System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54238, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54238 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54238 - **State**: PUBLISHED - **Published Date**: December 13, 2024 at 14:24 UTC - **Last Updated**: December 13, 2024 at 18:59 UTC - **Reserved Date**: December 02, 2024 at 12:03 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Colin Tomele Board Document Manager from CHUHPL allows Reflected XSS.This issue affects Board Document Manager from CHUHPL: from n/a through 1.9.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Colin Tomele - Board Document Manager from CHUHPL** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/board-document-manager-from-chuhpl/vulnerability/wordpress-board-document-manager-from-chuhpl-plugin-1-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Le Ngoc Anh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-16518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-16518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-16518 - **State**: PUBLISHED - **Published Date**: September 23, 2019 at 14:07 UTC - **Last Updated**: August 05, 2024 at 01:17 UTC - **Reserved Date**: September 19, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Swell Kit Mod devices that use the Vandy Vape platform. An attacker may be able to trigger an unintended temperature in the victim's mouth and throat via Bluetooth Low Energy (BLE) packets that specify large power or voltage values. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitlab.com/crypt0crc/cve-2019-16518)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-0091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-0091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-0091 - **State**: PUBLISHED - **Published Date**: January 18, 2018 at 06:00 UTC - **Last Updated**: December 02, 2024 at 21:45 UTC - **Reserved Date**: November 27, 2017 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a Document Object Model (DOM) cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf73922. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **n/a - Cisco Identity Services Engine** Affected versions: - Cisco Identity Services Engine (Status: affected) ### References 1. [102756](http://www.securityfocus.com/bid/102756) 2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ise) 3. [1040241](http://www.securitytracker.com/id/1040241)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-35848, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-35848 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-35848 - **State**: PUBLISHED - **Published Date**: June 19, 2023 at 00:00 UTC - **Last Updated**: December 11, 2024 at 17:07 UTC - **Reserved Date**: June 19, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/virtualsquare/picotcp/pull/15/files)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5480, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5480 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5480 - **State**: PUBLISHED - **Published Date**: June 06, 2025 at 18:49 UTC - **Last Updated**: June 09, 2025 at 16:48 UTC - **Reserved Date**: June 02, 2025 at 19:15 UTC - **Assigned By**: zdi ### Vulnerability Description Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767. ### Weakness Classification (CWE) - CWE-427: Security Weakness ### Affected Products **Action1 - Action1** Affected versions: - 5.216.617.1 (Status: affected) ### References 1. [ZDI-25-323](https://www.zerodayinitiative.com/advisories/ZDI-25-323/) 2. [vendor-provided URL](https://www.action1.com/blog/acknowledging-zdi-can-26767-high-severity-vulnerability-in-action1-agent/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-4657, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-4657 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-4657 - **State**: PUBLISHED - **Published Date**: September 04, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:01 UTC - **Reserved Date**: September 04, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read. NOTE: this affects different product versions than CVE-2007-3996. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [30288](http://secunia.com/advisories/30288) 2. [php-strcspn-overflow(36388)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36388) 3. [26822](http://secunia.com/advisories/26822) 4. [](https://launchpad.net/bugs/173043) 5. [ADV-2008-0059](http://www.vupen.com/english/advisories/2008/0059) 6. [DSA-1444](http://www.debian.org/security/2008/dsa-1444) 7. [GLSA-200710-02](http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml) 8. [27864](http://secunia.com/advisories/27864) 9. [](http://www.php.net/releases/4_4_8.php) 10. [SSA:2008-045-03](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136) 11. [](http://www.php.net/ChangeLog-5.php#5.2.4) 12. [28936](http://secunia.com/advisories/28936) 13. [2007-0026](http://www.trustix.org/errata/2007/0026/) 14. [USN-549-1](https://usn.ubuntu.com/549-1/) 15. [](https://issues.rpath.com/browse/RPL-1693) 16. [](http://secweb.se/en/advisories/php-strcspn-information-leak-vulnerability/) 17. [28249](http://secunia.com/advisories/28249) 18. [DSA-1578](http://www.debian.org/security/2008/dsa-1578) 19. [](https://issues.rpath.com/browse/RPL-1702) 20. [26838](http://secunia.com/advisories/26838) 21. [27377](http://secunia.com/advisories/27377) 22. [](http://www.php.net/ChangeLog-4.php) 23. [27102](http://secunia.com/advisories/27102) 24. [ADV-2007-3023](http://www.vupen.com/english/advisories/2007/3023) 25. [](http://www.php.net/releases/5_2_4.php) 26. [php-strcspn-strspn-unspecified(39399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39399) 27. [28318](http://secunia.com/advisories/28318) 28. [USN-549-2](http://www.ubuntu.com/usn/usn-549-2) 29. [26642](http://secunia.com/advisories/26642)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0609 - **State**: PUBLISHED - **Published Date**: April 08, 2019 at 22:31 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. ### Affected Products **Microsoft - Internet Explorer 11** Affected versions: - Windows 7 for 32-bit Systems Service Pack 1 (Status: affected) - Windows 7 for x64-based Systems Service Pack 1 (Status: affected) - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected) - Windows 8.1 for 32-bit systems (Status: affected) - Windows 8.1 for x64-based systems (Status: affected) - Windows Server 2012 R2 (Status: affected) **Microsoft - Microsoft Edge** Affected versions: - Windows RT 8.1 (Status: affected) - Windows 10 for 32-bit Systems (Status: affected) - Windows 10 for x64-based Systems (Status: affected) - Windows Server 2016 (Status: affected) - Windows 10 Version 1607 for 32-bit Systems (Status: affected) - Windows 10 Version 1607 for x64-based Systems (Status: affected) - Windows 10 Version 1703 for 32-bit Systems (Status: affected) - Windows 10 Version 1703 for x64-based Systems (Status: affected) - Windows 10 Version 1709 for 32-bit Systems (Status: affected) - Windows 10 Version 1709 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for 32-bit Systems (Status: affected) - Windows 10 Version 1803 for x64-based Systems (Status: affected) - Windows 10 Version 1803 for ARM64-based Systems (Status: affected) - Windows 10 Version 1809 for 32-bit Systems (Status: affected) - Windows 10 Version 1809 for x64-based Systems (Status: affected) - Windows 10 Version 1809 for ARM64-based Systems (Status: affected) **Microsoft - ChakraCore** Affected versions: - Windows Server 2019 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18883, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18883 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18883 - **State**: PUBLISHED - **Published Date**: June 19, 2020 at 18:08 UTC - **Last Updated**: August 05, 2024 at 21:37 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2, when serving as an OAuth 2.0 Service Provider. There is low entropy for authorization data. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://mattermost.com/security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-1737, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-1737 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-1737 - **State**: PUBLISHED - **Published Date**: April 14, 2006 at 18:00 UTC - **Last Updated**: August 07, 2024 at 17:19 UTC - **Reserved Date**: April 12, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-275-1](https://usn.ubuntu.com/275-1/) 2. [mozilla-javascript-regexpr-memory-corruption(25808)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25808) 3. [RHSA-2006:0330](http://www.redhat.com/support/errata/RHSA-2006-0330.html) 4. [SSRT061145](http://www.securityfocus.com/archive/1/434524/100/0/threaded) 5. [19902](http://secunia.com/advisories/19902) 6. [20060404-01-U](ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc) 7. [USN-276-1](https://usn.ubuntu.com/276-1/) 8. [HPSBUX02122](http://www.securityfocus.com/archive/1/438730/100/0/threaded) 9. [19941](http://secunia.com/advisories/19941) 10. [19780](http://secunia.com/advisories/19780) 11. [RHSA-2006:0328](http://www.redhat.com/support/errata/RHSA-2006-0328.html) 12. [19821](http://secunia.com/advisories/19821) 13. [GLSA-200604-12](http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml) 14. [21622](http://secunia.com/advisories/21622) 15. [19862](http://secunia.com/advisories/19862) 16. [MDKSA-2006:075](http://www.mandriva.com/security/advisories?name=MDKSA-2006:075) 17. [](http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm) 18. [19823](http://secunia.com/advisories/19823) 19. [DSA-1051](http://www.debian.org/security/2006/dsa-1051) 20. [FEDORA-2006-410](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html) 21. [USN-271-1](https://usn.ubuntu.com/271-1/) 22. [19714](http://secunia.com/advisories/19714) 23. [RHSA-2006:0329](http://www.redhat.com/support/errata/RHSA-2006-0329.html) 24. [](http://www.mozilla.org/security/announce/2006/mfsa2006-11.html) 25. [GLSA-200604-18](http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml) 26. [19811](http://secunia.com/advisories/19811) 27. [HPSBTU02118](http://www.securityfocus.com/archive/1/434524/100/0/threaded) 28. [19794](http://secunia.com/advisories/19794) 29. [19746](http://secunia.com/advisories/19746) 30. [21033](http://secunia.com/advisories/21033) 31. [102550](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1) 32. [19696](http://secunia.com/advisories/19696) 33. [19759](http://secunia.com/advisories/19759) 34. [SUSE-SA:2006:021](http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html) 