295433323795&w=2) 2. [11740](http://www.securityfocus.com/bid/11740) 3. [sugarcrm-record-sql-injection(18325)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18325) 4. [](http://www.gulftech.org/?node=research&article_id=00053-120104)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19532, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19532 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19532 - **State**: PUBLISHED - **Published Date**: December 03, 2019 at 15:39 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9) 2. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d9d4b1e46d9543a82c23f6df03f4ad697dab361b) 3. [[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3](http://www.openwall.com/lists/oss-security/2019/12/03/4) 4. [USN-4226-1](https://usn.ubuntu.com/4226-1/) 5. [[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html) 6. [[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html) 7. [openSUSE-SU-2020:0336](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-31875, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-31875 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-31875 - **State**: PUBLISHED - **Published Date**: April 29, 2021 at 00:00 UTC - **Last Updated**: August 03, 2024 at 23:10 UTC - **Reserved Date**: April 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In mjs_json.c in Cesanta MongooseOS mJS 1.26, a maliciously formed JSON string can trigger an off-by-one heap-based buffer overflow in mjs_json_parse, which can potentially lead to redirection of control flow. NOTE: the original reporter disputes the significance of this finding because "there isn’t very much of an opportunity to exploit this reliably for an information leak, so there isn’t any real security impact." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://huntr.dev/bounties/1-other-mjs/) 2. [](https://github.com/418sec/mjs/pull/2) 3. [](https://github.com/cesanta/mjs/releases/tag/1.26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13043, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13043 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13043 - **State**: PUBLISHED - **Published Date**: September 14, 2017 at 06:00 UTC - **Last Updated**: August 05, 2024 at 18:58 UTC - **Reserved Date**: August 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23) 2. [](https://support.apple.com/HT208221) 3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971) 4. [1039307](http://www.securitytracker.com/id/1039307) 5. [](https://github.com/the-tcpdump-group/tcpdump/commit/d515b4b4a300479cdf1a6e0d1bb95bc1f9fee514) 6. [](http://www.tcpdump.org/tcpdump-changes.txt) 7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2469 - **State**: REJECTED - **Last Updated**: May 17, 2023 at 07:35 UTC - **Reserved Date**: May 02, 2023 at 08:32 UTC - **Assigned By**: TR-CERT ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-29017, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-29017 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-29017 - **State**: PUBLISHED - **Published Date**: January 14, 2021 at 16:03 UTC - **Last Updated**: October 25, 2024 at 14:23 UTC - **Reserved Date**: November 24, 2020 at 00:00 UTC - **Assigned By**: fortinet ### Vulnerability Description An OS command injection vulnerability in FortiDeceptor 3.1.0, 3.0.1, 3.0.0 may allow a remote authenticated attacker to execute arbitrary commands on the system by exploiting a command injection vulnerability on the Customization page. ### Affected Products **n/a - Fortinet FortiDeceptor** Affected versions: - FortiDeceptor 3.1.0, 3.0.1, 3.0.0 (Status: affected) ### References 1. [](https://www.fortiguard.com/psirt/FG-IR-20-177)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27830, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27830 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27830 - **State**: PUBLISHED - **Published Date**: June 10, 2024 at 20:56 UTC - **Last Updated**: March 13, 2025 at 18:22 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description This issue was addressed through improved state management. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - visionOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - Safari** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214101) 2. [](https://support.apple.com/en-us/HT214106) 3. [](https://support.apple.com/en-us/HT214108) 4. [](https://support.apple.com/en-us/HT214104) 5. [](https://support.apple.com/en-us/HT214103) 6. [](https://support.apple.com/en-us/HT214102) 7. [](http://seclists.org/fulldisclosure/2024/Jun/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-46240, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-46240 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-46240 - **State**: PUBLISHED - **Published Date**: October 31, 2023 at 15:03 UTC - **Last