System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-8012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-8012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-8012 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 18:15 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 28, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description lldpd before 0.8.0 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via a malformed packet. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/vincentbernat/lldpd/commit/793526f8884455f43daecd0a2c46772388417a00) 2. [](http://www.openwall.com/lists/oss-security/2015/10/30/2) 3. [](http://www.openwall.com/lists/oss-security/2015/10/18/2) 4. [](https://github.com/vincentbernat/lldpd/commit/9221b5c249f9e4843f77c7f888d5705348d179c0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-51939, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-51939 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-51939 - **State**: PUBLISHED - **Published Date**: November 18, 2024 at 22:18 UTC - **Last Updated**: November 19, 2024 at 14:01 UTC - **Reserved Date**: November 04, 2024 at 09:59 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Santhosh veer Stylish Internal Links allows DOM-Based XSS.This issue affects Stylish Internal Links: from n/a through 1.9. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Santhosh veer - Stylish Internal Links** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/stylish-internal-links/wordpress-stylish-internal-links-plugin-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Zlrqh (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-15665, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-15665 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-15665 - **State**: PUBLISHED - **Published Date**: June 21, 2019 at 14:18 UTC - **Last Updated**: August 05, 2024 at 10:01 UTC - **Reserved Date**: August 21, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.cloudera.com) 2. [](https://www.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-3574, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-3574 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-3574 - **State**: PUBLISHED - **Published Date**: October 06, 2009 at 20:19 UTC - **Last Updated**: August 07, 2024 at 06:31 UTC - **Reserved Date**: October 06, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Tuniac 090517c allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long File1 argument in a .pls playlist file, possibly a buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [9671](http://www.exploit-db.com/exploits/9671)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-6414, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-6414 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-6414 - **State**: PUBLISHED - **Published Date**: March 06, 2009 at 11:00 UTC - **Last Updated**: August 07, 2024 at 11:27 UTC - **Reserved Date**: March 05, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in detail.php in AJ Auction Pro Platinum Skin 2 allows remote attackers to execute arbitrary SQL commands via the item_id parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [31362](http://www.securityfocus.com/bid/31362) 2. [6550](https://www.exploit-db.com/exploits/6550) 3. [ajauctionpro-detail-sql-injection(45399)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45399)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-125012, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-125012 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-125012 - **State**: PUBLISHED - **Published Date**: June 18, 2022 at 06:16 UTC - **Last Updated**: April 15, 2025 at 14:22 UTC - **Reserved Date**: June 17, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is an unknown function of the file libavcodec/dxtroy.c. The manipulation leads to integer coercion error. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L` ### Weakness Classification (CWE) - CWE-192: Security Weakness ### Affected Products **unspecified - FFmpeg** Affected versions: - 2.0 (Status: affected) ### References 1. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=a392bf657015c9a79a5a13adfbfb15086c1943b9) 2. [](https://vuldb.com/?id.12390) ### Credits - Mateusz Jurczyk/Gynvael Coldwind
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-3408, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-3408 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-3408 - **State**: PUBLISHED - **Published Date**: September 24, 2020 at 18:01 UTC - **Last Updated**: November 13, 2024 at 17:55 UTC - **Reserved Date**: December 12, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the Split DNS feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability occurs because the regular expression (regex) engine that is used with the Split DNS feature of affected releases may time out when it processes the DNS name list configuration. An attacker could exploit this vulnerability by trying to resolve an address or hostname that the affected device handles. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. ### Weakness Classification (CWE) - CWE-185: Security Weakness ### Affected Products **Cisco - Cisco IOS** Affected versions: - n/a (Status: affected) ### References 1. [20200924 Cisco IOS and IOS XE Software Split DNS Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-16872, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-16872 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-16872 - **State**: PUBLISHED - **Published Date**: September 11, 2020 at 17:08 UTC - **Last Updated**: August 04, 2024 at 13:45 UTC - **Reserved Date**: August 04, 2020 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.</p> ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:P/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Dynamics 365 (on-premises) version 9.0** Affected versions: - 9.0.0 (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16872)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29439, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29439 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29439 - **State**: PUBLISHED - **Published Date**: June 15, 2022 at 15:31 UTC - **Last Updated**: February 20, 2025 at 20:19 UTC - **Reserved Date**: April 18, 2022 at 00:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Cross-Site Request Forgery (CSRF) vulnerability in Image Slider by NextCode plugin <= 1.1.2 at WordPress allows deleting slides. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L` ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **NextCode - Image Slider by NextCode – Photo & Video SLider (WordPress plugin)** Affected versions: - <= 1.1.2 (Status: affected) ### References 1. [](https://wordpress.org/plugins/baslider/) 2. [](https://patchstack.com/database/vulnerability/baslider/wordpress-image-slider-by-nextcode-plugin-1-1-2-slider-deletion-via-cross-site-request-forgery-csrf-vulnerability) ### Credits - Vulnerability discovered by Ngo Van Thien (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-52975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-52975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-52975 - **State**: PUBLISHED - **Published Date**: March 27, 2025 at 16:43 UTC - **Last Updated**: May 04, 2025 at 07:46 UTC - **Reserved Date**: March 27, 2025 at 16:40 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress Bug report and analysis from Ding Hui. During iSCSI session logout, if another task accesses the shost ipaddress attr, we can get a KASAN UAF report like this: [ 276.942144] BUG: KASAN: use-after-free in _raw_spin_lock_bh+0x78/0xe0 [ 276.942535] Write of size 4 at addr ffff8881053b45b8 by task cat/4088 [ 276.943511] CPU: 2 PID: 4088 Comm: cat Tainted: G E 6.1.0-rc8+ #3 [ 276.943997] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 [ 276.944470] Call Trace: [ 276.944943] <TASK> [ 276.945397] dump_stack_lvl+0x34/0x48 [ 276.945887] print_address_description.constprop.0+0x86/0x1e7 [ 276.946421] print_report+0x36/0x4f [ 276.947358] kasan_report+0xad/0x130 [ 276.948234] kasan_check_range+0x35/0x1c0 [ 276.948674] _raw_spin_lock_bh+0x78/0xe0 [ 276.949989] iscsi_sw_tcp_host_get_param+0xad/0x2e0 [iscsi_tcp] [ 276.951765] show_host_param_ISCSI_HOST_PARAM_IPADDRESS+0xe9/0x130 [scsi_transport_iscsi] [ 276.952185] dev_attr_show+0x3f/0x80 [ 276.953005] sysfs_kf_seq_show+0x1fb/0x3e0 [ 276.953401] seq_read_iter+0x402/0x1020 [ 276.954260] vfs_read+0x532/0x7b0 [ 276.955113] ksys_read+0xed/0x1c0 [ 276.955952] do_syscall_64+0x38/0x90 [ 276.956347] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 276.956769] RIP: 0033:0x7f5d3a679222 [ 276.957161] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 32 c0 0b 00 e8 a5 fe 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 [ 276.958009] RSP: 002b:00007ffc864d16a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 276.958431] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5d3a679222 [ 276.958857] RDX: 0000000000020000 RSI: 00007f5d3a4fe000 RDI: 0000000000000003 [ 276.959281] RBP: 00007f5d3a4fe000 R08: 00000000ffffffff R09: 0000000000000000 [ 276.959682] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000020000 [ 276.960126] R13: 0000000000000003 R14: 0000000000000000 R15: 0000557a26dada58 [ 276.960536] </TASK> [ 276.961357] Allocated by task 2209: [ 276.961756] kasan_save_stack+0x1e/0x40 [ 276.962170] kasan_set_track+0x21/0x30 [ 276.962557] __kasan_kmalloc+0x7e/0x90 [ 276.962923] __kmalloc+0x5b/0x140 [ 276.963308] iscsi_alloc_session+0x28/0x840 [scsi_transport_iscsi] [ 276.963712] iscsi_session_setup+0xda/0xba0 [libiscsi] [ 276.964078] iscsi_sw_tcp_session_create+0x1fd/0x330 [iscsi_tcp] [ 276.964431] iscsi_if_create_session.isra.0+0x50/0x260 [scsi_transport_iscsi] [ 276.964793] iscsi_if_recv_msg+0xc5a/0x2660 [scsi_transport_iscsi] [ 276.965153] iscsi_if_rx+0x198/0x4b0 [scsi_transport_iscsi] [ 276.965546] netlink_unicast+0x4d5/0x7b0 [ 276.965905] netlink_sendmsg+0x78d/0xc30 [ 276.966236] sock_sendmsg+0xe5/0x120 [ 276.966576] ____sys_sendmsg+0x5fe/0x860 [ 276.966923] ___sys_sendmsg+0xe0/0x170 [ 276.967300] __sys_sendmsg+0xc8/0x170 [ 276.967666] do_syscall_64+0x38/0x90 [ 276.968028] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 276.968773] Freed by task 2209: [ 276.969111] kasan_save_stack+0x1e/0x40 [ 276.969449] kasan_set_track+0x21/0x30 [ 276.969789] kasan_save_free_info+0x2a/0x50 [ 276.970146] __kasan_slab_free+0x106/0x190 [ 276.970470] __kmem_cache_free+0x133/0x270 [ 276.970816] device_release+0x98/0x210 [ 276.971145] kobject_cleanup+0x101/0x360 [ 276.971462] iscsi_session_teardown+0x3fb/0x530 [libiscsi] [ 276.971775] iscsi_sw_tcp_session_destroy+0xd8/0x130 [iscsi_tcp] [ 276.972143] iscsi_if_recv_msg+0x1bf1/0x2660 [scsi_transport_iscsi] [ 276.972485] iscsi_if_rx+0x198/0x4b0 [scsi_transport_iscsi] [ 276.972808] netlink_unicast+0x4d5/0x7b0 [ 276.973201] netlink_sendmsg+0x78d/0xc30 [ 276.973544] sock_sendmsg+0xe5/0x120 [ 276.973864] ____sys_sendmsg+0x5fe/0x860 [ 276.974248] ___sys_ ---truncated--- ### Affected Products **Linux - Linux** Affected versions: - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) - 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected) **Linux - Linux** Affected versions: - 5.15.93 (Status: unaffected) - 6.1.11 (Status: unaffected) - 6.2 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1) 2. [](https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b) 3. [](https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-0919, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-0919 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-0919 - **State**: PUBLISHED - **Published Date**: January 26, 2024 at 08:08 UTC - **Last Updated**: October 18, 2024 at 15:02 UTC - **Reserved Date**: January 26, 2024 at 08:01 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It has been classified as critical. This affects the function do_setNTP of the component POST Request Handler. The manipulation of the argument NtpDstStart/NtpDstEnd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252123. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **TRENDnet - TEW-815DAP** Affected versions: - 1.0.2.0 (Status: affected) ### References 1. [](https://vuldb.com/?id.252123) 2. [](https://vuldb.com/?ctiid.252123) 3. [](https://warp-desk-89d.notion.site/TEW-815DAP-94a631c20dee4f399268dbcc880f1f4c?pvs=4) ### Credits - Sonicrr (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-5879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-5879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-5879 - **State**: PUBLISHED - **Published Date**: June 09, 2025 at 13:00 UTC - **Last Updated**: June 09, 2025 at 13:32 UTC - **Reserved Date**: June 08, 2025 at 18:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, was found in WuKongOpenSource WukongCRM 9.0. This affects an unknown part of the file AdminSysConfigController.java of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 3.5/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) - CWE-94: Code Injection ### Affected Products **WuKongOpenSource - WukongCRM** Affected versions: - 9.0 (Status: affected) ### References 1. [VDB-311637 | WuKongOpenSource WukongCRM File Upload AdminSysConfigController.java cross site scripting](https://vuldb.com/?id.311637) 2. [VDB-311637 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311637) 3. [Submit #587201 | WukongSoftware WukongCRM-9.0-JAVA v9.0 Unrestricted Upload](https://vuldb.com/?submit.587201) 4. [](https://github.com/Aiyakami/CVE-1/issues/7) ### Credits - aiyakami (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33305, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33305 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33305 - **State**: PUBLISHED - **Published Date**: May 02, 2024 at 00:00 UTC - **Last Updated**: March 26, 2025 at 13:44 UTC - **Reserved Date**: April 23, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SourceCodester Laboratory Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via "Middle Name" parameter in Create User. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-18354, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-18354 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-18354 - **State**: PUBLISHED - **Published Date**: December 17, 2018 at 06:00 UTC - **Last Updated**: August 05, 2024 at 21:20 UTC - **Reserved Date**: December 17, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://bugs.chromium.org/p/chromium/issues/detail?id=759111) 2. [](https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e) 3. [](https://github.com/GoogleChrome/rendertron/pull/88)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-30467, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-30467 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-30467 - **State**: PUBLISHED - **Published Date**: April 28, 2023 at 10:12 UTC - **Last Updated**: January 30, 2025 at 17:13 UTC - **Reserved Date**: April 10, 2023 at 10:20 UTC - **Assigned By**: CERT-In ### Vulnerability Description This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to improper authorization at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device. Successful exploitation of this vulnerability could allow remote attacker to perform unauthorized activities on the targeted device. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Milesight - NVR MS-Nxxxx-xxG** Affected versions: - 77.X (Status: affected) **Milesight - NVR MS-Nxxxx-xxE** Affected versions: - 75.X (Status: affected) **Milesight - NVR MS-Nxxxx-xxT** Affected versions: - 72.X (Status: affected) **Milesight - NVR MS-Nxxxx-xxH ** Affected versions: - 71.X (Status: affected) **Milesight - NVR MS-Nxxxx-xxC** Affected versions: - 73.X (Status: affected) ### References 1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0121) ### Credits - This vulnerability is reported by Souvik Kandar and Arko Dhar from Redinent Innovations Engineering & Research Team, Karnataka, India.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-7204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-7204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-7204 - **State**: PUBLISHED - **Published Date**: March 21, 2017 at 06:21 UTC - **Last Updated**: August 05, 2024 at 15:56 UTC - **Reserved Date**: March 21, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A Cross-Site Scripting (XSS) was discovered in imdbphp 5.1.1. The vulnerability exists due to insufficient filtration of user-supplied data (name) passed to the "imdbphp-master/demo/search.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [97002](http://www.securityfocus.com/bid/97002) 2. [](https://github.com/tboothman/imdbphp/issues/88)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-2364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-2364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-2364 - **State**: PUBLISHED - **Published Date**: June 20, 2016 at 01:00 UTC - **Last Updated**: August 05, 2024 at 23:24 UTC - **Reserved Date**: February 12, 2016 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Chrome HUDweb plugin before 2016-05-05 for Fonality (previously trixbox Pro) 12.6 through 14.1i uses the same hardcoded private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#754056](http://www.kb.cert.org/vuls/id/754056)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-29317, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-29317 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-29317 - **State**: PUBLISHED - **Published Date**: May 11, 2022 at 12:58 UTC - **Last Updated**: August 03, 2024 at 06:17 UTC - **Reserved Date**: April 16, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Simple Bus Ticket Booking System v1.0 was discovered to contain multiple SQL injection vulnerbilities via the username and password parameters at /assets/partials/_handleLogin.