35. [FLSA:189137-2](http://www.securityfocus.com/archive/1/436338/100/0/threaded) 36. [ADV-2006-1356](http://www.vupen.com/english/advisories/2006/1356) 37. [SSRT061158](http://www.securityfocus.com/archive/1/438730/100/0/threaded) 38. [oval:org.mitre.oval:def:10817](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10817) 39. [MDKSA-2006:078](http://www.mandriva.com/security/advisories?name=MDKSA-2006:078) 40. [19729](http://secunia.com/advisories/19729) 41. [20051](http://secunia.com/advisories/20051) 42. [19863](http://secunia.com/advisories/19863) 43. [SCOSA-2006.26](ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt) 44. [TA06-107A](http://www.us-cert.gov/cas/techalerts/TA06-107A.html) 45. [FLSA:189137-1](http://www.securityfocus.com/archive/1/436296/100/0/threaded) 46. [17516](http://www.securityfocus.com/bid/17516) 47. [VU#329500](http://www.kb.cert.org/vuls/id/329500) 48. [228526](http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1) 49. [FEDORA-2006-411](http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html) 50. [19852](http://secunia.com/advisories/19852) 51. [19721](http://secunia.com/advisories/19721) 52. [SUSE-SA:2006:022](http://www.novell.com/linux/security/advisories/2006_04_25.html) 53. [GLSA-200605-09](http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml) 54. [19631](http://secunia.com/advisories/19631) 55. [oval:org.mitre.oval:def:1829](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1829) 56. [19950](http://secunia.com/advisories/19950) 57. [MDKSA-2006:076](http://www.mandriva.com/security/advisories?name=MDKSA-2006:076) 58. [DSA-1046](http://www.debian.org/security/2006/dsa-1046) 59. [DSA-1044](http://www.debian.org/security/2006/dsa-1044)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5218, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5218 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5218 - **State**: PUBLISHED - **Published Date**: May 25, 2024 at 03:30 UTC - **Last Updated**: August 01, 2024 at 21:03 UTC - **Reserved Date**: May 22, 2024 at 18:56 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Reviews and Rating – Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file upload feature in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **designextreme - Reviews and Rating – Google Reviews** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/71408e0b-aed8-4077-add2-7f3b249e85f5?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/g-business-reviews-rating/tags/5.1/index.php#L804) 3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3092202%40g-business-reviews-rating%2Ftrunk&old=3076444%40g-business-reviews-rating%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - wesley
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-18954, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-18954 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-18954 - **State**: PUBLISHED - **Published Date**: November 15, 2018 at 20:00 UTC - **Last Updated**: August 05, 2024 at 11:23 UTC - **Reserved Date**: November 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3826-1](https://usn.ubuntu.com/3826-1/) 2. [[oss-security] 20181107 CVE-2018-18954 QEMU: ppc64: Out-of-bounds r/w stack access in pnv_lpc_do_eccb](http://www.openwall.com/lists/oss-security/2018/11/06/6) 3. [105920](http://www.securityfocus.com/bid/105920) 4. [[Qemu-devel] 20181103 [PATCH v2] ppc/pnv: check size before data buffer access](https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00446.html) 5. [openSUSE-SU-2019:1074](http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html) 6. [DSA-4454](https://www.debian.org/security/2019/dsa-4454) 7. [20190531 [SECURITY] [DSA 4454-1] qemu security update](https://seclists.org/bugtraq/2019/May/76)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21338, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21338 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21338 - **State**: PUBLISHED - **Published Date**: February 13, 2024 at 18:02 UTC - **Last Updated**: May 03, 2025 at 01:37 UTC - **Reserved Date**: December 08, 2023 at 22:45 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Kernel Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-822: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) ### References 1. [Windows Kernel Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29363 - **State**: PUBLISHED - **Published Date**: September 28, 2021 at 15:27 UTC - **Last Updated**: August 03, 2024 at 22:02 UTC - **Reserved Date**: March 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74 ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/moshekaplan/Research/tree/main/IrfanView)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8239 - **State**: PUBLISHED - **Published Date**: November 14, 2019 at 15:09 UTC - **Last Updated**: August 04, 2024 at 21:17 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Bridge CC versions 9.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to information disclosure. ### Affected Products **Adobe - Adobe Bridge CC** Affected versions: - 9.1 and earlier versions (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/bridge/apsb19-53.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-1899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-1899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-1899 - **State**: PUBLISHED - **Published Date**: June 12, 2023 at 19:13 UTC - **Last Updated**: January 06, 2025 at 16:51 UTC - **Reserved Date**: April 05, 2023 at 20:13 UTC - **Assigned By**: icscert ### Vulnerability Description Atlas Copco Power Focus 6000 web server is not a secure connection by default, which could allow an attacker to gain sensitive information by monitoring network traffic between user and controller. ### CVSS Metrics - **CVSS Base Score**: 9.4/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H` ### Affected Products **Atlas Copco - Power Focus** Affected versions: - 6000 (Status: affected) ### References 1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-22374, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-22374 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-22374 - **State**: PUBLISHED - **Published Date**: February 01, 2023 at 17:54 UTC - **Last Updated**: March 26, 2025 at 17:51 UTC - **Reserved Date**: January 13, 2023 at 06:43 UTC - **Assigned By**: f5 ### Vulnerability Description A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-134: Security Weakness ### Affected Products **F5 - BIG-IP** Affected versions: - 17.0.0 (Status: affected) - 16.1.2.2 (Status: affected) - 15.1.5.1 (Status: affected) - 14.1.4.6 (Status: affected) - 13.1.5 (Status: affected) ### References 1. [](https://my.f5.com/manage/s/article/K000130415) ### Credits - F5 acknowledges Ron Bowes of Rapid7 for bringing this issue to our attention and following the highest standards of coordinated disclosure.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43904, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43904 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43904 - **State**: PUBLISHED - **Published Date**: August 26, 2024 at 10:11 UTC - **Last Updated**: May 04, 2025 at 09:28 UTC - **Reserved Date**: August 17, 2024 at 09:11 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing This commit adds null checks for the 'stream' and 'plane' variables in the dcn30_apply_idle_power_optimizations function. These variables were previously assumed to be null at line 922, but they were used later in the code without checking if they were null. This could potentially lead to a null pointer dereference, which would cause a crash. The null checks ensure that 'stream' and 'plane' are not null before they are used, preventing potential crashes. Fixes the below static smatch checker: drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922) drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922) ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.15.181 (Status: unaffected) - 6.1.116 (Status: unaffected) - 6.6.60 (Status: unaffected) - 6.10.5 (Status: unaffected) - 6.11 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/fcf9d6a9f30ea414b6b84a6e901cebd44e146847) 2. [](https://git.kernel.org/stable/c/5e84eda48ffb2363437db44bbd0235594f8a58f9) 3. [](https://git.kernel.org/stable/c/10c20d79d59cadfe572480d98cec271a89ffb024) 4. [](https://git.kernel.org/stable/c/16a8a2a839d19c4cf7253642b493ffb8eee1d857) 5. [](https://git.kernel.org/stable/c/15c2990e0f0108b9c3752d7072a97d45d4283aea)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7986, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7986 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7986 - **State**: PUBLISHED - **Published Date**: October 31, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 13:03 UTC - **Reserved Date**: October 08, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description install/index.php in EspoCRM before 2.6.0 allows remote attackers to re-install the application via a 1 value in the installProcess parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20141029 Multiple vulnerabilities in EspoCRM](http://www.securityfocus.com/archive/1/533844/100/0/threaded) 2. [](http://blog.espocrm.com/news/espocrm-2-6-0-released) 3. [](http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html) 4. [70811](http://www.securityfocus.com/bid/70811) 5. [](https://www.htbridge.com/advisory/HTB23238)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4497, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4497 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4497 - **State**: PUBLISHED - **Published Date**: January 07, 2011 at 18:00 UTC - **Last Updated**: August 07, 2024 at 03:51 UTC - **Reserved Date**: December 07, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45691](http://www.securityfocus.com/bid/45691) 2. [42791](http://secunia.com/advisories/42791) 3. [ADV-2011-0037](http://www.vupen.com/english/advisories/2011/0037) 4. [70372](http://osvdb.org/70372) 5. [1024942](http://www.securitytracker.com/id?1024942) 6. [](http://www.tibco.com/services/support/advisories/cim-advisory_20100105.jsp) 7. [](http://www.tibco.com/multimedia/cim_advisory_20110105_tcm8-12765.txt) 8. [tibco-unspecified-xss(64521)](https://exchange.xforce.ibmcloud.com/vulnerabilities/64521)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41939 - **State**: PUBLISHED - **Published Date**: August 13, 2024 at 07:54 UTC - **Last Updated**: August 13, 2024 at 14:21 UTC - **Reserved Date**: July 24, 2024 at 14:47 UTC - **Assigned By**: siemens ### Vulnerability Description A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly enforce authorization checks. This could allow an authenticated attacker to bypass the checks and elevate their privileges on the application. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-863: Incorrect Authorization ### Affected Products **Siemens - SINEC NMS** Affected versions: - 0 (Status: affected) ### References 1. [](https://cert-portal.siemens.com/productcert/html/ssa-784301.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1762, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1762 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1762 - **State**: PUBLISHED - **Published Date**: June 30, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:59 UTC - **Reserved Date**: May 31, 2005 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18056](http://secunia.com/advisories/18056) 2. [17073](http://secunia.com/advisories/17073) 3. [13904](http://www.securityfocus.com/bid/13904) 4. [18059](http://secunia.com/advisories/18059) 5. [oval:org.mitre.oval:def:10630](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10630) 6. [FLSA:157459-2](http://www.securityfocus.com/archive/1/428058/100/0/threaded) 7. [SUSE-SA:2005:029](http://www.novell.com/linux/security/advisories/2005_29_kernel.html) 8. [DSA-922](http://www.debian.org/security/2005/dsa-922) 9. [15786](http://secunia.com/advisories/15786) 10. [DSA-921](http://www.debian.org/security/2005/dsa-921) 11. [RHSA-2005:514](http://www.redhat.com/support/errata/RHSA-2005-514.html) 12. [17002](http://secunia.com/advisories/17002) 13. [USN-143-1](https://usn.ubuntu.com/143-1/) 14. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded) 15. [RHSA-2005:663](http://www.redhat.com/support/errata/RHSA-2005-663.html) 16. [ADV-2005-1878](http://www.vupen.com/english/advisories/2005/1878)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23305 - **State**: PUBLISHED - **Published Date**: February 20, 2024 at 15:29 UTC - **Last Updated**: February 13, 2025 at 17:39 UTC - **Reserved Date**: January 22, 2024 at 16:39 UTC - **Assigned By**: talos ### Vulnerability Description An out-of-bounds write vulnerability exists in the BrainVisionMarker Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vmrk file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **The Biosig Project - libbiosig** Affected versions: - 2.5.0 (Status: affected) - Master Branch (ab0ee111) (Status: affected) ### References 1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-1918](https://talosintelligence.com/vulnerability_reports/TALOS-2024-1918) 2. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/) ### Credits - Discovered by Lilith &gt;_&gt; of Cisco Talos.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44109 - **State**: PUBLISHED - **Published Date**: December 19, 2022 at 00:00 UTC - **Last Updated**: April 17, 2025 at 14:53 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ldenoue/pdftojson) 2. [](https://github.com/ldenoue/pdftojson/issues/4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-9534, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-9534 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-9534 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:11 UTC - **Reserved Date**: June 11, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!GetPlugInInfo+0x0000000000017426." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9534) 2. [](http://www.irfanview.com/plugins.htm)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6694, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6694 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6694 - **State**: PUBLISHED - **Published Date**: September 24, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 12:24 UTC - **Reserved Date**: September 19, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The 5SOS Family Planet (aka uk.co.pixelkicks.fivesos) application 2.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#708073](http://www.kb.cert.org/vuls/id/708073) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-27427, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-27427 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-27427 - **State**: REJECTED - **Published Date**: April 15, 2022 at 19:21 UTC - **Last Updated**: June 13, 2022 at 16:43 UTC - **Reserved Date**: March 21, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21393, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21393 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21393 - **State**: PUBLISHED - **Published Date**: January 14, 2025 at 18:04 UTC - **Last Updated**: April 02, 2025 at 13:23 UTC - **Reserved Date**: December 11, 2024 at 00:29 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft SharePoint Server Spoofing Vulnerability ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Microsoft - Microsoft SharePoint Enterprise Server 2016** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Server 2019** Affected versions: - 16.0.0 (Status: affected) **Microsoft - Microsoft SharePoint Server Subscription Edition** Affected versions: - 16.0.0 (Status: affected) ### References 1. [Microsoft SharePoint Server Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21393)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-16464, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-16464 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-16464 - **State**: REJECTED - **Published Date**: March 05, 2019 at 20:00 UTC - **Last Updated**: March 05, 2019 at 19:57 UTC - **Reserved Date**: November 01, 2017 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-43667, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-43667 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-43667 - **State**: PUBLISHED - **Published Date**: October 16, 2023 at 08:08 UTC - **Last Updated**: September 27, 2024 at 11:45 UTC - **Reserved Date**: September 21, 2023 at 03:37 UTC - **Assigned By**: apache ### Vulnerability Description Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can create misleading or false log records, making it harder to audit and trace malicious activities. Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/8628 ### Weakness Classification (CWE) - CWE-74: Security Weakness ### Affected Products **Apache Software Foundation - Apache InLong** Affected versions: - 1.4.0 (Status: affected) ### References 1. [](https://lists.apache.org/thread/spnb378g268p1f902fr9kqyph2k8n543) ### Credits - Jayway
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-0870, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-0870 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-0870 - **State**: PUBLISHED - **Published Date**: March 26, 2005 at 05:00 UTC - **Last Updated**: August 07, 2024 at 21:28 UTC - **Reserved Date**: March 26, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in phpSysInfo 2.3, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) sensor_program parameter to index.php, (2) text[language], (3) text[template], or (4) hide_picklist parameter to system_footer.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [17616](http://secunia.com/advisories/17616) 2. [MDKSA-2005:212](http://www.mandriva.com/security/advisories?name=MDKSA-2005:212) 3. [15414](http://www.securityfocus.com/bid/15414) 4. [14690](http://secunia.com/advisories/14690/) 5. [DSA-898](http://www.debian.org/security/2005/dsa-898) 6. [20050323 [SECURITYREASON.COM] phpSysInfo 2.3 Multiple vulnerabilities](http://marc.info/?l=bugtraq&m=111161017209422&w=2) 7. [phpsysinfo-sensor-program-xss(19807)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19807) 8. [20051115 Advisory 22/2005: Multiple vulnerabilities in phpSysInfo](http://www.securityfocus.com/archive/1/416543) 9. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=301118) 10. [12887](http://www.securityfocus.com/bid/12887) 11. [DSA-897](http://www.debian.org/security/2005/dsa-897) 12. [DSA-724](http://www.debian.org/security/2005/dsa-724) 13. [DSA-899](http://www.debian.org/security/2005/dsa-899) 14. [17643](http://secunia.com/advisories/17643)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14459, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14459 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14459 - **State**: PUBLISHED - **Published Date**: April 11, 2018 at 16:00 UTC - **Last Updated**: September 16, 2024 at 23:55 UTC - **Reserved Date**: September 13, 2017 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution. ### Affected Products **Talos - Moxa** Affected versions: - Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client versions 1.4 - 1.9. In addition, versions prior to 1.4 appear similarly vulnerable to injection, but not as easily exploitable (described below). Other models in the AWK product line may likewise be vulnerable but have not been tested. (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5073 - **State**: PUBLISHED - **Published Date**: October 31, 2023 at 11:29 UTC - **Last Updated**: February 05, 2025 at 18:52 UTC - **Reserved Date**: September 19, 2023 at 18:53 UTC - **Assigned By**: Wordfence ### Vulnerability Description The iframe forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'iframe' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **jrbecart - iframe forms** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/818de7f7-913a-4ade-927e-bba281b4709a?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/iframe-forms/trunk/iframe-forms.php#L29) ### Credits - Lana Codes - Alex Thomas
