System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32514
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 07:58 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 09:12 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Poll Maker & Voting Plugin Team (InfoTheme) WP Poll Maker.This issue affects WP Poll Maker: from n/a through 3.4.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Poll Maker & Voting Plugin Team (InfoTheme) - WP Poll Maker**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-4-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Yudistira Arya (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28228
- **State**: PUBLISHED
- **Published Date**: December 23, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 15:12 UTC
- **Reserved Date**: March 30, 2022 at 00:00 UTC
- **Assigned By**: yandex
### Vulnerability Description
Out-of-bounds read was discovered in YDB server. An attacker could construct a query with insert statement that would allow him to read sensitive information from other memory locations or cause a crash.
### Affected Products
**n/a - YDB**
Affected versions:
- All versions prior to version 22.4.44 (Status: affected)
### References
1. [](https://ydb.tech/ru/docs/security-changelog#28-11-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49790
- **State**: PUBLISHED
- **Published Date**: December 22, 2023 at 16:19 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:39 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**nextcloud - security-advisories**
Affected versions:
- < 4.9.2 (Status: affected)
### References
1. [https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv)
2. [https://github.com/nextcloud/ios/pull/2665](https://github.com/nextcloud/ios/pull/2665)
3. [https://hackerone.com/reports/2245437](https://hackerone.com/reports/2245437) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2219
- **State**: PUBLISHED
- **Published Date**: July 02, 2020 at 14:55 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Link Column Plugin 1.0 and earlier does not filter URLs of links created by users with View/Configure permission, resulting in a stored cross-site scripting vulnerability.
### Affected Products
**Jenkins project - Jenkins Link Column Plugin**
Affected versions:
- unspecified (Status: affected)
- next of 1.0 (Status: unknown)
### References
1. [](https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1803)
2. [[oss-security] 20200702 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/07/02/7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7205, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7205 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7205
- **State**: PUBLISHED
- **Published Date**: September 11, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: September 11, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the product view functionality in VirtueMart 1.0.13a and earlier allows remote attackers to read arbitrary files via vectors related to a template file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [41761](http://osvdb.org/41761)
2. [](http://virtuemart.net/index.php?option=com_content&task=view&id=275&Itemid=127)
3. [27532](http://www.securityfocus.com/bid/27532)
4. [28722](http://secunia.com/advisories/28722)
5. [virtuemart-template-information-disclosure(40114)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40114) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2365
- **State**: PUBLISHED
- **Published Date**: July 08, 2009 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: July 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in login.asp in DataCheck Solutions GalleryPal FE 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55471](http://www.osvdb.org/55471)
2. [datacheck-login-sql-injection(51403)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51403)
3. [35626](http://secunia.com/advisories/35626) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45042, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45042
- **State**: PUBLISHED
- **Published Date**: December 17, 2021 at 13:38 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.hashicorp.com/blog/category/vault)
2. [](https://discuss.hashicorp.com/t/hcsec2-21-33-vault-s-kv-secrets-engine-with-integrated-storage-exposed-to-authenticated-denial-of-service/33157)
3. [GLSA-202207-01](https://security.gentoo.org/glsa/202207-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30529
- **State**: PUBLISHED
- **Published Date**: June 09, 2024 at 11:03 UTC
- **Last Updated**: August 02, 2024 at 01:38 UTC
- **Reserved Date**: March 27, 2024 at 12:56 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Tainacan.Org Tainacan.This issue affects Tainacan: from n/a through 0.20.7.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Tainacan.org - Tainacan**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-20-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Dhabaleshwar Das (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38572
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 21:13 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 11, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because the extractPages pathname is not validated.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4306, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4306 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4306
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5238, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5238 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5238
- **State**: PUBLISHED
- **Published Date**: November 26, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: November 25, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30797](http://www.securityfocus.com/bid/30797)
2. [1020703](http://securitytracker.com/id?1020703)
3. [xinelib-realparsemdpr-bo(44650)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44650)
4. [](http://www.ocert.org/analysis/2008-008/analysis.txt)
5. [4648](http://securityreason.com/securityalert/4648)
6. [31827](http://secunia.com/advisories/31827)
7. [FEDORA-2008-7572](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html)
8. [SUSE-SR:2009:004](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html)
9. [20080822 [oCERT-2008-008] multiple heap overflows in xine-lib](http://www.securityfocus.com/archive/1/495674/100/0/threaded)
10. [FEDORA-2008-7512](https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html)
11. [](http://sourceforge.net/project/shownotes.php?release_id=619869) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0224
- **State**: PUBLISHED
- **Published Date**: July 17, 2020 at 20:09 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In FastKeyAccumulator::GetKeysSlow of keys.cc, there is a possible out of bounds write due to type confusion. This could lead to remote code execution when processing a proxy configuration with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147664838
### Affected Products
**n/a - Android**
Affected versions:
- Android-8.0 (Status: affected)
- Android-8.1 (Status: affected)
- Android-9 (Status: affected)
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0358
- **State**: PUBLISHED
- **Published Date**: February 04, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: January 29, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1021667](http://www.securitytracker.com/id?1021667)
2. [ADV-2009-0313](http://www.vupen.com/english/advisories/2009/0313)
3. [SUSE-SA:2009:009](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html)
4. [33809](http://secunia.com/advisories/33809)
5. [MDVSA-2009:044](http://www.mandriva.com/security/advisories?name=MDVSA-2009:044)
6. [RHSA-2009:0256](http://rhn.redhat.com/errata/RHSA-2009-0256.html)
7. [](http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm)
8. [33831](http://secunia.com/advisories/33831)
9. [33841](http://secunia.com/advisories/33841)
10. [33846](http://secunia.com/advisories/33846)
11. [33799](http://secunia.com/advisories/33799)
12. [oval:org.mitre.oval:def:10610](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10610)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=441751)
14. [](http://blogs.imeta.co.uk/JDeabill/archive/2008/07/14/303.aspx)
15. [](http://www.mozilla.org/security/announce/2009/mfsa2009-06.html)
16. [33598](http://www.securityfocus.com/bid/33598)
17. [FEDORA-2009-1399](https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html)
18. [33869](http://secunia.com/advisories/33869)
19. [USN-717-1](http://www.ubuntu.com/usn/usn-717-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16049
- **State**: PUBLISHED
- **Published Date**: October 03, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 10:10 UTC
- **Reserved Date**: August 28, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition before 11.0.6, 11.1.x before 11.1.5, and 11.2.x before 11.2.2. There is Sensitive Data Disclosure in Sidekiq Logs through an Error Message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/46967)
2. [](https://about.gitlab.com/2018/08/28/security-release-gitlab-11-dot-2-dot-2-released/)
3. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/49272) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33565, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33565 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33565
- **State**: REJECTED
- **Published Date**: June 23, 2023 at 00:00 UTC
- **Last Updated**: May 27, 2024 at 00:14 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48829, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48829
- **State**: PUBLISHED
- **Published Date**: July 16, 2024 at 11:44 UTC
- **Last Updated**: May 04, 2025 at 08:24 UTC
- **Reserved Date**: July 16, 2024 at 11:38 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
iattr::ia_size is a loff_t, so these NFSv3 procedures must be
careful to deal with incoming client size values that are larger
than s64_max without corrupting the value.