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hackmd.io/%40taidh/r1FCJ1ME5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-5239, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-5239 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-5239 - **State**: PUBLISHED - **Published Date**: March 27, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 14:55 UTC - **Reserved Date**: January 09, 2017 at 00:00 UTC - **Assigned By**: rapid7 ### Vulnerability Description Due to a lack of standard encryption when transmitting sensitive information over the internet to a centralized monitoring service, the Eview EV-07S GPS Tracker discloses personally identifying information, such as GPS data and IMEI numbers, to any man-in-the-middle (MitM) listener. ### Affected Products **Eview - EV-07S GPS Tracker** Affected versions: - All (Status: affected) ### References 1. [](https://community.rapid7.com/community/infosec/blog/2017/03/27/r7-2015-28-multiple-eview-ev-07s-gps-tracker-vulnerabilities) 2. [97194](http://www.securityfocus.com/bid/97194)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-4307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-4307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-4307 - **State**: PUBLISHED - **Published Date**: January 13, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 10:08 UTC - **Reserved Date**: September 29, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [34962](http://secunia.com/advisories/34962) 2. [[oss-security] 20090113 CVE-2008-4307 kernel: local denial of service in locks_remove_flock](http://openwall.com/lists/oss-security/2009/01/13/1) 3. [37471](http://secunia.com/advisories/37471) 4. [RHSA-2009:0459](http://rhn.redhat.com/errata/RHSA-2009-0459.html) 5. [oval:org.mitre.oval:def:7728](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728) 6. [](http://www.vmware.com/security/advisories/VMSA-2009-0016.html) 7. [DSA-1794](http://www.debian.org/security/2009/dsa-1794) 8. [](http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc) 9. [USN-751-1](http://www.ubuntu.com/usn/usn-751-1) 10. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26) 11. [35015](http://secunia.com/advisories/35015) 12. [35011](http://secunia.com/advisories/35011) 13. [20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components](http://www.securityfocus.com/archive/1/507985/100/0/threaded) 14. [](https://bugzilla.redhat.com/show_bug.cgi?id=456282) 15. [oval:org.mitre.oval:def:9233](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233) 16. [34981](http://secunia.com/advisories/34981) 17. [34917](http://secunia.com/advisories/34917) 18. [DSA-1787](http://www.debian.org/security/2009/dsa-1787) 19. [RHSA-2009:0473](http://rhn.redhat.com/errata/RHSA-2009-0473.html) 20. [RHSA-2009:0451](http://www.redhat.com/support/errata/RHSA-2009-0451.html) 21. [ADV-2009-3316](http://www.vupen.com/english/advisories/2009/3316)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-0359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-0359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-0359 - **State**: PUBLISHED - **Published Date**: July 03, 2016 at 21:00 UTC - **Last Updated**: August 05, 2024 at 22:15 UTC - **Reserved Date**: December 08, 2015 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description CRLF injection vulnerability in IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.43, 8.0 before 8.0.0.13, 8.5 Full before 8.5.5.10, and 8.5 Liberty before Liberty Fix Pack 16.0.0.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [91484](http://www.securityfocus.com/bid/91484) 2. [PI58918](http://www-01.ibm.com/support/docview.wss?uid=swg1PI58918) 3. [1036184](http://www.securitytracker.com/id/1036184) 4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21982526)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-0754, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-0754 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-0754 - **State**: PUBLISHED - **Published Date**: September 06, 2003 at 04:00 UTC - **Last Updated**: September 16, 2024 at 17:23 UTC - **Reserved Date**: September 04, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description nphpd.php in newsPHP 216 and earlier allows remote attackers to bypass authentication via an HTTP request with a modified nphp_users array, which is used for authentication. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20030824 newsPHP file inclusion & bad login validation](http://archives.neohapsis.com/archives/bugtraq/2003-08/0345.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-1267, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-1267 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-1267 - **State**: PUBLISHED - **Published Date**: April 13, 2009 at 16:00 UTC - **Last Updated**: August 07, 2024 at 05:04 UTC - **Reserved Date**: April 08, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.wireshark.org/security/wnpa-sec-2009-02.html) 2. [1022027](http://www.securitytracker.com/id?1022027) 3. [wireshark-ldap-home-dos(49814)](https://exchange.xforce.ibmcloud.com/vulnerabilities/49814) 4. [34778](http://secunia.com/advisories/34778) 5. [SUSE-SR:2009:011](http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html) 6. [20090417 rPSA-2009-0062-1 tshark wireshark](http://www.securityfocus.com/archive/1/502745/100/0/threaded) 7. [34457](http://www.securityfocus.com/bid/34457) 8. [35416](http://secunia.com/advisories/35416) 9. [](http://wiki.rpath.com/Advisories:rPSA-2009-0062) 10. [oval:org.mitre.oval:def:6099](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6099)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-31416, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-31416 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-31416 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 16:48 UTC - **Last Updated**: September 13, 2024 at 17:31 UTC - **Reserved Date**: April 03, 2024 at 11:17 UTC - **Assigned By**: Eaton ### Vulnerability Description The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow. ### CVSS Metrics - **CVSS Base Score**: 5.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L` ### Weakness Classification (CWE) - CWE-1284: Security Weakness ### Affected Products **Eaton - Foreseer** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf) ### Credits - Microsoft