Updated**: September 05, 2024 at 17:36 UTC - **Reserved Date**: October 19, 2023 at 20:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-209: Improper Input Validation ### Affected Products **codeigniter4 - CodeIgniter4** Affected versions: - < 4.4.3 (Status: affected) ### References 1. [https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-hwxf-qxj7-7rfj](https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-hwxf-qxj7-7rfj) 2. [https://github.com/codeigniter4/CodeIgniter4/commit/423569fc31e29f51635a2e59c89770333f0e7563](https://github.com/codeigniter4/CodeIgniter4/commit/423569fc31e29f51635a2e59c89770333f0e7563) 3. [https://codeigniter4.github.io/userguide/general/errors.html#error-reporting](https://codeigniter4.github.io/userguide/general/errors.html#error-reporting)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-30767, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-30767 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-30767 - **State**: PUBLISHED - **Published Date**: December 23, 2021 at 19:48 UTC - **Last Updated**: August 03, 2024 at 22:40 UTC - **Reserved Date**: April 13, 2021 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A local user may be able to modify protected parts of the file system. ### Affected Products **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212975) 2. [](https://support.apple.com/en-us/HT212976) 3. [](https://support.apple.com/en-us/HT212978) 4. [](https://support.apple.com/en-us/HT212979) 5. [](https://support.apple.com/en-us/HT212981)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8031 - **State**: PUBLISHED - **Published Date**: February 11, 2021 at 15:10 UTC - **Last Updated**: September 16, 2024 at 18:08 UTC - **Reserved Date**: January 27, 2020 at 00:00 UTC - **Assigned By**: suse ### Vulnerability Description A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **openSUSE - Open Build Service** Affected versions: - Open Build Service (Status: affected) ### References 1. [](https://bugzilla.suse.com/show_bug.cgi?id=1178880) ### Credits - Sofia Marakhovich of Huawei
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9073 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 06, 2024 at 02:42 UTC - **Reserved Date**: October 27, 2016 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox. This vulnerability affects Firefox < 50. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [94337](http://www.securityfocus.com/bid/94337) 2. [1037298](http://www.securitytracker.com/id/1037298) 3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1289273) 4. [](https://www.mozilla.org/security/advisories/mfsa2016-89/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22000 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 16:36 UTC - **Last Updated**: January 02, 2025 at 18:28 UTC - **Reserved Date**: December 16, 2021 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Common Log File System Driver Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows 7** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 7 Service Pack 1** Affected versions: - 6.1.0 (Status: affected) **Microsoft - Windows 8.1** Affected versions: - 6.3.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Common Log File System Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22000)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19599 - **State**: PUBLISHED - **Published Date**: March 02, 2020 at 19:45 UTC - **Last Updated**: August 05, 2024 at 11:37 UTC - **Reserved Date**: November 27, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Monstra CMS 1.6 allows XSS via an uploaded SVG document to the admin/index.php?id=filesmanager&path=uploads/ URI. NOTE: this is a discontinued product. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/security-provensec/CVE-2018-19599/blob/master/monstra-dev_svg.pdf) 2. [](https://github.com/monstra-cms/monstra/issues/467) 3. [](https://anh.im/image/lG1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11451, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11451 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11451 - **State**: PUBLISHED - **Published Date**: December 07, 2024 at 01:45 UTC - **Last Updated**: December 09, 2024 at 18:04 UTC - **Reserved Date**: November 19, 2024 at 19:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Zooom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zooom' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **harshitpeer - Zooom** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/6bd15878-a290-4613-83d9-011d60bb0233?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/zooom/trunk/zooom.php) 3. [](https://wordpress.org/plugins/zooom/) ### Credits - zakaria