Silently capping the value results in storing a different value
than the client passed in which is unexpected behavior, so remove
the min_t() check in decode_sattr3().
Note that RFC 1813 permits only the WRITE procedure to return
NFS3ERR_FBIG. We believe that NFSv3 reference implementations
also return NFS3ERR_FBIG when ia_size is too large.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10.220 (Status: unaffected)
- 5.15.24 (Status: unaffected)
- 5.16.10 (Status: unaffected)
- 5.17 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a231ae6bb50e7c0a9e9efd7b0d10687f1d71b3a3)
2. [](https://git.kernel.org/stable/c/37f2d2cd8eadddbbd9c7bda327a9393399b2f89b)
3. [](https://git.kernel.org/stable/c/aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0)
4. [](https://git.kernel.org/stable/c/a648fdeb7c0e17177a2280344d015dba3fbe3314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000193, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000193 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000193
- **State**: PUBLISHED
- **Published Date**: June 05, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 12:40 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
2. [](https://jenkins.io/security/advisory/2018-05-09/#SECURITY-786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32275
- **State**: PUBLISHED
- **Published Date**: June 06, 2022 at 18:29 UTC
- **Last Updated**: August 03, 2024 at 07:39 UTC
- **Reserved Date**: June 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is no vulnerability; this request yields a benign error page, not /etc/passwd content
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://grafana.com)
2. [](https://github.com/BrotherOfJhonny/grafana/blob/main/README.md)
3. [](https://github.com/grafana/grafana/issues/50336)
4. [](https://github.com/BrotherOfJhonny/grafana)
5. [](https://security.netapp.com/advisory/ntap-20220715-0008/)
6. [](https://github.com/grafana/grafana/issues/50341#issuecomment-1155252393) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20481
- **State**: PUBLISHED
- **Published Date**: December 26, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 12:05 UTC
- **Reserved Date**: December 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser::makeStream in Parser.cc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.freedesktop.org/poppler/poppler/issues/692)
2. [](https://gitlab.freedesktop.org/poppler/poppler/merge_requests/143)
3. [USN-3865-1](https://usn.ubuntu.com/3865-1/)
4. [[debian-lts-announce] 20190308 [SECURITY] [DLA 1706-1] poppler security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html)
5. [106321](http://www.securityfocus.com/bid/106321)
6. [RHSA-2019:2022](https://access.redhat.com/errata/RHSA-2019:2022)
7. [RHSA-2019:2713](https://access.redhat.com/errata/RHSA-2019:2713)
8. [[debian-lts-announce] 20200723 [SECURITY] [DLA 2287-1] poppler security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5683
- **State**: REJECTED
- **Published Date**: June 30, 2022 at 20:23 UTC
- **Last Updated**: June 30, 2022 at 20:23 UTC
- **Reserved Date**: September 03, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9832
- **State**: PUBLISHED
- **Published Date**: March 22, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 13:55 UTC
- **Reserved Date**: June 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap overflow in ImageMagick 6.8.9-9 via a crafted pcx file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160602 Re: ImageMagick CVEs](http://www.openwall.com/lists/oss-security/2016/06/02/13)
2. [[oss-security] 20141224 Imagemagick fuzzing bug](http://www.openwall.com/lists/oss-security/2014/12/24/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1448, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1448
- **State**: PUBLISHED
- **Published Date**: November 12, 2019 at 18:53 UTC
- **Last Updated**: August 04, 2024 at 18:20 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
### Affected Products
**Microsoft - Microsoft Excel**
Affected versions:
- 2010 Service Pack 2 (32-bit editions) (Status: affected)
- 2010 Service Pack 2 (64-bit editions) (Status: affected)
- 2013 Service Pack 1 (32-bit editions) (Status: affected)
- 2013 Service Pack 1 (64-bit editions) (Status: affected)
- 2013 RT Service Pack 1 (Status: affected)
- 2016 (32-bit edition) (Status: affected)
- 2016 (64-bit edition) (Status: affected)
**Microsoft - Microsoft Office**
Affected versions:
- 2016 for Mac (Status: affected)
- 2019 for 32-bit editions (Status: affected)
- 2019 for 64-bit editions (Status: affected)
- 2019 for Mac (Status: affected)
**Microsoft - Office 365 ProPlus**
Affected versions:
- 32-bit Systems (Status: affected)
- 64-bit Systems (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1448) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4059
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 12:49 UTC
- **Last Updated**: March 27, 2025 at 19:25 UTC
- **Reserved Date**: April 23, 2024 at 09:40 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 124.0.6367.78 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html)
2. [](https://issues.chromium.org/issues/333182464)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0576
- **State**: PUBLISHED
- **Published Date**: February 08, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:41 UTC
- **Reserved Date**: February 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060207 Arbitrary code execution via OProfile](http://www.securityfocus.com/archive/1/424325/100/0/threaded)
2. [](http://www.redhat.com/magazine/012oct05/features/oprofile/)
3. [oval:org.mitre.oval:def:10890](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10890)
4. [16536](http://www.securityfocus.com/bid/16536) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4528, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4528 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4528
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:41 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5416, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5416 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5416
- **State**: PUBLISHED
- **Published Date**: October 12, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 15:31 UTC
- **Reserved Date**: October 12, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Drupal 5.2 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code by invoking the drupal_eval function through a callback parameter to the default URI, as demonstrated by the _menu[callbacks][1][callback] parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in Drupal.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071010 Vulnerabilities digest](http://www.securityfocus.com/archive/1/482006/100/0/threaded)
2. [3216](http://securityreason.com/securityalert/3216)
3. [](http://securityvulns.ru/Sdocument137.html)
4. [4510](https://www.exploit-db.com/exploits/4510) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12132
- **State**: PUBLISHED