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-0276, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-0276 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-0276 - **State**: PUBLISHED - **Published Date**: September 29, 1999 at 04:00 UTC - **Last Updated**: August 01, 2024 at 16:34 UTC - **Reserved Date**: June 07, 1999 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mSQL v2.0.1 and below allows remote execution through a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0276)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4031 - **State**: PUBLISHED - **Published Date**: May 29, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 06:04 UTC - **Reserved Date**: May 19, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in saveFile.jsp in the development installation in Visual Mining NetChart allows remote attackers to write to arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-237/) 2. [74792](http://www.securityfocus.com/bid/74792)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0113, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0113 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0113 - **State**: PUBLISHED - **Published Date**: February 11, 2022 at 23:36 UTC - **Last Updated**: August 02, 2024 at 23:18 UTC - **Reserved Date**: January 04, 2022 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html) 2. [](https://crbug.com/1039885) 3. [FEDORA-2022-d1a15f9cdb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/) 4. [FEDORA-2022-49b52819a4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/) 5. [FEDORA-2022-57923346cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-32485, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-32485 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-32485 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 15:10 UTC - **Last Updated**: August 03, 2024 at 23:17 UTC - **Reserved Date**: May 10, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964926. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://corp.mediatek.com/product-security-bulletin/September-2021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-19646, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-19646 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-19646 - **State**: PUBLISHED - **Published Date**: November 28, 2018 at 17:00 UTC - **Last Updated**: September 17, 2024 at 02:42 UTC - **Reserved Date**: November 28, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Python CGI scripts in PWS in Imperva SecureSphere 13.0.10, 13.1.10, and 13.2.10 allow remote attackers to execute arbitrary OS commands because command-line arguments are mishandled. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [45542](https://www.exploit-db.com/exploits/45542)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42616, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42616 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42616 - **State**: PUBLISHED - **Published Date**: August 20, 2024 at 00:00 UTC - **Last Updated**: March 26, 2025 at 14:32 UTC - **Reserved Date**: August 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_widgets.php?action=remove&widget=Statistics ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/jinwu1234567890/cms2/tree/main/13/readme.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39492, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39492 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39492 - **State**: PUBLISHED - **Published Date**: May 03, 2024 at 02:10 UTC - **Last Updated**: August 02, 2024 at 18:10 UTC - **Reserved Date**: August 02, 2023 at 21:37 UTC - **Assigned By**: zdi ### Vulnerability Description PDF-XChange Editor PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19640. ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **PDF-XChange - PDF-XChange Editor** Affected versions: - 9.5.366.0 (Status: affected) ### References 1. [ZDI-23-1133](https://www.zerodayinitiative.com/advisories/ZDI-23-1133/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3496, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3496 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3496 - **State**: PUBLISHED - **Published Date**: June 20, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:43 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [59298](http://secunia.com/advisories/59298) 2. [](https://github.com/openshift/origin-server/pull/5521) 3. [RHSA-2014:0764](http://rhn.redhat.com/errata/RHSA-2014-0764.html) 4. [RHSA-2014:0762](http://rhn.redhat.com/errata/RHSA-2014-0762.html) 5. [RHSA-2014:0763](http://rhn.redhat.com/errata/RHSA-2014-0763.html) 6. [](https://bugzilla.redhat.com/show_bug.cgi?id=1110470)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24191, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24191 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24191 - **State**: PUBLISHED - **Published Date**: March 31, 2025 at 22:22 UTC - **Last Updated**: April 03, 2025 at 13:17 UTC - **Reserved Date**: January 17, 2025 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.4. An app may be able to modify protected parts of the file system. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122373)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22625 - **State**: PUBLISHED - **Published Date**: March 18, 2022 at 17:59 UTC - **Last Updated**: August 03, 2024 at 03:21 UTC - **Reserved Date**: January 05, 2022 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT213183) 2. [](https://support.apple.com/en-us/HT213184) 3. [](https://support.apple.com/en-us/HT213185)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38119 - **State**: PUBLISHED - **Published Date**: September 10, 2024 at 16:54 UTC - **Last Updated**: December 31, 2024 at 23:03 UTC - **Reserved Date**: June 11, 2024 at 22:36 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Network Address Translation (NAT) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 11 version 22H3** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows 11 Version 23H2** Affected versions: - 10.0.22631.0 (Status: affected) **Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)** Affected versions: - 10.0.25398.0 (Status: affected) **Microsoft - Windows 11 Version 24H2** Affected versions: - 10.0.26100.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) ### References 1. [Windows Network Address Translation (NAT) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-9656, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-9656 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-9656 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: November 29, 2016 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45429, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45429 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45429 - **State**: PUBLISHED - **Published Date**: September 04, 2024 at 23:07 UTC - **Last Updated**: March 25, 2025 at 15:47 UTC - **Reserved Date**: August 29, 2024 at 00:56 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site scripting vulnerability exists in Advanced Custom Fields versions 6.3.5 and earlier and Advanced Custom Fields Pro versions 6.3.5 and earlier. If an attacker with the 'capability' setting privilege which is set in the product settings stores an arbitrary script in the field label, the script may be executed on the web browser of the logged-in user with the same privilege as the attacker's. ### Affected Products **WP Engine - Advanced Custom Fields** Affected versions: - 6.3.5 and earlier (Status: affected) **WP Engine - Advanced Custom Fields Pro** Affected versions: - 6.3.5 and earlier (Status: affected) ### References 1. [](https://www.advancedcustomfields.com/blog/acf-6-3-6/) 2. [](https://wordpress.org/plugins/advanced-custom-fields/) 3. [](https://www.advancedcustomfields.com/) 4. [](https://jvn.jp/en/jp/JVN67963942/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-0987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-0987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-0987 - **State**: PUBLISHED - **Published Date**: May 13, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 01:06 UTC - **Reserved Date**: March 18, 2010 at 00:00 UTC - **Assigned By**: flexera ### Vulnerability Description Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38751](http://secunia.com/advisories/38751) 2. [](http://www.adobe.com/support/security/bulletins/apsb10-12.html) 3. [](http://secunia.com/secunia_research/2010-50/) 4. [ADV-2010-1128](http://www.vupen.com/english/advisories/2010/1128) 5. [20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow](http://www.securityfocus.com/archive/1/511265/100/0/threaded) 6. [40093](http://www.securityfocus.com/bid/40093) 7. [oval:org.mitre.oval:def:7052](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8614 - **State**: PUBLISHED - **Published Date**: February 13, 2020 at 15:23 UTC - **Last Updated**: August 04, 2024 at 10:03 UTC - **Reserved Date**: February 04, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://improsec.com/tech-blog/RCE-Askey)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13249, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13249 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13249 - **State**: PUBLISHED - **Published Date**: January 09, 2025 at 18:55 UTC - **Last Updated**: January 10, 2025 at 21:24 UTC - **Reserved Date**: January 09, 2025 at 18:27 UTC - **Assigned By**: drupal ### Vulnerability Description Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 7.X-1.0 before 7.X-1.2. ### Weakness Classification (CWE) - CWE-282: Security Weakness ### Affected Products **Drupal - Node Access Rebuild Progressive** Affected versions: - 7.x-1.0 (Status: affected) ### References 1. [](https://www.drupal.org/sa-contrib-2024-013) ### Credits - Jen Lampton - Shelane French - Juraj Nemec - Jen Lampton - Greg Knaddison - Juraj Nemec
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-13666, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-13666 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-13666 - **State**: PUBLISHED - **Published Date**: August 24, 2017 at 06:00 UTC - **Last Updated**: September 17, 2024 at 00:20 UTC - **Reserved Date**: August 24, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An integer underflow vulnerability exists in pixel-a.asm, the x86 assembly code for planeClipAndMax() in MulticoreWare x265 through 2.5, as used in libbpg and other products. A small height value can cause an integer underflow, which leads to a crash. This is a different vulnerability than CVE-2017-8906. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bitbucket.org/multicoreware/x265/issues/364/integer-overflow-and-affect-top-level)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21669, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21669 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21669 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 11:25 UTC - **Last Updated**: May 04, 2025 at 07:18 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes If the socket has been de-assigned or assigned to another transport, we must discard any packets received because they are not expected and would cause issues when we access vsk->transport. A possible scenario is described by Hyunwoo Kim in the attached link, where after a first connect() interrupted by a signal, and a second connect() failed, we can find `vsk->transport` at NULL, leading to a NULL pointer dereference. ### Affected Products **Linux - Linux** Affected versions: - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) - c0cfa2d8a788fcf45df5bf4070ab2474c88d543a (Status: affected) **Linux - Linux** Affected versions: - 5.5 (Status: affected) - 0 (Status: unaffected) - 5.10.234 (Status: unaffected) - 5.15.177 (Status: unaffected) - 6.1.127 (Status: unaffected) - 6.6.74 (Status: unaffected) - 6.12.11 (Status: unaffected) - 6.13 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/18a7fc371d1dbf8deff16c2dd9292bcc73f43040) 2. [](https://git.kernel.org/stable/c/6486915fa661584d70e8e7e4068c6c075c67dd6d) 3. [](https://git.kernel.org/stable/c/88244163bc7e7b0ce9dd7bf4c8a563b41525c3ee) 4. [](https://git.kernel.org/stable/c/d88b249e14bd0ee1e46bbe4f456e22e01b8c68de) 5. [](https://git.kernel.org/stable/c/677579b641af109613564460a4e3bdcb16850b61) 6. [](https://git.kernel.org/stable/c/2cb7c756f605ec02ffe562fb26828e4bcc5fdfc1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37687, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37687 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37687 - **State**: PUBLISHED - **Published Date**: August 12, 2021 at 22:15 UTC - **Last Updated**: August 04, 2024 at 01:23 UTC - **Reserved Date**: July 29, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). We have patched the issue in GitHub commits bb6a0383ed553c286f87ca88c207f6774d5c4a8f and eb921122119a6b6e470ee98b89e65d721663179d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 5.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-125: Out-of-bounds Read ### Affected Products **tensorflow - tensorflow** Affected versions: - >= 2.5.0, < 2.5.1 (Status: affected) - >= 2.4.0, < 2.4.3 (Status: affected) - < 2.3.4 (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437) 2. [](https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f) 3. [](https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-1233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-1233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-1233 - **State**: PUBLISHED - **Published Date**: April 01, 2015 at 21:00 UTC - **Last Updated**: August 06, 2024 at 04:33 UTC - **Reserved Date**: January 21, 2015 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://code.google.com/p/chromium/issues/detail?id=469058) 2. [](http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html) 3. [openSUSE-SU-2015:1887](http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html) 4. [USN-2556-1](http://www.ubuntu.com/usn/USN-2556-1) 5. [GLSA-201506-04](https://security.gentoo.org/glsa/201506-04) 6. [openSUSE-SU-2015:0682](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00004.html) 7. [1032012](http://www.securitytracker.com/id/1032012) 8. [RHSA-2015:0778](http://rhn.redhat.com/errata/RHSA-2015-0778.html) 9. [73484](http://www.securityfocus.com/bid/73484)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-39168, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-39168 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-39168 - **State**: REJECTED - **Last Updated**: December 07, 2023 at 14:07 UTC - **Reserved Date**: July 25, 2023 at 14:06 UTC - **Assigned By**: CERTVDE ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-4353, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-4353 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-4353 - **State**: PUBLISHED - **Published Date**: September 18, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:12 UTC - **Reserved Date**: June 20, 2014 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [69951](http://www.securityfocus.com/bid/69951) 2. [](http://support.apple.com/kb/HT6441) 3. [1030866](http://www.securitytracker.com/id/1030866) 4. [appleios-cve20144353-info-disc(96095)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96095) 5. [69882](http://www.securityfocus.com/bid/69882) 6. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0271 - **State**: PUBLISHED - **Published Date**: February 21, 2023 at 08:50 UTC - **Last Updated**: March 14, 2025 at 18:15 UTC - **Reserved Date**: January 13, 2023 at 08:58 UTC - **Assigned By**: WPScan ### Vulnerability Description The WP Font Awesome WordPress plugin before 1.7.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - WP Font Awesome** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/fd7aaf06-4be7-48d6-83a1-cd5cd6c3d9c2) ### Credits - Lana Codes - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23654, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23654 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23654 - **State**: PUBLISHED - **Published Date**: January 16, 2025 at 20:06 UTC - **Last Updated**: January 17, 2025 at 19:17 UTC - **Reserved Date**: January 16, 2025 at 11:27 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Vinícius Krolow Twitter Post allows Stored XSS.This issue affects Twitter Post: from n/a through 0.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **Vinícius Krolow - Twitter Post** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/twitterpost/vulnerability/wordpress-twitter-post-plugin-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve) ### Credits - SOPROBRO (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20618 - **State**: PUBLISHED - **Published Date**: January 12, 2022 at 19:05 UTC - **Last Updated**: August 03, 2024 at 02:17 UTC - **Reserved Date**: October 28, 2021 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. ### Affected Products **Jenkins project - Jenkins Bitbucket Branch Source Plugin** Affected versions: - unspecified (Status: affected) - 725.vd9f8be0fa250 (Status: unaffected) - 2.9.11.2 (Status: unaffected) - 2.9.7.2 (Status: unaffected) ### References 1. [](https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2033) 2. [[oss-security] 20220112 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/01/12/6)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5589 - **State**: PUBLISHED - **Published Date**: October 15, 2023 at 22:31 UTC - **Last Updated**: August 02, 2024 at 08:07 UTC - **Reserved Date**: October 15, 2023 at 15:40 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-242188. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Judging Management System** Affected versions: - 1.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.242188) 2. [](https://vuldb.com/?ctiid.242188) 3. [](https://github.com/GodRone/Judging-Management-System_SQL-injection/blob/main/Judging%20Management%20System_SQL%20injection.md) ### Credits - Rone020 (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-47414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-47414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-47414 - **State**: PUBLISHED - **Published Date**: October 09, 2024 at 09:26 UTC - **Last Updated**: October 09, 2024 at 12:34 UTC - **Reserved Date**: September 24, 2024 at 17:40 UTC - **Assigned By**: adobe ### Vulnerability Description Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Adobe - Animate** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/animate/apsb24-76.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-11274, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-11274 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-11274 - **State**: PUBLISHED - **Published Date**: December 12, 2024 at 12:02 UTC - **Last Updated**: December 12, 2024 at 15:44 UTC - **Reserved Date**: November 15, 2024 at 18:31 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 17.4.6, starting from 17.5 prior to 17.5.4, and starting from 17.6 prior to 17.6.2, injection of NEL headers in k8s proxy response could lead to session data exfiltration. ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-601: URL Redirection to Untrusted Site ### Affected Products **GitLab - GitLab** Affected versions: - 16.1 (Status: affected) - 17.5 (Status: affected) - 17.6 (Status: affected) ### References 1. [GitLab Issue #504707](https://gitlab.com/gitlab-org/gitlab/-/issues/504707) 2. [HackerOne Bug Bounty Report #2813673](https://hackerone.com/reports/2813673) ### Credits - Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22946, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22946 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22946 - **State**: PUBLISHED - **Published Date**: January 10, 2025 at 00:00 UTC - **Last Updated**: January 14, 2025 at 14:53 UTC - **Reserved Date**: January 09, 2025 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tenda ac9 v1.0 firmware v15.03.05.19 contains a stack overflow vulnerability in /goform/SetOnlineDevName, which may lead to remote arbitrary code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://noisy-caravel-a9a.notion.site/Tenda_AC9V1-0_V15-03-05-19_formSetDeviceName_sprintf_bof-16f898c94eac8057afcbceb63fda7d24)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10949, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10949 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10949 - **State**: PUBLISHED - **Published Date**: August 04, 2017 at 15:00 UTC - **Last Updated**: September 16, 2024 at 23:15 UTC - **Reserved Date**: July 05, 2017 at 00:00 UTC - **Assigned By**: zdi ### Vulnerability Description Directory Traversal in Dell Storage Manager 2016 R2.1 causes Information Disclosure when the doGet method of the EmWebsiteServlet class doesn't properly validate user provided path before using it in file operations. Was ZDI-CAN-4459. ### Affected Products **Zero Day Initiative - Dell Storage Manager** Affected versions: - 2016 R2.1 (Status: affected) ### References 1. [](http://topics-cdn.dell.com/pdf/dell-compellent-sc8000_release%20notes24_en-us.pdf) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-17-523) 3. [100138](http://www.securityfocus.com/bid/100138)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-36995, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-36995 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-36995 - **State**: PUBLISHED - **Published Date**: October 28, 2021 at 12:27 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. ### Affected Products **Huawei - EMUI** Affected versions: - 11.0.0 (Status: affected) - 10.1.1 (Status: affected) **Huawei - Magic UI** Affected versions: - 4.0.0 (Status: affected) - 3.1.1 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2021/7/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35611, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35611 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35611 - **State**: PUBLISHED - **Published Date**: December 28, 2020 at 19:39 UTC - **Last Updated**: September 16, 2024 at 20:02 UTC - **Reserved Date**: December 21, 2020 at 00:00 UTC - **Assigned By**: Joomla ### Vulnerability Description An issue was discovered in Joomla! 