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49916 - **State**: PUBLISHED - **Published Date**: May 01, 2025 at 14:10 UTC - **Last Updated**: May 04, 2025 at 12:45 UTC - **Reserved Date**: May 01, 2025 at 14:05 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: rose: Fix NULL pointer dereference in rose_send_frame() The syzkaller reported an issue: KASAN: null-ptr-deref in range [0x0000000000000380-0x0000000000000387] CPU: 0 PID: 4069 Comm: kworker/0:15 Not tainted 6.0.0-syzkaller-02734-g0326074ff465 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Workqueue: rcu_gp srcu_invoke_callbacks RIP: 0010:rose_send_frame+0x1dd/0x2f0 net/rose/rose_link.c:101 Call Trace: <IRQ> rose_transmit_clear_request+0x1d5/0x290 net/rose/rose_link.c:255 rose_rx_call_request+0x4c0/0x1bc0 net/rose/af_rose.c:1009 rose_loopback_timer+0x19e/0x590 net/rose/rose_loopback.c:111 call_timer_fn+0x1a0/0x6b0 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers.part.0+0x674/0xa80 kernel/time/timer.c:1790 __run_timers kernel/time/timer.c:1768 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803 __do_softirq+0x1d0/0x9c8 kernel/softirq.c:571 [...] </IRQ> It triggers NULL pointer dereference when 'neigh->dev->dev_addr' is called in the rose_send_frame(). It's the first occurrence of the `neigh` is in rose_loopback_timer() as `rose_loopback_neigh', and the 'dev' in 'rose_loopback_neigh' is initialized sa nullptr. It had been fixed by commit 3b3fd068c56e3fbea30090859216a368398e39bf ("rose: Fix Null pointer dereference in rose_send_frame()") ever. But it's introduced by commit 3c53cd65dece47dd1f9d3a809f32e59d1d87b2b8 ("rose: check NULL rose_loopback_neigh->loopback") again. We fix it by add NULL check in rose_transmit_clear_request(). When the 'dev' in 'neigh' is NULL, we don't reply the request and just clear it. syzkaller don't provide repro, and I provide a syz repro like: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f00000000c0)=@full={0xb, @dev, @null, 0x0, [@null, @null, @netrom, @netrom, @default, @null]}, 0x40) connect$rose(r1, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ### Affected Products **Linux - Linux** Affected versions: - 76885373129b13df35ecc9b4ee86ea5840f12133 (Status: affected) - b8f9de195d6303f52bae16c7911f35ac14ba7e3d (Status: affected) - 0aae33feb7a56b28318f92c960a3d08d9c305984 (Status: affected) - 6e4b20d548fc97ecbdca15c8d96302ee5e3e6313 (Status: affected) - de3deadd11987070788b48825bec4647458b988d (Status: affected) - 9cf85759e104d7e9c3fd8920a554195b715d6797 (Status: affected) - 3c53cd65dece47dd1f9d3a809f32e59d1d87b2b8 (Status: affected) - 3c53cd65dece47dd1f9d3a809f32e59d1d87b2b8 (Status: affected) - 9197ca40fd9de265caedba70d0cb5814c4e45952 (Status: affected) **Linux - Linux** Affected versions: - 6.0 (Status: affected) - 0 (Status: unaffected) - 4.9.333 (Status: unaffected) - 4.14.299 (Status: unaffected) - 4.19.265 (Status: unaffected) - 5.4.224 (Status: unaffected) - 5.10.154 (Status: unaffected) - 5.15.78 (Status: unaffected) - 6.0.8 (Status: unaffected) - 6.1 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/01b9c68c121847d05a4ccef68244dadf82bfa331) 2. [](https://git.kernel.org/stable/c/bbc03d74e641e824754443b908454ca9e203773e) 3. [](https://git.kernel.org/stable/c/5b46adfbee1e429f33b10a88d6c00fa88f3d6c77) 4. [](https://git.kernel.org/stable/c/b13be5e852b03f376058027e462fad4230240891) 5. [](https://git.kernel.org/stable/c/f06186e5271b980bac03f5c97276ed0146ddc9b0) 6. [](https://git.kernel.org/stable/c/3e2129c67daca21043a26575108f6286c85e71f6) 7. [](https://git.kernel.org/stable/c/a601e5eded33bb88b8a42743db8fef3ad41dd97e) 8. [](https://git.kernel.org/stable/c/e97c089d7a49f67027395ddf70bf327eeac2611e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-2892, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-2892 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-2892 - **State**: PUBLISHED - **Published Date**: May 19, 2025 at 04:21 UTC - **Last Updated**: May 19, 2025 at 13:45 UTC - **Reserved Date**: March 27, 2025 at 23:17 UTC - **Assigned By**: Wordfence ### Vulnerability Description The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post Meta Description and Canonical URL parameters in all versions up to, and including, 4.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **smub - All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7fd5d31d-a4f3-458a-b457-f20aeaa71749?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/3289874/) ### Credits - Ivan Kuzymchak
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-1583, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-1583 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-1583 - **State**: PUBLISHED - **Published Date**: August 25, 2021 at 19:10 UTC - **Last Updated**: November 07, 2024 at 22:02 UTC - **Reserved Date**: November 13, 2020 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker with Administrator privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to read arbitrary files on the file system of the affected device. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N` ### Weakness Classification (CWE) - CWE-284: Security Weakness ### Affected Products **Cisco - Cisco NX-OS System Software in ACI Mode** Affected versions: - n/a (Status: affected) ### References 1. [20210825 Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-naci-afr-UtjfO2D7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11899 - **State**: PUBLISHED - **Published Date**: June 17, 2020 at 10:27 UTC - **Last Updated**: February 04, 2025 at 19:54 UTC - **Reserved Date**: April 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cwe.mitre.org/data/definitions/125.html) 2. [](https://www.kb.cert.org/vuls/id/257161/) 3. [](https://www.treck.com) 4. [](https://jsof-tech.com/vulnerability-disclosure-policy/) 5. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html) 6. [VU#257161](https://www.kb.cert.org/vuls/id/257161) 7. [](https://www.jsof-tech.com/ripple20/) 8. [20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC) 9. [](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt) 10. [](https://security.netapp.com/advisory/ntap-20200625-0006/) 11. [](https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17176, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17176 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17176 - **State**: PUBLISHED - **Published Date**: September 18, 2018 at 18:00 UTC - **Last Updated**: September 16, 2024 at 20:43 UTC - **Reserved Date**: September 18, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://media.ccc.de/v/2018-124-pinky-brain-are-taking-over-the-world-with-vacuum-cleaners)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-6509, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-6509 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-6509 - **State**: PUBLISHED - **Published Date**: January 22, 2019 at 16:00 UTC - **Last Updated**: August 04, 2024 at 20:23 UTC - **Reserved Date**: January 22, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in creditease-sec insight through 2018-09-11. depart_delete in srcpm/app/admin/views.py allows CSRF. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/creditease-sec/insight/issues/42)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-3118, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-3118 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-3118 - **State**: PUBLISHED - **Published Date**: March 31, 2024 at 04:31 UTC - **Last Updated**: August 01, 2024 at 19:32 UTC - **Reserved Date**: March 30, 2024 at 06:36 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, has been found in Dreamer CMS up to 4.1.3. This issue affects some unknown processing of the component Attachment Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258779. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-275: Security Weakness ### Affected Products **Dreamer - CMS** Affected versions: - 4.1.0 (Status: affected) - 4.1.1 (Status: affected) - 4.1.2 (Status: affected) - 4.1.3 (Status: affected) ### References 1. [VDB-258779 | Dreamer CMS Attachment permission](https://vuldb.com/?id.258779) 2. [VDB-258779 | CTI Indicators (IOB, IOC, TTP)](https://vuldb.com/?ctiid.258779) 3. [Submit #303196 | Junnan Wang and his team Dreamer CMS 4.1.3 Common users have administrator rights](https://vuldb.com/?submit.303196) 4. [](https://github.com/sweatxi/BugHub/blob/main/dreamer_Excessive_authority.pdf) ### Credits - hexixi (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2557, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2557 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2557 - **State**: PUBLISHED - **Published Date**: May 09, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 13:42 UTC - **Reserved Date**: May 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description MOStlyDB Admin in Mambo 4.6.1 does not properly check privileges, which allows remote authenticated administrators to have an unknown impact via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25039](http://secunia.com/advisories/25039) 2. [35540](http://osvdb.org/35540)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15073, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15073 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15073 - **State**: PUBLISHED - **Published Date**: July 08, 2020 at 19:22 UTC - **Last Updated**: August 04, 2024 at 13:08 UTC - **Reserved Date**: June 25, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.phplist.org/newslist/phplist-3-5-5-release-notes/) 2. [](https://discuss.phplist.org/t/phplist-3-5-5-has-been-released/6377) 3. [](https://blog.telspace.co.za/2020/07/phplist-cve-2020-15072-cve-2020-15073.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-35334, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-35334 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-35334 - **State**: REJECTED - **Published Date**: July 11, 2022 at 19:33 UTC - **Last Updated**: July 11, 2022 at 19:33 UTC - **Reserved Date**: July 07, 2022 at 00:00 UTC - **Assigned By**: sap ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-6391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-6391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-6391 - **State**: PUBLISHED - **Published Date**: January 29, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 01:51 UTC - **Reserved Date**: January 29, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site request forgery web vulnerability has been discovered on Netis WF2419 V2.2.36123 devices. A remote attacker is able to delete Address Reservation List settings. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://packetstormsecurity.com/files/146117/netiswf2419-xsrf.txt) 2. [43919](https://www.exploit-db.com/exploits/43919/) 3. [](https://0day.today/exploit/29659)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-10618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-10618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-10618 - **State**: PUBLISHED - **Published Date**: December 12, 2019 at 08:30 UTC - **Last Updated**: August 04, 2024 at 22:31 UTC - **Reserved Date**: March 29, 2019 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description Driver may access an invalid address while processing IO control due to lack of check of address validation in Snapdragon Connectivity in QCA6390 ### Affected Products **Qualcomm, Inc. - Snapdragon Connectivity** Affected versions: - QCA6390 (Status: affected) ### References 1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2019-bulletin)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-48604, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-48604 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-48604 - **State**: PUBLISHED - **Published Date**: August 09, 2023 at 18:35 UTC - **Last Updated**: October 10, 2024 at 12:48 UTC - **Reserved Date**: August 09, 2023 at 16:58 UTC - **Assigned By**: Securifera ### Vulnerability Description A SQL injection vulnerability exists in the “logging export” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **ScienceLogic - SL 1** Affected versions: - 11.1.2 (Status: affected) ### References 1. [](https://www.securifera.com/advisories/cve-2022-48604/) ### Credits - Ryan Wincey @rwincey @Securifera