- **Published Date**: April 23, 2020 at 23:50 UTC
- **Last Updated**: August 04, 2024 at 11:48 UTC
- **Reserved Date**: April 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Fifthplay S.A.M.I before 2019.3_HP2 allows unauthenticated stored XSS via a POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.fifthplay.com/faq/)
2. [](https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5561.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31239, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31239
- **State**: PUBLISHED
- **Published Date**: May 12, 2025 at 21:42 UTC
- **Last Updated**: May 13, 2025 at 13:14 UTC
- **Reserved Date**: March 27, 2025 at 16:13 UTC
- **Assigned By**: apple
### Vulnerability Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Parsing a file may lead to an unexpected app termination.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122720)
2. [](https://support.apple.com/en-us/122716)
3. [](https://support.apple.com/en-us/122405)
4. [](https://support.apple.com/en-us/122404)
5. [](https://support.apple.com/en-us/122717)
6. [](https://support.apple.com/en-us/122721)
7. [](https://support.apple.com/en-us/122722)
8. [](https://support.apple.com/en-us/122718) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2146
- **State**: PUBLISHED
- **Published Date**: June 07, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:27 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=971309)
2. [MDVSA-2013:176](http://www.mandriva.com/security/advisories?name=MDVSA-2013:176)
3. [](https://github.com/torvalds/linux/commit/f1923820c447e986a9da0fc6bf60c1dccdf0408e)
4. [RHSA-2013:1173](http://rhn.redhat.com/errata/RHSA-2013-1173.html)
5. [](http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9)
6. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f1923820c447e986a9da0fc6bf60c1dccdf0408e)
7. [[oss-security] 20130605 Re: CVE Request: More perf security fixes](http://www.openwall.com/lists/oss-security/2013/06/05/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3475, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3475
- **State**: PUBLISHED
- **Published Date**: February 20, 2019 at 22:00 UTC
- **Last Updated**: August 04, 2024 at 19:12 UTC
- **Reserved Date**: December 31, 2018 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Micro Focus - Filr**
Affected versions:
- 3 (Status: affected)
### References
1. [46450](https://www.exploit-db.com/exploits/46450/)
2. [](https://support.microfocus.com/kb/doc.php?id=7023727)
3. [](https://download.novell.com/Download?buildid=nZUCSDkvpxk~)
### Credits
- This vulnerability was discovered and researched by Matias Choren from SecureAuth. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6064
- **State**: PUBLISHED
- **Published Date**: June 17, 2024 at 20:31 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 17, 2024 at 13:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**n/a - GPAC**
Affected versions:
- 2.5-DEV-rev228-g11067ea92-master (Status: affected)
### References
1. [VDB-268792 | GPAC MP4Box loader_xmt.c xmt_node_end use after free](https://vuldb.com/?id.268792)
2. [VDB-268792 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.268792)
3. [Submit #356316 | gpac 2.5-DEV-rev228-g11067ea92-master Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolv](https://vuldb.com/?submit.356316)
4. [](https://github.com/gpac/gpac/issues/2874)
5. [](https://github.com/user-attachments/files/15801189/poc.zip)
6. [](https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5)
### Credits
- Fantasy (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6515
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:10 UTC
- **Reserved Date**: February 01, 2018 at 00:00 UTC
- **Assigned By**: puppet
### Vulnerability Description
Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.
### Affected Products
**Puppet - Puppet Agent**
Affected versions:
- Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.2 (Status: affected)
### References
1. [](https://puppet.com/security/cve/CVE-2018-6515) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3104
- **State**: PUBLISHED
- **Published Date**: April 16, 2025 at 08:22 UTC
- **Last Updated**: April 16, 2025 at 14:34 UTC
- **Reserved Date**: April 01, 2025 at 21:47 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**WPStaging - WP STAGING Pro WordPress Backup Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/572e290e-9324-4c17-8c3b-fa67233b15c4?source=cve)
2. [](https://wp-staging.com/wp-staging-pro-changelog/)
### Credits
- haidv35 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29538
- **State**: PUBLISHED
- **Published Date**: June 02, 2023 at 00:00 UTC
- **Last Updated**: January 09, 2025 at 16:00 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Under specific circumstances a WebExtension may have received a <code>jar:file:///</code> URI instead of a <code>moz-extension:///</code> URI during a load request. This leaked directory paths on the user's machine. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
### Affected Products
**Mozilla - Firefox for Android**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Focus for Android**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2023-13/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1685403) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0345
- **State**: PUBLISHED
- **Published Date**: May 09, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 13:03 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where user provided input used as an array size is not correctly validated allows out of bound access in kernel memory and may lead to denial of service or potential escalation of privileges
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All versions (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0748
- **State**: PUBLISHED
- **Published Date**: April 02, 2003 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: July 25, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LabVIEW Web Server 5.1.1 through 6.1 allows remote attackers to cause a denial of service (crash) via an HTTP GET request that ends in two newline characters, instead of the expected carriage return/newline combinations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [labview-http-get-dos(8919)](http://www.iss.net/security_center/static/8919.php)
2. [20020423 LabVIEW Web Server DoS Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2002-04/0323.html)
3. [4577](http://www.securityfocus.com/bid/4577)
4. [5119](http://www.osvdb.org/5119)
5. [](http://digital.ni.com/public.nsf/websearch/4C3F86E655E5389886256BA00064B22F?OpenDocument) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4267
- **State**: PUBLISHED
- **Published Date**: April 24, 2020 at 15:50 UTC
- **Last Updated**: September 16, 2024 at 23:01 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM MQ and MQ Appliance 8.0, 9.1 LTS, and 9.1 CD could allow an authenticated user cause a denial of service due to a memory leak. IBM X-Force ID: 175840.