2.5.0 through 3.9.22. The globlal configuration page does not remove secrets from the HTML output, disclosing the current values. ### Affected Products **Joomla! Project - Joomla! CMS** Affected versions: - 2.5.0-3.9.22 (Status: affected) ### References 1. [](https://developer.joomla.org/security-centre/829-20201102-core-disclosure-of-secrets-in-global-configuration-page.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29699 - **State**: PUBLISHED - **Published Date**: July 15, 2021 at 17:16 UTC - **Last Updated**: September 16, 2024 at 19:30 UTC - **Reserved Date**: March 31, 2021 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Verify Access Docker 10.0.0 could allow a remote priviled user to upload arbitrary files with a dangerous file type that could be excuted by an user. IBM X-Force ID: 200600. ### Affected Products **IBM - Security Verify Access Docker** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6471895) 2. [ibm-sam-cve202129699-file-upload (200600)](https://exchange.xforce.ibmcloud.com/vulnerabilities/200600)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-9906, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-9906 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-9906 - **State**: PUBLISHED - **Published Date**: October 22, 2020 at 18:04 UTC - **Last Updated**: August 04, 2024 at 10:43 UTC - **Reserved Date**: March 02, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. ### Affected Products **Apple - iOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/kb/HT211289) 2. [](https://support.apple.com/kb/HT211288) 3. [](https://support.apple.com/kb/HT211291) 4. [](http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1695 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: April 30, 2010 at 00:00 UTC - **Assigned By**: sgi ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1298, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1298 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1298 - **State**: PUBLISHED - **Published Date**: April 26, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:44 UTC - **Reserved Date**: April 26, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The inserter.cgi script allows remote attackers to read arbitrary files via a full pathname in the argument. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20050425 remote command execution in inserter.cgi script](http://marc.info/?l=bugtraq&m=111444807013846&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8944 - **State**: PUBLISHED - **Published Date**: February 15, 2017 at 19:00 UTC - **Last Updated**: August 06, 2024 at 02:35 UTC - **Reserved Date**: October 25, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM AIX 7.1 and 7.2 allows a local user to open a file with a specially crafted argument that would crash the system. IBM APARs: IV91488, IV91487, IV91456, IV90234. ### Affected Products **IBM Corporation - AIX** Affected versions: - 7 (Status: affected) - 1 (Status: affected) - 7.2 (Status: affected) ### References 1. [](http://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc) 2. [1037759](http://www.securitytracker.com/id/1037759) 3. [95888](http://www.securityfocus.com/bid/95888)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-23937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-23937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-23937 - **State**: PUBLISHED - **Published Date**: March 29, 2022 at 01:21 UTC - **Last Updated**: August 03, 2024 at 03:59 UTC - **Reserved Date**: January 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Wind River VxWorks 6.9 and 7, a specific crafted packet may lead to an out-of-bounds read during an IKE initial exchange scenario. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:L/C:N/I:N/PR:N/S:U/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://support2.windriver.com/index.php?page=security-notices) 2. [](https://support2.windriver.com/index.php?page=cve&pg=21#list)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12974, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12974 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12974 - **State**: PUBLISHED - **Published Date**: August 20, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 18:51 UTC - **Reserved Date**: August 20, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/217/explicit-check-for-ec-public-key-on-curve) 2. [](https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt) 3. [](https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/f3a7a801f0c6b078899fed9226368eb7b44e2b2f) 4. [[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities](https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19317 - **State**: PUBLISHED - **Published Date**: December 05, 2019 at 13:53 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: November 26, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/sqlite/sqlite/commit/73bacb7f93eab9f4bd5a65cbc4ae242acf63c9e3) 2. [](https://github.com/sqlite/sqlite/commit/522ebfa7cee96fb325a22ea3a2464a63485886a8) 3. [](https://security.netapp.com/advisory/ntap-20191223-0001/) 4. [](https://www.oracle.com/security-alerts/cpuapr2020.html) 5. [](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26107, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26107 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26107 - **State**: PUBLISHED - **Published Date**: March 18, 2024 at 17:54 UTC - **Last Updated**: October 07, 2024 at 14:17 UTC - **Reserved Date**: February 14, 2024 at 17:37 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.19 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1400, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1400 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1400 - **State**: PUBLISHED - **Published Date**: February 12, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:53 UTC - **Reserved Date**: February 12, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The control panel in ASP Calendar does not require authentication to access, which allows remote attackers to gain unauthorized access via a direct request to main.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20041214 ASP Calendar Vulnerability <www.ashiyane.com>](http://marc.info/?l=bugtraq&m=110304839629822&w=2) 2. [asp-calendar-gain-access(18474)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18474) 3. [11931](http://www.securityfocus.com/bid/11931)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-19284, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-19284 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-19284 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 22:10 UTC - **Last Updated**: August 04, 2024 at 14:08 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in the /group/comment component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the group comments text field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.seebug.org/vuldb/ssvid-97944) 2. [](https://github.com/zchuanzhao/jeesns/issues/15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4560, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4560 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4560 - **State**: PUBLISHED - **Published Date**: December 28, 2005 at 19:00 UTC - **Last Updated**: August 07, 2024 at 23:46 UTC - **Reserved Date**: December 28, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://vil.mcafeesecurity.com/vil/content/v_137760.htm) 2. [20051228 Re: Is this a new exploit?](http://www.securityfocus.com/archive/1/420367/100/0/threaded) 3. [](http://www.f-secure.com/weblog/archives/archive-122005.html#00000753) 4. [20051228 WMF Exploit](http://www.securityfocus.com/archive/1/420378/100/0/threaded) 5. [oval:org.mitre.oval:def:1492](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1492) 6. [20051228 RE: [Full-disclosure] Someone wasted a nice bug on spyware...](http://www.securityfocus.com/archive/1/420357/100/0/threaded) 7. [oval:org.mitre.oval:def:1564](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1564) 8. [18255](http://secunia.com/advisories/18255) 9. [oval:org.mitre.oval:def:1612](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1612) 10. [ADV-2005-3086](http://www.vupen.com/english/advisories/2005/3086) 11. [1015416](http://securitytracker.com/id?1015416) 12. [20051227 Exploitation of Windows WMF on the web](http://www.securityfocus.com/archive/1/420351/100/0/threaded) 13. [20051229 WMF exploit](http://www.securityfocus.com/archive/1/420446/100/0/threaded) 14. [win-wmf-execute-code(23846)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23846) 15. [18364](http://secunia.com/advisories/18364) 16. [20060104 Another WMF exploit workaround](http://www.securityfocus.com/archive/1/420773/100/0/threaded) 17. [18415](http://secunia.com/advisories/18415) 18. [20060101 Re: RE: WMF Exploit](http://www.securityfocus.com/archive/1/420664/30/7730/threaded) 19. [20060103 Re: [funsec] WMF round-up, updates and de-mystification](http://www.securityfocus.com/archive/1/420687/100/0/threaded) 20. [20060103 WMF round-up, updates and de-mystification](http://www.securityfocus.com/archive/1/420682/100/0/threaded) 21. [18311](http://secunia.com/advisories/18311) 22. [TA05-362A](http://www.us-cert.gov/cas/techalerts/TA05-362A.html) 23. [](http://linuxbox.org/pipermail/funsec/2006-January/002455.html) 24. [20051229 RE: WMF Exploit](http://www.securityfocus.com/archive/1/420546/30/7730/threaded) 25. [oval:org.mitre.oval:def:1431](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1431) 26. [20051227 Is this a new exploit?](http://www.securityfocus.com/archive/1/420288/100/0/threaded) 27. [VU#181038](http://www.kb.cert.org/vuls/id/181038) 28. [oval:org.mitre.oval:def:1460](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1460) 29. [16074](http://www.securityfocus.com/bid/16074) 30. [](http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341) 31. [MS06-001](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001) 32. [20060103 WMF SETABORTPROC exploit](http://www.securityfocus.com/archive/1/420684/100/0/threaded) 33. [oval:org.mitre.oval:def:1433](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1433) 34. [TA06-005A](http://www.us-cert.gov/cas/techalerts/TA06-005A.html) 35. [](http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm) 36. [](http://www.microsoft.com/technet/security/advisory/912840.mspx) 37. [](http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0979, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0979 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0979 - **State**: PUBLISHED - **Published Date**: December 11, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: December 10, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description FreeScripts VisitorBook LE (visitorbook.pl) does not properly escape line breaks in input, which allows remote attackers to (1) use VisitorBook as an open mail relay, when $mailuser is 1, via extra headers in the email field, or (2) cause the guestbook database to be deleted via a large number of line breaks that exceeds the $max_posts variable. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.westpoint.ltd.uk/advisories/wp-03-0001.txt) 2. [20031210 Visitorbook LE Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=107107840622493&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-7436, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-7436 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-7436 - **State**: PUBLISHED - **Published Date**: March 20, 2019 at 19:53 UTC - **Last Updated**: August 04, 2024 at 20:46 UTC - **Reserved Date**: February 05, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP Scripts Mall Opensource Classified Ads Script 3.2.2 has directory traversal via a direct request for a listing of an uploads directory. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gkaim.com/cve-2019-7436-vikas-chaudhary/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6508 - **State**: PUBLISHED - **Published Date**: December 14, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 13, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in phpBB 2.0.21 allows remote authenticated users to send unauthorized messages as an arbitrary user via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [phpbb-message-csrf(30786)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30786) 2. [28871](http://secunia.com/advisories/28871) 3. [DSA-1488](http://www.debian.org/security/2008/dsa-1488) 4. [23283](http://secunia.com/advisories/23283)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-2027, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-2027 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-2027 - **State**: PUBLISHED - **Published Date**: April 09, 2024 at 18:58 UTC - **Last Updated**: August 01, 2024 at 18:56 UTC - **Reserved Date**: February 29, 2024 at 18:33 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its style attributes in all versions up to, and including, 4.22.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **devowl - Real Media Library: Media Library Folder & File Manager** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/67a44d4c-da3f-4c3d-997b-1417c6906a9c?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3050229%40real-media-library-lite%2Ftrunk&old=3041112%40real-media-library-lite%2Ftrunk&sfp_email=&sfph_mail=) ### Credits - Ngô Thiên An - Dau Hoang Tai
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3468, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3468 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3468 - **State**: PUBLISHED - **Published Date**: June 27, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 14:21 UTC - **Reserved Date**: June 27, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description input.c in VideoLAN VLC Media Player before 0.8.6c allows remote attackers to cause a denial of service (crash) via a crafted WAV file that causes an uninitialized i_nb_resamplers variable to be used. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070621 VLC 0.8.6b format string vulnerability & integer overflow](http://www.securityfocus.com/archive/1/471933/100/0/threaded) 2. [oval:org.mitre.oval:def:14744](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744) 3. [38992](http://osvdb.org/38992) 4. [](http://www.isecpartners.com/advisories/2007-001-vlc.txt) 5. [DSA-1332](http://www.debian.org/security/2007/dsa-1332) 6. [25980](http://secunia.com/advisories/25980)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-11727, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-11727 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-11727 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 13:16 UTC - **Last Updated**: August 04, 2024 at 23:03 UTC - **Reserved Date**: May 03, 2019 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68. ### Affected Products **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2019-21/) 2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1552208) 3. [RHSA-2019:1951](https://access.redhat.com/errata/RHSA-2019:1951) 4. [GLSA-201908-12](https://security.gentoo.org/glsa/201908-12) 5. [openSUSE-SU-2019:2248](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html) 6. [openSUSE-SU-2019:2249](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html) 7. [openSUSE-SU-2019:2251](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html) 8. [openSUSE-SU-2019:2260](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html) 9. [openSUSE-SU-2020:0008](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6390, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6390 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6390 - **State**: PUBLISHED - **Published Date**: December 17, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 16:02 UTC - **Reserved Date**: December 17, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in the mycalendar plugin before 0.13 for Serendipity allows remote attackers to perform actions as blog administrators, which can be leveraged to conduct cross-site scripting (XSS) attacks on the blog page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28152](http://secunia.com/advisories/28152) 2. [](http://www.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html) 3. [26955](http://www.securityfocus.com/bid/26955)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53007 - **State**: PUBLISHED - **Published Date**: January 31, 2025 at 00:00 UTC - **Last Updated**: January 31, 2025 at 17:44 UTC - **Reserved Date**: November 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Bentley Systems ProjectWise Integration Server before 10.00.03.288 allows unintended SQL query execution by an authenticated user via an API call. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N/E:P/RL:T/RC:C` ### Weakness Classification (CWE) - CWE-648: Security Weakness ### Affected Products **Bentley - ProjectWise Integration Server** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.bentley.com/advisories/be-2024-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28283, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28283 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28283 - **State**: PUBLISHED - **Published Date**: May 09, 2023 at 17:02 UTC - **Last Updated**: February 11, 2025 at 18:11 UTC - **Reserved Date**: March 13, 2023 at 22:23 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Weakness Classification (CWE) - CWE-591: Security Weakness ### Affected Products **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows 10 Version 1809** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server 2019** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2019 (Server Core installation)** Affected versions: - 10.0.17763.0 (Status: affected) **Microsoft - Windows Server 2022** Affected versions: - 10.0.20348.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) **Microsoft - Windows 11 version 22H2** Affected versions: - 10.0.22621.0 (Status: affected) **Microsoft - Windows 10 Version 22H2** Affected versions: - 10.0.19045.0 (Status: affected) **Microsoft - Windows 10 Version 1507** Affected versions: - 10.0.10240.0 (Status: affected) **Microsoft - Windows 10 Version 1607** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2016 (Server Core installation)** Affected versions: - 10.0.14393.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 Service Pack 2** Affected versions: - 6.0.6003.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)** Affected versions: - 6.1.7601.0 (Status: affected) **Microsoft - Windows Server 2012** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 (Server Core installation)** Affected versions: - 6.2.9200.0 (Status: affected) **Microsoft - Windows Server 2012 R2** Affected versions: - 6.3.9600.0 (Status: affected) **Microsoft - Windows Server 2012 R2 (Server Core installation)** Affected versions: - 6.3.9600.0 (Status: affected) ### References 1. [Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5293 - **State**: PUBLISHED - **Published Date**: January 08, 2018 at 07:00 UTC - **Last Updated**: August 05, 2024 at 05:33 UTC - **Reserved Date**: January 08, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-tools page. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://wpvulndb.com/vulnerabilities/8995) 2. [](https://github.com/d4wner/Vulnerabilities-Report/blob/master/gd-rating-system.md) 3. [](https://wordpress.org/support/topic/xss-lfi-bugs-at-the-latest-version-of-gd-rating-system/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0682, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0682 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0682 - **State**: PUBLISHED - **Published Date**: January 25, 2025 at 05:30 UTC - **Last Updated**: February 12, 2025 at 20:41 UTC - **Reserved Date**: January 23, 2025 at 17:22 UTC - **Assigned By**: Wordfence ### Vulnerability Description The ThemeREX Addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.0 via the 'trx_sc_reviews' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-98: Security Weakness ### Affected Products **n/a - ThemeREX Addons** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/15a9718f-f877-4e33-8f7a-950791c4ca85?source=cve) 2. [](https://themeforest.net/item/qwery-multipurpose-business-wordpress-theme/29678687) ### Credits - István Márton
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8911, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8911 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8911 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: June 06, 2016 at 00:00 UTC - **Assigned By**: symantec ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-24551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-24551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-24551 - **State**: PUBLISHED - **Published Date**: August 23, 2021 at 11:10 UTC - **Last Updated**: August 03, 2024 at 19:35 UTC - **Reserved Date**: January 14, 2021 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Edit Comments WordPress plugin through 0.3 does not sanitise, validate or escape the jal_edit_comments GET parameter before using it in a SQL statement, leading to a SQL injection issue ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Edit Comments** Affected versions: - 0.3 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/e62fb8db-384f-4384-ad24-e10eb9058ed5) 2. [](https://codevigilant.com/disclosure/2021/wp-plugin-edit-comments/) ### Credits - Shreya Pohekar of Codevigilant Project