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26841 - **State**: PUBLISHED - **Published Date**: April 25, 2023 at 00:00 UTC - **Last Updated**: February 03, 2025 at 21:16 UTC - **Reserved Date**: February 27, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site request forgery (CSRF) vulnerability in ChurchCRM v4.5.3 allows attackers to change any user's password except for the user that is currently logged in. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ChurchCRM/CRM) 2. [](https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14786, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14786 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14786 - **State**: REJECTED - **Published Date**: May 22, 2018 at 20:00 UTC - **Last Updated**: May 22, 2018 at 19:57 UTC - **Reserved Date**: September 27, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-26789, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-26789 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-26789 - **State**: PUBLISHED - **Published Date**: February 14, 2025 at 00:00 UTC - **Last Updated**: February 14, 2025 at 15:33 UTC - **Reserved Date**: February 14, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment. ### Weakness Classification (CWE) - CWE-1336: Security Weakness ### Affected Products **Logpoint - AgentX** Affected versions: - 0 (Status: affected) ### References 1. [](https://servicedesk.logpoint.com/hc/en-us/articles/24749416515741-Unauthorized-information-access-due-to-inadequate-access-controls)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4576, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4576 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4576 - **State**: PUBLISHED - **Published Date**: July 02, 2014 at 18:00 UTC - **Last Updated**: August 06, 2024 at 11:20 UTC - **Reserved Date**: June 23, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in services/diagnostics.php in the WordPress Social Login plugin 2.0.3 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the xhrurl parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://codevigilant.com/disclosure/wp-plugin-wordpress-social-login-a3-cross-site-scripting-xss)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0454 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 00:00 UTC - **Last Updated**: March 27, 2025 at 14:41 UTC - **Reserved Date**: January 24, 2023 at 00:00 UTC - **Assigned By**: Fluid Attacks ### Vulnerability Description OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path. ### Affected Products **n/a - OrangeScrum** Affected versions: - 2.0.11 (Status: affected) ### References 1. [](https://fluidattacks.com/advisories/slushii/) 2. [](https://github.com/Orangescrum/orangescrum/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1416 - **State**: PUBLISHED - **Published Date**: February 05, 2018 at 16:00 UTC - **Last Updated**: August 06, 2024 at 04:40 UTC - **Reserved Date**: January 27, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150801 Re: CVE-2015-1416: vulnerability in patch(1)](http://www.openwall.com/lists/oss-security/2015/08/02/1) 2. [[oss-security] 20150730 CVE-2015-1416: vulnerability in patch(1)](http://www.openwall.com/lists/oss-security/2015/07/30/9) 3. [[oss-security] 20150801 Re: CVE-2015-1416: vulnerability in patch(1)](http://www.openwall.com/lists/oss-security/2015/08/01/4) 4. [FreeBSD-SA-15:14](https://www.freebsd.org/security/advisories/FreeBSD-SA-15:14.bsdpatch.asc) 5. [1033110](http://www.securitytracker.com/id/1033110) 6. [76116](http://www.securityfocus.com/bid/76116) 7. [[oss-security] 20150802 Re: CVE-2015-1416: vulnerability in patch(1)](http://www.openwall.com/lists/oss-security/2015/08/02/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-2907, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-2907 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-2907 - **State**: PUBLISHED - **Published Date**: August 15, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 23:15 UTC - **Reserved Date**: July 27, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 3.0.1 and earlier allows remote attackers to bypass host-based authentication and submit arbitrary jobs via a modified PBS_O_HOST variable to the qsub program. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=713090) 2. [](https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-2296) 3. [[torqueusers] 20110809 TORQUE authorization security vulnerability](http://www.clusterresources.com/pipermail/torqueusers/2011-August/013194.html) 4. [49119](http://www.securityfocus.com/bid/49119) 5. [45524](http://secunia.com/advisories/45524) 6. [torque-resource-manager-pbsohost-sec-bypass(69138)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69138) 7. [[oss-security] 20110810 CVE-2011-2907: authentication bypass in torque](http://www.openwall.com/lists/oss-security/2011/08/11/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43042, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43042 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43042 - **State**: PUBLISHED - **Published Date**: December 14, 2023 at 00:46 UTC - **Last Updated**: May 22, 2025 at 17:54 UTC - **Reserved Date**: September 15, 2023 at 01:12 UTC - **Assigned By**: ibm ### Vulnerability Description IBM SAN Volume Controller, IBM Storwize, IBM FlashSystem and IBM Storage Virtualize 8.3 products use default passwords for a privileged user. IBM X-Force ID: 266874. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-1393: Security Weakness ### Affected Products **IBM - Storage Virtualize** Affected versions: - 8.3 (Status: affected) ### References 1. [](https://https://www.ibm.com/support/pages/node/7064976) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/266874)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13196, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13196 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13196 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 00:00 UTC - **Last Updated**: January 09, 2025 at 16:16 UTC - **Reserved Date**: January 08, 2025 at 14:30 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in donglight bookstore电商书城系统说明 1.0.0. It has been declared as problematic. This vulnerability affects the function BookSearchList of the file src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. The manipulation of the argument keywords leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **donglight - bookstore电商书城系统说明** Affected versions: - 1.0.0 (Status: affected) ### References 1. [VDB-290788 | donglight bookstore电商书城系统说明 BookInfoController.java BookSearchList cross site scripting](https://vuldb.com/?id.290788) 2. [VDB-290788 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.290788) 3. [Submit #469771 | donglight bookstore 1.0 reflect XSS](https://vuldb.com/?submit.469771) 4. [](https://github.com/donglight/bookstore/issues/12) 5. [](https://github.com/donglight/bookstore/issues/12#issue-2760934170) ### Credits - LVZC2 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9589 - **State**: PUBLISHED - **Published Date**: March 12, 2018 at 15:00 UTC - **Last Updated**: August 06, 2024 at 02:59 UTC - **Reserved Date**: November 23, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection. ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Red Hat, Inc. - wildfly** Affected versions: - 11.0.0.Beta1 (Status: affected) ### References 1. [RHSA-2017:0831](http://rhn.redhat.com/errata/RHSA-2017-0831.html) 2. [RHSA-2017:0876](http://rhn.redhat.com/errata/RHSA-2017-0876.html) 3. [RHSA-2017:0834](http://rhn.redhat.com/errata/RHSA-2017-0834.html) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1404782) 5. [RHSA-2017:3458](https://access.redhat.com/errata/RHSA-2017:3458) 6. [RHSA-2017:0832](http://rhn.redhat.com/errata/RHSA-2017-0832.html) 7. [97060](http://www.securityfocus.com/bid/97060) 8. [RHSA-2017:3455](https://access.redhat.com/errata/RHSA-2017:3455) 9. [RHSA-2017:3456](https://access.redhat.com/errata/RHSA-2017:3456) 10. [RHSA-2017:0873](https://access.redhat.com/errata/RHSA-2017:0873) 11. [RHSA-2017:3454](https://access.redhat.com/errata/RHSA-2017:3454) 12. [RHSA-2017:0830](http://rhn.redhat.com/errata/RHSA-2017-0830.html) 13. [RHSA-2017:0872](https://access.redhat.com/errata/RHSA-2017:0872)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6629 - **State**: PUBLISHED - **Published Date**: December 08, 2015 at 23:00 UTC - **Last Updated**: August 06, 2024 at 07:29 UTC - **Reserved Date**: August 21, 2015 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Wi-Fi in Android 5.x before 5.1.1 LMY48Z allows attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22667667. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://source.android.com/security/bulletin/2015-12-01.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3749, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3749 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3749 - **State**: PUBLISHED - **Published Date**: May 20, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:50 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in Construtiva CIS Manager allows remote attackers to execute arbitrary SQL commands via the email parameter to autenticar/lembrarlogin.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [67442](http://www.securityfocus.com/bid/67442) 2. [20140519 Construtiva CIS Manager CMS POST SQLi](http://www.securityfocus.com/archive/1/532155/100/0/threaded) 3. [20140516 [CVE-2014-3749] Construtiva CIS Manager CMS POST SQLi](http://seclists.org/fulldisclosure/2014/May/73)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16241, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16241 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16241 - **State**: PUBLISHED - **Published Date**: December 10, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 20:20 UTC - **Reserved Date**: October 31, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Incorrect access control in AMAG Symmetry Door Edge Network Controllers (EN-1DBC Boot App 23611 03.60 and STD App 23603 03.60; EN-2DBC Boot App 24451 01.00 and STD App 2461 01.00) enables remote attackers to execute door controller commands (e.g., lock, unlock, add ID card value) by sending unauthenticated requests to the affected devices via Serial over TCP/IP, as demonstrated by a Ud command. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hushcon.com/schedule.html) 2. [](https://www.secureworks.com/research/advisory-2017-001) 3. [](https://github.com/lixmk/Concierge)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2193, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2193 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2193 - **State**: PUBLISHED - **Published Date**: April 20, 2023 at 08:17 UTC - **Last Updated**: December 06, 2024 at 23:04 UTC - **Reserved Date**: April 20, 2023 at 08:16 UTC - **Assigned By**: Mattermost ### Vulnerability Description Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **Mattermost - Mattermost** Affected versions: - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 0 (Status: affected) - 7.10 (Status: unaffected) - 7.9.3 (Status: unaffected) - 7.8.4 (Status: unaffected) - 7.7.5 (Status: unaffected) - 7.1.9 (Status: unaffected) ### References 1. [](https://mattermost.com/security-updates/) ### Credits - whitehattushu
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27202 - **State**: PUBLISHED - **Published Date**: March 15, 2022 at 16:45 UTC - **Last Updated**: August 03, 2024 at 05:25 UTC - **Reserved Date**: March 15, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. ### Affected Products **Jenkins project - Jenkins Extended Choice Parameter Plugin** Affected versions: - unspecified (Status: affected) - next of 346.vd87693c5a_86c (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2232) 2. [[oss-security] 20220315 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/15/2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35565, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35565 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35565 - **State**: PUBLISHED - **Published Date**: October 20, 2021 at 10:50 UTC - **Last Updated**: September 25, 2024 at 19:35 UTC - **Reserved Date**: June 28, 2021 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Affected Products **Oracle Corporation - Java SE JDK and JRE** Affected versions: - Java SE:7u311 (Status: affected) - Java SE:8u301 (Status: affected) - Java SE:11.0.12 (Status: affected) - Oracle GraalVM Enterprise Edition:20.3.3 (Status: affected) - Oracle GraalVM Enterprise Edition:21.2.0 (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) 2. [](https://security.netapp.com/advisory/ntap-20211022-0004/) 3. [FEDORA-2021-35145352b0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/) 4. [FEDORA-2021-7701833090](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/) 5. [FEDORA-2021-9a51a6f8b1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/) 6. [FEDORA-2021-1cc8ffd122](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/) 7. [FEDORA-2021-eb3e3e87d3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/) 8. [FEDORA-2021-107c8c5063](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/) 9. [DSA-5000](https://www.debian.org/security/2021/dsa-5000) 10. [[debian-lts-announce] 20211109 [SECURITY] [DLA 2814-1] openjdk-8 security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html) 11. [GLSA-202209-05](https://security.gentoo.org/glsa/202209-05) 12. [](https://security.netapp.com/advisory/ntap-20240621-0006/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11584, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11584 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11584 - **State**: PUBLISHED - **Published Date**: July 24, 2017 at 00:00 UTC - **Last Updated**: August 05, 2024 at 18:12 UTC - **Reserved Date**: July 23, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description dayrui FineCms 5.0.9 has SQL Injection via the field parameter in an action=module, action=member, action=form, or action=related request to libraries/Template.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-via-system-field-parameter)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37558, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37558 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37558 - **State**: PUBLISHED - **Published Date**: August 03, 2021 at 15:37 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 26, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/centreon/centreon/pull/9796) 2. [](https://www.synacktiv.com/sites/default/files/2021-07/Centreon_Multiple_vulnerabilities_0.pdf)