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40997 - **State**: PUBLISHED - **Published Date**: October 15, 2021 at 14:11 UTC - **Last Updated**: August 04, 2024 at 02:59 UTC - **Reserved Date**: September 13, 2021 at 00:00 UTC - **Assigned By**: hpe ### Vulnerability Description A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. ### Affected Products **n/a - Aruba ClearPass Policy Manager** Affected versions: - ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1 (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27453 - **State**: PUBLISHED - **Published Date**: December 21, 2021 at 17:55 UTC - **Last Updated**: September 17, 2024 at 02:58 UTC - **Reserved Date**: February 19, 2021 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-288: Security Weakness ### Affected Products **Mesa Labs - AmegaView** Affected versions: - unspecified (Status: affected) ### References 1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-147-03) ### Credits - Stephen Yackey of Securifera reported these vulnerabilities to CISA.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-37309, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-37309 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-37309 - **State**: PUBLISHED - **Published Date**: December 26, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 14:42 UTC - **Reserved Date**: August 01, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://open-xchange.com) 2. [](https://seclists.org/fulldisclosure/2022/Nov/18)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-12625, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-12625 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-12625 - **State**: PUBLISHED - **Published Date**: November 05, 2019 at 18:15 UTC - **Last Updated**: November 19, 2024 at 18:52 UTC - **Reserved Date**: June 04, 2019 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **Cisco - ClamAV** Affected versions: - unspecified (Status: affected) ### References 1. [](https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html) 2. [openSUSE-SU-2019:2595](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html) 3. [openSUSE-SU-2019:2597](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-5292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-5292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-5292 - **State**: PUBLISHED - **Published Date**: October 09, 2007 at 18:00 UTC - **Last Updated**: August 07, 2024 at 15:24 UTC - **Reserved Date**: October 09, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in photos.cfm in Directory Image Gallery 1.1 allows remote attackers to inject arbitrary web script or HTML via the backwardDirectory parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [38629](http://osvdb.org/38629) 2. [directoryimage-photos-xss(36986)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36986) 3. [](http://pridels-team.blogspot.com/2007/10/directory-image-gallery-xss-vuln.html) 4. [ADV-2007-3425](http://www.vupen.com/english/advisories/2007/3425)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-50105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-50105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-50105 - **State**: PUBLISHED - **Published Date**: November 05, 2024 at 17:10 UTC - **Last Updated**: May 04, 2025 at 09:46 UTC - **Reserved Date**: October 21, 2024 at 19:36 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc Commit 15c7fab0e047 ("ASoC: qcom: Move Soundwire runtime stream alloc to soundcards") moved the allocation of Soundwire stream runtime from the Qualcomm Soundwire driver to each individual machine sound card driver, except that it forgot to update SC7280 card. Just like for other Qualcomm sound cards using Soundwire, the card driver should allocate and release the runtime. Otherwise sound playback will result in a NULL pointer dereference or other effect of uninitialized memory accesses (which was confirmed on SDM845 having similar issue). ### Affected Products **Linux - Linux** Affected versions: - 15c7fab0e0477d7d7185eac574ca43c15b59b015 (Status: affected) - 15c7fab0e0477d7d7185eac574ca43c15b59b015 (Status: affected) **Linux - Linux** Affected versions: - 6.8 (Status: affected) - 0 (Status: unaffected) - 6.11.6 (Status: unaffected) - 6.12 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/176a41ebec42a921277cd34e8c0c2e776a9dd6c4) 2. [](https://git.kernel.org/stable/c/db7e59e6a39a4d3d54ca8197c796557e6d480b0d)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-20396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-20396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-20396 - **State**: PUBLISHED - **Published Date**: June 11, 2021 at 14:25 UTC - **Last Updated**: September 17, 2024 at 01:22 UTC - **Reserved Date**: December 17, 2020 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM QRadar Analyst Workflow App 1.0 through 1.18.0 for IBM QRadar SIEM allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 196009. ### Affected Products **IBM - QRadar Analyst Workflow** Affected versions: - 1.0 (Status: affected) - 1.18.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6462585) 2. [ibm-qradar-cve202120396-info-disc (196009)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1125, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1125 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1125 - **State**: PUBLISHED - **Published Date**: March 09, 2024 at 07:01 UTC - **Last Updated**: August 01, 2024 at 18:26 UTC - **Reserved Date**: January 31, 2024 at 14:11 UTC - **Assigned By**: Wordfence ### Vulnerability Description The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the calendar_events_delete() function in all versions up to, and including, 3.4.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary posts. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L` ### Affected Products **metagauss - EventPrime – Events Calendar, Bookings and Tickets** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b5278afb-9db3-4b1d-bb2f-e6595f0ac6dc?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=) ### Credits - Lucio Sá
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-0167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-0167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-0167 - **State**: PUBLISHED - **Published Date**: May 09, 2012 at 00:00 UTC - **Last Updated**: August 06, 2024 at 18:16 UTC - **Reserved Date**: December 13, 2011 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Heap-based buffer overflow in the Office GDI+ library in Microsoft Office 2003 SP3 and 2007 SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted EMF image in an Office document, aka "GDI+ Heap Overflow Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [49121](http://secunia.com/advisories/49121) 2. [53351](http://www.securityfocus.com/bid/53351) 3. [oval:org.mitre.oval:def:15628](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15628) 4. [windows-gdi-emf-bo(75126)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75126) 5. [MS12-034](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034) 6. [1027038](http://www.securitytracker.com/id?1027038) 7. [TA12-129A](http://www.us-cert.gov/cas/techalerts/TA12-129A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1454, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1454 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1454 - **State**: PUBLISHED - **Published Date**: June 05, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 20:52 UTC - **Reserved Date**: December 13, 2017 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM InfoSphere Information Server 11.3, 11.5, and 11.