### Affected Products
**IBM - MQ Appliance**
Affected versions:
- 8.0.0.3 (Status: affected)
- 8.0.0.4 (Status: affected)
- 8.0.0.5 (Status: affected)
- 8.0.0.6 (Status: affected)
- 8.0.0.0 (Status: affected)
- 8.0.0.8 (Status: affected)
- 8.0.0.10 (Status: affected)
- 8.0.0.11 (Status: affected)
- 9.1.0.1 (Status: affected)
- 9.1.1 (Status: affected)
- 8.0.0.1 (Status: affected)
- 8.0.0.7 (Status: affected)
- 8.0.0.9 (Status: affected)
- 8.0.0.12 (Status: affected)
- 9.1.0.2 (Status: affected)
- 9.1.2 (Status: affected)
- 9.1.0.3 (Status: affected)
- 9.1.3 (Status: affected)
- 9.1 (Status: affected)
- 8.0.0.13 (Status: affected)
- 9.1.0.4 (Status: affected)
- 9.1.4 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6195384)
2. [ibm-mq-cve20204267-dos (175840)](https://exchange.xforce.ibmcloud.com/vulnerabilities/175840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5225, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5225 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5225
- **State**: PUBLISHED
- **Published Date**: January 19, 2017 at 05:43 UTC
- **Last Updated**: August 06, 2024 at 00:53 UTC
- **Reserved Date**: May 31, 2016 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.
### Affected Products
**n/a - Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android**
Affected versions:
- Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android (Status: affected)
### References
1. [RHSA-2016:2919](http://rhn.redhat.com/errata/RHSA-2016-2919.html)
2. [94633](http://www.securityfocus.com/bid/94633)
3. [](https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html)
4. [](https://crbug.com/630332)
5. [GLSA-201612-11](https://security.gentoo.org/glsa/201612-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1307
- **State**: PUBLISHED
- **Published Date**: January 13, 2021 at 21:45 UTC
- **Last Updated**: November 12, 2024 at 20:39 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Cisco - Cisco Small Business RV Series Router Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20210113 Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41001
- **State**: PUBLISHED
- **Published Date**: March 02, 2022 at 21:38 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 13, 2021 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
### Affected Products
**n/a - Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series**
Affected versions:
- AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37526
- **State**: PUBLISHED
- **Published Date**: May 10, 2024 at 17:16 UTC
- **Last Updated**: August 02, 2024 at 17:16 UTC
- **Reserved Date**: July 06, 2023 at 16:12 UTC
- **Assigned By**: HCL
### Vulnerability Description
HCL DRYiCE Lucy (now AEX) is affected by a Cross Origin Resource Sharing (CORS) vulnerability. The mobile app is vulnerable to a CORS misconfiguration which could potentially allow unauthorized access to the application resources from any web domain and enable cache poisoning attacks.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Affected Products
**HCL Software - DRYiCE Lucy**
Affected versions:
- v9 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113032) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31292, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31292
- **State**: PUBLISHED
- **Published Date**: April 07, 2024 at 17:29 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 29, 2024 at 17:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Moove Agency Import XML and RSS Feeds.This issue affects Import XML and RSS Feeds: from n/a through 2.1.5.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Moove Agency - Import XML and RSS Feeds**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/import-xml-feed/wordpress-import-xml-and-rss-feeds-plugin-2-1-5-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14876
- **State**: PUBLISHED
- **Published Date**: March 19, 2020 at 15:08 UTC
- **Last Updated**: August 05, 2024 at 00:26 UTC
- **Reserved Date**: August 10, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
In the __lshift function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access to b1 will trigger a null pointer dereference bug in case of a memory allocation failure.
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Red Hat - newlib**
Affected versions:
- all newlib versions prior to 3.3.0 (Status: affected)
### References
1. [](https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-25241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-25241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-25241
- **State**: PUBLISHED
- **Published Date**: March 15, 2021 at 17:03 UTC
- **Last Updated**: August 04, 2024 at 15:33 UTC
- **Reserved Date**: September 10, 2020 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
### Weakness Classification (CWE)
- CWE-1285: Security Weakness
### Affected Products
**Siemens - SIMATIC MV400 family**
Affected versions:
- All Versions < V7.0.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4583
- **State**: PUBLISHED
- **Published Date**: October 15, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Insecure method vulnerability in the Chilkat FTP 2.0 ActiveX component (ChilkatCert.dll) allows remote attackers to overwrite arbitrary files via a full pathname in the SavePkcs8File method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [4427](http://securityreason.com/securityalert/4427)
2. [5028](https://www.exploit-db.com/exploits/5028)
3. [27540](http://www.securityfocus.com/bid/27540) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29593, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29593 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29593
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 14:56 UTC
- **Last Updated**: May 05, 2025 at 16:21 UTC
- **Reserved Date**: April 22, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/en-us/resources/security-resources/security-advisories/)
2. [](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/)
3. [](http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-7480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-7480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7480
- **State**: PUBLISHED
- **Published Date**: July 21, 2017 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 20:16 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
rkhunter versions before 1.4.4 are vulnerable to file download over insecure channel when doing mirror update resulting into potential remote code execution.