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30582, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30582 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30582 - **State**: PUBLISHED - **Published Date**: April 10, 2025 at 08:09 UTC - **Last Updated**: April 10, 2025 at 13:16 UTC - **Reserved Date**: March 24, 2025 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in aytechnet DyaPress ERP/CRM allows PHP Local File Inclusion. This issue affects DyaPress ERP/CRM: from n/a through 18.0.2.0. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **aytechnet - DyaPress ERP/CRM** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/dyapress/vulnerability/wordpress-dyapress-erp-crm-18-0-2-0-local-file-inclusion-vulnerability?_s_id=cve) ### Credits - LVT-tholv2k (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16171 - **State**: PUBLISHED - **Published Date**: September 21, 2020 at 13:07 UTC - **Last Updated**: August 04, 2024 at 13:37 UTC - **Reserved Date**: July 31, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Acronis Cyber Backup before 12.5 Build 16342. Some API endpoints on port 9877 under /api/ams/ accept an additional custom Shard header. The value of this header is afterwards used in a separate web request issued by the application itself. This can be abused to conduct SSRF attacks against otherwise unreachable Acronis services that are bound to localhost such as the NotificationService on 127.0.0.1:30572. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://seclists.org/fulldisclosure/2020/Sep/33) 2. [](https://www.rcesecurity.com/2020/09/CVE-2020-16171-Exploiting-Acronis-Cyber-Backup-for-Fun-and-Emails/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-48882, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-48882 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-48882 - **State**: PUBLISHED - **Published Date**: November 29, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 21:46 UTC - **Reserved Date**: November 20, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Document Properties field at /login.php m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/weng-xianhu/eyoucms/issues/54)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52076, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52076 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52076 - **State**: PUBLISHED - **Published Date**: January 25, 2024 at 15:30 UTC - **Last Updated**: February 13, 2025 at 17:19 UTC - **Reserved Date**: December 26, 2023 at 12:53 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. Version 1.26.2 of Atril contains a patch for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 8.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-24: Security Weakness - CWE-25: Security Weakness - CWE-27: Security Weakness - CWE-22: Path Traversal ### Affected Products **mate-desktop - atril** Affected versions: - < 1.26.2 (Status: affected) ### References 1. [https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37](https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37) 2. [https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50](https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50) 3. [https://github.com/mate-desktop/atril/releases/tag/v1.26.2](https://github.com/mate-desktop/atril/releases/tag/v1.26.2) 4. [](https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-4138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-4138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-4138 - **State**: PUBLISHED - **Published Date**: August 28, 2013 at 15:00 UTC - **Last Updated**: September 16, 2024 at 18:45 UTC - **Reserved Date**: June 12, 2013 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the Hatch theme 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users with the "Administer content," "Create new article," or "Edit any article type content" permission to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drupal.org/node/2038363) 2. [](https://drupal.org/node/2038189) 3. [[oss-security] 20130717 Re: CVE request for Drupal contrib modules](http://www.openwall.com/lists/oss-security/2013/07/17/1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-4535, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-4535 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-4535 - **State**: PUBLISHED - **Published Date**: September 19, 2006 at 19:00 UTC - **Last Updated**: August 07, 2024 at 19:14 UTC - **Reserved Date**: September 05, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [MDKSA-2007:025](http://www.mandriva.com/security/advisories?name=MDKSA-2007:025) 2. [](http://www.mail-archive.com/kernel-svn-changes%40lists.alioth.debian.org/msg02314.html) 3. [DSA-1183](http://www.debian.org/security/2006/dsa-1183) 4. [22292](http://secunia.com/advisories/22292) 5. [RHSA-2006:0689](http://www.redhat.com/support/errata/RHSA-2006-0689.html) 6. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204460) 7. [22082](http://secunia.com/advisories/22082) 8. [21945](http://secunia.com/advisories/21945) 9. [20087](http://www.securityfocus.com/bid/20087) 10. [MDKSA-2006:182](http://www.mandriva.com/security/advisories?name=MDKSA-2006:182) 11. [kernel-sctp-dos(29011)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29011) 12. [22382](http://secunia.com/advisories/22382) 13. [21967](http://secunia.com/advisories/21967) 14. [USN-347-1](http://www.ubuntu.com/usn/usn-347-1) 15. [](http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm) 16. [1016992](http://securitytracker.com/id?1016992) 17. [oval:org.mitre.oval:def:10530](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10530) 18. [22945](http://secunia.com/advisories/22945) 19. [22093](http://secunia.com/advisories/22093) 20. [DSA-1184](http://www.debian.org/security/2006/dsa-1184)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-1058, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-1058 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-1058 - **State**: PUBLISHED - **Published Date**: February 14, 2012 at 00:00 UTC - **Last Updated**: August 06, 2024 at 18:45 UTC - **Reserved Date**: February 13, 2012 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in Flyspray 0.9.9.6 allows remote attackers to hijack the authentication of admins for requests that add admin accounts via an admin.newuser action to index.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [18468](http://www.exploit-db.com/exploits/18468) 2. [flyspray-index-csrf(73051)](https://exchange.xforce.ibmcloud.com/vulnerabilities/73051) 3. [47881](http://secunia.com/advisories/47881) 4. [78923](http://osvdb.org/78923) 5. [](http://packetstormsecurity.org/files/109507/Flyspray-0.9.9.6-Cross-Site-Request-Forgery.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-1455, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-1455 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-1455 - **State**: PUBLISHED - **Published Date**: March 14, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 12:59 UTC - **Reserved Date**: March 14, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple absolute path traversal vulnerabilities in Fantastico, as used with cPanel 10.x, allow remote authenticated users to include and execute arbitrary local files via (1) the userlanguage parameter to includes/load_language.php or (2) the fantasticopath parameter to includes/mysqlconfig.php and certain other files. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20070311 Fantastico In all Version Cpanel 10.x <= local File Include](http://www.securityfocus.com/archive/1/462562/100/0/threaded) 2. [35036](http://osvdb.org/35036) 3. [2420](http://securityreason.com/securityalert/2420) 4. [35037](http://osvdb.org/35037)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2481, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2481 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2481 - **State**: PUBLISHED - **Published Date**: October 20, 2021 at 10:49 UTC - **Last Updated**: September 25, 2024 at 19:39 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.26 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuoct2021.html) 2. [](https://security.netapp.com/advisory/ntap-20211022-0003/) 3. [FEDORA-2021-70dd0b9f5d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/) 4. [FEDORA-2021-46dc82116b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/) 5. [FEDORA-2021-f74148c6d4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42787, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42787 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42787 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 16:51 UTC - **Last Updated**: September 16, 2024 at 22:35 UTC - **Reserved Date**: October 21, 2021 at 00:00 UTC - **Assigned By**: GovTech CSG ### Vulnerability Description It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent's (DSA) AgentConfigurationServlet has directory traversal vulnerabilities at the "/api/appInternals/1.0/agent/configuration" API. The affected endpoint does not have any input validation of the user's input that allows a malicious payload to be injected. ### CVSS Metrics - **CVSS Base Score**: 9.4/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Aternity - SteelCentral AppInternals Dynamic Sampling Agent** Affected versions: - 10.x (Status: affected) - 12.13.0 (Status: affected) - 11.8.8 (Status: affected) ### References 1. [](https://aternity.force.com/customersuccess/s/article/Directory-Traversal-Write-Delete-Partial-Read-at-AgentConfigurationServlet-CVE-2021-42787) ### Credits - Darrel Huang, Bjorn Lim, Leng Kang Hao from Government Technology Agency of Singapore
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12808 - **State**: PUBLISHED - **Published Date**: August 13, 2019 at 19:35 UTC - **Last Updated**: August 04, 2024 at 23:32 UTC - **Reserved Date**: June 13, 2019 at 00:00 UTC - **Assigned By**: krcert ### Vulnerability Description ALTOOLS update service 18.1 and earlier versions contains a local privilege escalation vulnerability due to insecure permission. An attacker can overwrite an executable that is launched as a service to exploit this vulnerability and execute arbitrary code with system privileges. ### Weakness Classification (CWE) - CWE-264: Security Weakness ### Affected Products **ESTSOFT - ALTOOLS Update Service** Affected versions: - 18.1 (Status: affected) ### References 1. [](https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35116)