### Weakness Classification (CWE)
- CWE-300: Security Weakness
### Affected Products
**Red Hat, Inc. - rkhunter**
Affected versions:
- before 1.4.4 (Status: affected)
### References
1. [[oss-security] 20170629 rkhunter: [CVE-2017-7480] Potential RCE after MiTM due to clear text download without signature](http://seclists.org/oss-sec/2017/q2/643)
2. [GLSA-201805-11](https://security.gentoo.org/glsa/201805-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2378
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 01:36 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves bookmark creation in the "WebKit" component. It allows remote attackers to execute arbitrary code or spoof a bookmark by leveraging mishandling of links during drag-and-drop actions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97129](http://www.securityfocus.com/bid/97129)
2. [1038137](http://www.securitytracker.com/id/1038137)
3. [](https://support.apple.com/HT207600)
4. [](https://support.apple.com/HT207617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3246
- **State**: PUBLISHED
- **Published Date**: July 21, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 09:28 UTC
- **Reserved Date**: July 21, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the PDF distiller component in the BlackBerry Attachment Service in BlackBerry Unite! 1.0 SP1 (1.0.1) before bundle 36 and BlackBerry Enterprise Server 4.1 SP3 (4.1.3) through 4.1 SP5 (4.1.5) allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file attachment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [31141](http://secunia.com/advisories/31141)
2. [blackberry-unite-pdf-code-execution(43843)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43843)
3. [](http://www.blackberry.com/btsc/articles/660/KB15766_f.SAL_Public.html)
4. [blackberry-es-pdf-code-execution(43840)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43840)
5. [VU#289235](http://www.kb.cert.org/vuls/id/289235)
6. [1020505](http://www.securitytracker.com/id?1020505)
7. [31092](http://secunia.com/advisories/31092)
8. [ADV-2008-2108](http://www.vupen.com/english/advisories/2008/2108/references)
9. [](http://www.blackberry.com/btsc/articles/635/KB15770_f.SAL_Public.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7218
- **State**: PUBLISHED
- **Published Date**: November 10, 2016 at 06:16 UTC
- **Last Updated**: August 06, 2024 at 01:57 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Bowser.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka "Windows Bowser.sys Information Disclosure Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [94004](http://www.securityfocus.com/bid/94004)
2. [1037251](http://www.securitytracker.com/id/1037251)
3. [MS16-135](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36557
- **State**: PUBLISHED
- **Published Date**: February 06, 2025 at 00:00 UTC
- **Last Updated**: February 10, 2025 at 14:22 UTC
- **Reserved Date**: May 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The device ID is based on IMEI in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b. If a malicious user changes the IMEI to the IMEI of a unit they registered in the mobile app, it is possible to hijack the device and control it from the app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51893, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51893 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51893
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:31 UTC
- **Last Updated**: November 20, 2024 at 14:26 UTC
- **Reserved Date**: November 04, 2024 at 09:59 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeAtelier Postify: Post Layout For Elementor allows DOM-Based XSS.This issue affects Postify: Post Layout For Elementor: from n/a through 1.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ThemeAtelier - Postify: Post Layout For Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/postify-for-elementor/wordpress-postify-post-layout-for-elementor-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Gab (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5270, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5270
- **State**: REJECTED
- **Published Date**: September 12, 2015 at 14:00 UTC
- **Last Updated**: September 12, 2015 at 13:57 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1352, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1352
- **State**: PUBLISHED
- **Published Date**: May 11, 2022 at 14:30 UTC
- **Last Updated**: August 03, 2024 at 00:03 UTC
- **Reserved Date**: April 14, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Due to an insecure direct object reference vulnerability in Gitlab EE/CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=11.0, <14.8.6 (Status: affected)
- >=14.9, <14.9.4 (Status: affected)
- >=14.10, <14.10.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/350691)
2. [](https://hackerone.com/reports/1450306)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1352.json)
### Credits
- Thanks [shells3c](https://hackerone.com/shells3c) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0310, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0310
- **State**: PUBLISHED
- **Published Date**: May 14, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1815.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS14-029](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-029) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15618
- **State**: PUBLISHED
- **Published Date**: January 11, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 19:57 UTC
- **Reserved Date**: October 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt)
2. [20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)](http://www.securityfocus.com/archive/1/541655/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4232
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 22:49 UTC
- **Last Updated**: August 02, 2024 at 07:24 UTC
- **Reserved Date**: August 08, 2023 at 08:01 UTC
- **Assigned By**: fedora
### Vulnerability Description
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_status_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_status_report().
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**n/a - ofono**
Affected versions:
- 2.1 (Status: unaffected)
**Fedora - Fedora**
### References
1. [RHBZ#2255394](https://bugzilla.redhat.com/show_bug.cgi?id=2255394)
### Credits
- Red Hat would like to thank Mitch Zakocs (Trend Micro Zero Day Initiative) for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27617
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 15:35 UTC
- **Last Updated**: March 12, 2025 at 15:29 UTC
- **Reserved Date**: March 03, 2025 at 15:10 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Pimcore is an open source data and experience management platform. Prior to version 11.5.4, authenticated users can craft a filter string used to cause a SQL injection. Version 11.5.4 fixes the issue.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**pimcore - pimcore**
Affected versions:
- < 11.5.4 (Status: affected)
### References
1. [https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh](https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh)
2. [https://github.com/pimcore/pimcore/commit/19a8520895484e68fd254773e32476565d91deea](https://github.com/pimcore/pimcore/commit/19a8520895484e68fd254773e32476565d91deea)
3. [https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Extension/RelationFilterConditionParser.php#L29-L47](https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Extension/RelationFilterConditionParser.php#L29-L47)
4. [https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Multiselect.php#L332-L347](https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Multiselect.php#L332-L347) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1037, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1037
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:55 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19980626 vulnerability in satan, cops & tiger](http://marc.info/?l=bugtraq&m=90221103125976&w=2)
2. [satan-rexsatan-symlink(7167)](http://www.iss.net/security_center/static/7167.php)
3. [3147](http://www.osvdb.org/3147)
4. [19980627 Re: vulnerability in satan, cops & tiger](http://marc.info/?l=bugtraq&m=90221103125986&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18407
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 16, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer over-read was discovered in the tcpreplay-edit binary of Tcpreplay 4.3.0 beta1, during the incremental checksum operation. The issue gets triggered in the function csum_replace4() in incremental_checksum.h, causing a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/appneta/tcpreplay/issues/488)
2. [](https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#user-content-heap-overflow-in-csum_replace4)
3. [FEDORA-2019-a9c08d4b40](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MLPY6W7Z7G6PF2JN4LXXHCACYLD4RBG6/)
4. [FEDORA-2019-e40253f67e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24993
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 01:10 UTC
- **Last Updated**: August 01, 2024 at 23:36 UTC
- **Reserved Date**: February 02, 2024 at 01:04 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A Race Condition (TOCTOU) vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
### Affected Products
**Ivanti - Avalanche**
Affected versions:
- 6.4.3 (Status: affected)
### References
1. [](https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43457
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:54 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Setup and Deployment Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-428: Security Weakness
### Affected Products
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows Setup and Deployment Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0588
- **State**: PUBLISHED
- **Published Date**: January 15, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 04:17 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Cisco Unified Communications Domain Manager (UCDM) 10 allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo77055.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1031559](http://www.securitytracker.com/id/1031559)
2. [20150115 Cisco Unified Communications Domain Manager Cross-Site Request Forgery Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0588)
3. [62352](http://secunia.com/advisories/62352)
4. [cisco-ucdm-cve20150588-csrf(100657)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100657)
5. [72082](http://www.securityfocus.com/bid/72082) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0185
- **State**: PUBLISHED
- **Published Date**: April 25, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: March 22, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RealMedia RealServer reveals the real IP address of a Real Server, even if the address is supposed to be private.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20000308 RealServer exposes internal IP addresses](http://archives.neohapsis.com/archives/bugtraq/2000-03/0069.html)
2. [1049](http://www.securityfocus.com/bid/1049) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28189
- **State**: REJECTED
- **Published Date**: December 24, 2020 at 14:41 UTC
- **Last Updated**: December 24, 2020 at 14:41 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8775
- **State**: PUBLISHED
- **Published Date**: May 04, 2017 at 03:55 UTC
- **Last Updated**: September 17, 2024 at 00:56 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Memory Corruption while parsing a malformed Mach-O file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://payatu.com/quick-heal-internet-security-memory-corruption-vulnerability-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26666
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 16:37 UTC
- **Last Updated**: April 16, 2025 at 16:35 UTC
- **Reserved Date**: March 17, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in HandlerECC.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01)
### Credits
- Michael Heinzl and Dusan Stevanovic of Trend Micro’s Zero Day Initiative reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17625
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 20:59 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Professional Service Script 1.0 has SQL Injection via the service-list city parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/145337/Professional-Service-Script-1.0-SQL-Injection.html)
2. [43294](https://www.exploit-db.com/exploits/43294/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42426
- **State**: PUBLISHED
- **Published Date**: September 25, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 17:31 UTC
- **Reserved Date**: September 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Froala Froala Editor v.4.1.1 allows remote attackers to execute arbitrary code via the 'Insert link' parameter in the 'Insert Image' component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://froala.com)
2. [](https://www.youtube.com/watch?v=Me33Dx1_XqQ)
3. [](https://github.com/b0marek/CVE-2023-42426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21108
- **State**: PUBLISHED
- **Published Date**: June 15, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 09:28 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In sdpu_build_uuid_seq of sdp_discovery.cc, there is a possible out of bounds write due to a use after free. This could lead to remote code execution over Bluetooth, if HFP support is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-239414876
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22144
- **State**: PUBLISHED
- **Published Date**: April 25, 2024 at 08:25 UTC
- **Last Updated**: August 01, 2024 at 22:35 UTC
- **Reserved Date**: January 05, 2024 at 11:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows Code Injection.This issue affects Anti-Malware Security and Brute-Force Firewall: from n/a through 4.21.96.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Eli Scheetz - Anti-Malware Security and Brute-Force Firewall**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/gotmls/wordpress-anti-malware-security-and-brute-force-firewall-plugin-4-21-96-unauthenticated-predictable-nonce-brute-force-leading-to-rce-vulnerability?_s_id=cve)
2. [](https://sec.stealthcopter.com/cve-2024-22144/)
3. [](https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve)
### Credits
- stealthcopter (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38678
- **State**: PUBLISHED
- **Published Date**: January 04, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 15:17 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0523
- **State**: PUBLISHED
- **Published Date**: February 23, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 23, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in ProZilla 1.3.7.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the Location header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.securiteam.com/exploits/5WP082KEUW.html)
2. [12635](http://www.securityfocus.com/bid/12635)
3. [](http://deicide.siyahsapka.org/exploits/proz_ex2.c)
4. [DSA-719](http://www.debian.org/security/2005/dsa-719) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36197
- **State**: PUBLISHED
- **Published Date**: May 13, 2021 at 02:55 UTC
- **Last Updated**: September 17, 2024 at 01:01 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: qnap
### Vulnerability Description
An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability allows attackers to compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.3.16 on QTS 4.5.2; versions prior to 5.2.10 on QTS 4.3.6; versions prior to 5.1.14 on QTS 4.3.3; versions prior to 5.3.16 on QuTS hero h4.5.2; versions prior to 5.3.16 on QuTScloud c4.5.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**QNAP Systems Inc. - Music Station**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - Music Station**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - Music Station**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - Music Station**
Affected versions:
- unspecified (Status: affected)
**QNAP Systems Inc. - Music Station**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.qnap.com/zh-tw/security-advisory/qsa-21-08)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-591/)
3. [](http://packetstormsecurity.com/files/162849/QNAP-MusicStation-MalwareRemover-File-Upload-Command-Injection.html)
### Credits
- Trend Micro ZDI - ZDI-CAN-12048 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45348
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 16:52 UTC
- **Last Updated**: September 04, 2024 at 16:25 UTC
- **Reserved Date**: November 14, 2022 at 12:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Formula Elements in a CSV File vulnerability in anmari amr users.This issue affects amr users: from n/a through 4.59.4.
### Weakness Classification (CWE)
- CWE-1236: Security Weakness
### Affected Products
**anmari - amr users**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/amr-users/wordpress-amr-users-plugin-4-59-4-csv-injection-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2113
- **State**: PUBLISHED
- **Published Date**: May 28, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: May 28, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in The Uniform Server 5.6.5 allow remote attackers to hijack the authentication of administrators for requests that change passwords via (1) apsetup.php, (2) psetup.php, (3) sslpsetup.php, or (4) mqsetup.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://cross-site-scripting.blogspot.com/2010/05/uniform-server-565-xsrf.html)
2. [64858](http://osvdb.org/64858)
3. [uniform-server-unspecified-csrf(58844)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58844)
4. [39913](http://secunia.com/advisories/39913) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28122
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 14:34 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: March 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/open5gs/open5gs/releases)
2. [](https://github.com/open5gs/open5gs/issues/837)
3. [](https://github.com/open5gs/open5gs/pull/838)
4. [](https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26905
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 14:17 UTC
- **Last Updated**: February 25, 2025 at 19:07 UTC
- **Reserved Date**: February 17, 2025 at 11:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Estatik Estatik allows PHP Local File Inclusion. This issue affects Estatik: from n/a through 4.1.9.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Estatik - Estatik**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/estatik/vulnerability/wordpress-estatik-plugin-4-1-9-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9391
- **State**: PUBLISHED
- **Published Date**: October 01, 2024 at 15:13 UTC
- **Last Updated**: November 22, 2024 at 19:10 UTC
- **Reserved Date**: October 01, 2024 at 06:10 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A user who enables full-screen mode on a specially crafted web page could potentially be prevented from exiting full screen mode. This may allow spoofing of other sites as the address bar is no longer visible.
*This bug only affects Firefox Focus for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 131.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1892407)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-46/)
### Credits
- James Lee |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47375, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47375 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47375
- **State**: PUBLISHED
- **Published Date**: December 12, 2023 at 11:25 UTC
- **Last Updated**: August 03, 2024 at 14:55 UTC
- **Reserved Date**: December 13, 2022 at 14:51 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC PC-Station Plus (All versions), SIMATIC S7-400 CPU 412-2 PN V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions), SINAMICS S120 (incl. SIPLUS variants) (All versions < V5.2 SP3 HF15), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions). The affected products do not handle long file names correctly.
This could allow an attacker to create a buffer overflow and create a denial of service condition for the device.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-805: Security Weakness
### Affected Products
**Siemens - SIMATIC PC-Station Plus**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU 412-2 PN V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU 414-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU 414F-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU 416-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SIMATIC S7-400 CPU 416F-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SINAMICS S120 (incl. SIPLUS variants)**
Affected versions:
- All versions < V5.2 SP3 HF15 (Status: affected)
**Siemens - SIPLUS S7-400 CPU 414-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
**Siemens - SIPLUS S7-400 CPU 416-3 PN/DP V7**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-892915.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9078, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9078 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9078
- **State**: PUBLISHED
- **Published Date**: February 24, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 21:38 UTC
- **Reserved Date**: February 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
zzcms 2019 has XSS via an arbitrary user/ask.php?do=modify parameter because inc/stopsqlin.php does not block a mixed-case string such as sCrIpT.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/NS-Sp4ce/ZZCMS-XSS/blob/master/xss.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25949
- **State**: PUBLISHED
- **Published Date**: March 17, 2022 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 04:56 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 fails to properly handle crafted inputs, leading to stack-based buffer overflow.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**KINGSOFT JAPAN, INC. - KINGSOFT Internet Security 9 Plus**
Affected versions:
- Reported for Version 2010.06.23.247 (Status: affected)
### References
1. [](https://support.kingsoft.jp/support-info/weakness.html)
2. [JVN#21234459: Multiple vulnerabilities in KINGSOFT 'WPS Office' and 'KINGSOFT Internet Security'](https://jvn.jp/en/jp/JVN21234459/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23135
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 14:20 UTC
- **Reserved Date**: January 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in Ftdms v3.1.6 allows attackers to execute arbitrary code via uploading a crafted JPG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.yuque.com/litanhua-fost9/hu05qa/fdmgbrzlvq9qpg3a?singleDoc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2386
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in the LogMsg function in sercd before 2.3.1 and sredird 2.2.1 and earlier allows remote attackers to execute arbitrary code via format string specifiers passed from the HandleCPCCommand function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11031](http://www.securityfocus.com/bid/11031)
2. [1011038](http://securitytracker.com/id?1011038)
3. [12351](http://secunia.com/advisories/12351)
4. [8375](http://www.osvdb.org/8375)
5. [11002](http://www.securityfocus.com/bid/11002)
6. [sredird-logmsg-format-string(17056)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17056)
7. [](http://cvs.lysator.liu.se/viewcvs/viewcvs.cgi/sercd/sercd.c?root=sercd)
8. [9104](http://www.osvdb.org/9104) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38382
- **State**: PUBLISHED
- **Published Date**: August 13, 2024 at 01:01 UTC
- **Last Updated**: September 21, 2024 at 09:50 UTC
- **Reserved Date**: August 16, 2022 at 18:42 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 does not invalidate session after logout which could allow another authenticated user to obtain sensitive information. IBM X-Force ID: 233672.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**IBM - QRadar Suite Software**
Affected versions:
- 1.10.12.0 (Status: affected)
**IBM - Cloud Pak for Security**
Affected versions:
- 1.10.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7165286)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/233672) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2987
- **State**: PUBLISHED
- **Published Date**: September 26, 2022 at 12:35 UTC
- **Last Updated**: May 22, 2025 at 14:24 UTC
- **Reserved Date**: August 25, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Ldap WP Login / Active Directory Integration**
Affected versions:
- 3.0.2 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27346
- **State**: PUBLISHED
- **Published Date**: April 03, 2024 at 16:19 UTC
- **Last Updated**: August 02, 2024 at 00:34 UTC
- **Reserved Date**: February 23, 2024 at 19:56 UTC
- **Assigned By**: zdi
### Vulnerability Description
Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22934.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Kofax - Power PDF**
Affected versions:
- 5.0.0.57 (5.0.0.10.0.23307) (Status: affected)
### References
1. [ZDI-24-226](https://www.zerodayinitiative.com/advisories/ZDI-24-226/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0641
- **State**: PUBLISHED
- **Published Date**: April 14, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: July 08, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [speedtouch-hijack-connection(16919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16919)
2. [ESB-2004.0504](http://www.auscert.org.au/render.html?it=4299)
3. [10881](http://www.securityfocus.com/bid/10881)
4. [20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation](http://www.idefense.com/application/poi/display?id=120&type=vulnerabilities&flashstatus=true)
5. [12238](http://secunia.com/advisories/12238/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9582, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9582 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9582
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 19:57 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9582.md)
2. [](https://psytester.github.io/CVE-2019-9582/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2271
- **State**: PUBLISHED
- **Published Date**: January 18, 2012 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 00:15 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2 allows remote authenticated users to affect integrity via unknown vectors related to Attachments / File Upload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20483
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 16:38 UTC
- **Last Updated**: September 20, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root.
These vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input as the argument of an affected configuration command. A successful exploit could allow the attacker to execute arbitrary commands as root on the PON controller.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Cisco - Cisco IOS XR Software**
Affected versions:
- 24.1.1 (Status: affected)
- 24.2.1 (Status: affected)
- 24.1.2 (Status: affected)
- 24.2.11 (Status: affected)
- 24.3.1 (Status: affected)
### References
1. [cisco-sa-iosxr-ponctlr-ci-OHcHmsFL](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26337, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26337
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:14 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47947
- **State**: PUBLISHED
- **Published Date**: December 12, 2024 at 12:38 UTC
- **Last Updated**: December 12, 2024 at 15:25 UTC
- **Reserved Date**: October 07, 2024 at 13:39 UTC
- **Assigned By**: SEC-VLab
### Vulnerability Description
Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The "Edit Disclaimer Text" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL
https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre
The stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Image Access GmbH - Scan2Net**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://r.sec-consult.com/imageaccess)
2. [](https://www.imageaccess.de/?page=SupportPortal&lang=en)
### Credits
- Daniel Hirschberger (SEC Consult Vulnerability Lab)
- Tobias Niemann (SEC Consult Vulnerability Lab) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4898
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via vectors related to Diagnostics and DMZ.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1033877](http://www.securitytracker.com/id/1033877)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45619
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 22:52 UTC
- **Last Updated**: August 30, 2024 at 17:20 UTC
- **Reserved Date**: October 09, 2023 at 16:22 UTC
- **Assigned By**: hpe
### Vulnerability Description
There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; **
Affected versions:
- ArubaOS 10.5.x.x: 10.5.0.0 and below (Status: affected)
- ArubaOS 10.4.x.x: 10.4.0.2 and below (Status: affected)
- InstantOS 8.11.x.x: 8.11.1.2 and below (Status: affected)
- InstantOS 8.10.x.x: 8.10.0.8 and below (Status: affected)
- InstantOS 8.6.x.x: 8.6.0.22 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt)
### Credits
- Chancen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5112
- **State**: PUBLISHED
- **Published Date**: July 28, 2014 at 15:00 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: July 28, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
maint/modules/home/index.php in Fonality trixbox allows remote attackers to execute arbitrary commands via shell metacharacters in the lang parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1030
- **State**: PUBLISHED
- **Published Date**: February 24, 2023 at 19:36 UTC
- **Last Updated**: April 03, 2025 at 08:28 UTC
- **Reserved Date**: February 24, 2023 at 19:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester/code-projects Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**SourceCodester - Online Boat Reservation System**
Affected versions:
- 1.0 (Status: affected)
**code-projects - Online Boat Reservation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-221755 | SourceCodester/code-projects Online Boat Reservation System POST Parameter login.php cross site scripting](https://vuldb.com/?id.221755)
2. [VDB-221755 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.221755)
3. [Submit #94112 | Online Boat Reservation System v1.0 /boat/login.php post parameter 'un' exists xss vulnerability](https://vuldb.com/?submit.94112)
4. [](https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected)
### Credits
- jidle (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0072
- **State**: PUBLISHED
- **Published Date**: February 07, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an IFRAME element that triggers a redirect, a second IFRAME element that does not trigger a redirect, and an eval of a WindowProxy object, aka "Universal XSS (UXSS)."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [62658](http://secunia.com/advisories/62658)
2. [MS15-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018)
3. [1031888](http://www.securitytracker.com/id/1031888)
4. [](http://community.websense.com/blogs/securitylabs/archive/2015/02/05/another-day-another-zero-day-internet-explorer-s-turn-cve-2015-0072.aspx)
5. [](https://nakedsecurity.sophos.com/2015/02/04/internet-explorer-has-a-cross-site-scripting-zero-day-bug/)
6. [](http://www.pcworld.com/article/2879372/dangerous-ie-vulnerability-opens-door-to-powerful-phishing-attacks.html)
7. [](http://innerht.ml/blog/ie-uxss.html)
8. [20150209 Cookie hijacking: Internet Explorer UXSS (CVE-2015-0072)](http://www.securityfocus.com/archive/1/534662/100/0/threaded)
9. [](http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html)
10. [20150131 Major Internet Explorer Vulnerability - NOT Patched](http://seclists.org/fulldisclosure/2015/Feb/0)
11. [ms-ie-cve20150072-xss(100606)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100606)
12. [72489](http://www.securityfocus.com/bid/72489) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4150
- **State**: PUBLISHED
- **Published Date**: December 26, 2022 at 12:28 UTC
- **Last Updated**: April 11, 2025 at 23:16 UTC
- **Reserved Date**: November 28, 2022 at 15:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
### Weakness Classification (CWE)
- CWE-89 SQL Injection: SQL Injection
### Affected Products
**Unknown - Contest Gallery**
Affected versions:
- 0 (Status: affected)
**Unknown - Contest Gallery Pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da)
2. [](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13)
### Credits
- Kunal Sharma (University of Kaiserslautern)
- Daniel Krohmer (Fraunhofer IESE)
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8979
- **State**: PUBLISHED
- **Published Date**: November 15, 2024 at 09:29 UTC
- **Last Updated**: November 15, 2024 at 17:52 UTC
- **Reserved Date**: September 18, 2024 at 16:40 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_lostpassword_user_email_controls' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including usernames and passwords of any user, including Administrators, as long as that user opens the email notification for a password change request and images are not blocked by the email client.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**wpdevteam - Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/34d09086-be33-40cf-b5bf-d6c03cf0b68a?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Login_Register.php#L2440)
3. [](https://plugins.trac.wordpress.org/changeset/3188634/)
### Credits
- wesley |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.