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 140089. ### Affected Products **IBM - InfoSphere Information Server** Affected versions: - 11.3 (Status: affected) - 11.5 (Status: affected) - 11.7 (Status: affected) ### References 1. [1041038](http://www.securitytracker.com/id/1041038) 2. [ibm-infosphere-cve20181454-info-disc(140089)](https://exchange.xforce.ibmcloud.com/vulnerabilities/140089) 3. [](http://www.ibm.com/support/docview.wss?uid=swg22015222)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-2502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-2502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-2502 - **State**: PUBLISHED - **Published Date**: October 25, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 01:29 UTC - **Reserved Date**: October 25, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description im-switch before 11.4-46.1 in Fedora Core 2 allows local users to overwrite arbitrary files via a symlink attack on the imswitcher[PID] temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [fedora-imswitch-symlink(16682)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16682) 2. [10717](http://www.securityfocus.com/bid/10717) 3. [](http://packetstormsecurity.org/0407-advisories/fedora_im-switch_tempfile_race.txt) 4. [12037](http://secunia.com/advisories/12037) 5. [](http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126940) 6. [7772](http://www.osvdb.org/7772)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-23879, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-23879 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-23879 - **State**: PUBLISHED - **Published Date**: March 03, 2025 at 13:30 UTC - **Last Updated**: May 12, 2025 at 15:27 UTC - **Reserved Date**: January 16, 2025 at 11:31 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PillarDev Easy Automatic Newsletter Lite allows Reflected XSS. This issue affects Easy Automatic Newsletter Lite: from n/a through 3.2.0. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **PillarDev - Easy Automatic Newsletter Lite** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/easy-automatic-newsletter/vulnerability/wordpress-easy-automatic-newsletter-lite-plugin-3-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11876, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11876 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11876 - **State**: PUBLISHED - **Published Date**: November 15, 2017 at 03:00 UTC - **Last Updated**: September 17, 2024 at 00:26 UTC - **Reserved Date**: July 31, 2017 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Project Server and Microsoft SharePoint Enterprise Server 2016 allow an attacker to use cross-site forgery to read content that they are not authorized to read, use the victim's identity to take actions on the web application on behalf of the victim, such as change permissions and delete content, and inject malicious content in the browser of the victim, aka "Microsoft Project Server Elevation of Privilege Vulnerability". ### Affected Products **Microsoft Corporation - Microsoft Server** Affected versions: - Microsoft Project Server 2013, Microsoft SharePoint Enterprise Server 2016 (Status: affected) ### References 1. [1039789](http://www.securitytracker.com/id/1039789) 2. [1039788](http://www.securitytracker.com/id/1039788) 3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11876) 4. [101754](http://www.securityfocus.com/bid/101754)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-9064, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-9064 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-9064 - **State**: PUBLISHED - **Published Date**: July 30, 2018 at 15:00 UTC - **Last Updated**: September 16, 2024 at 19:04 UTC - **Reserved Date**: March 27, 2018 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user may abuse a web API debug call to retrieve the credentials for the System Manager user. ### Affected Products **Lenovo Group Ltd. - Lenovo xClarity Administrator** Affected versions: - Earlier than 2.1.0 (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/solutions/LEN-22168)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20835 - **State**: PUBLISHED - **Published Date**: November 10, 2022 at 17:39 UTC - **Last Updated**: August 03, 2024 at 02:24 UTC - **Reserved Date**: November 02, 2021 at 13:28 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. ### CVSS Metrics - **CVSS Base Score**: 4.8/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Cisco - Cisco Firepower Management Center** Affected versions: - 7.1.0 (Status: affected) - 7.1.0.1 (Status: affected) - 7.1.0.2 (Status: affected) - 7.1.0.3 (Status: affected) ### References 1. [cisco-sa-fmc-xss-LATZYzxs](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-LATZYzxs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9515, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9515 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9515 - **State**: PUBLISHED - **Published Date**: October 04, 2024 at 14:00 UTC - **Last Updated**: October 04, 2024 at 14:46 UTC - **Reserved Date**: October 04, 2024 at 06:45 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. This affects the function formSetQoS of the file /goform/formSetQoS. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### CVSS Metrics - **CVSS Base Score**: 8.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-120: Security Weakness ### Affected Products **D-Link - DIR-605L** Affected versions: - 2.13B01 BETA (Status: affected) ### References 1. [VDB-279213 | D-Link DIR-605L formSetQoS buffer overflow](https://vuldb.com/?id.279213) 2. [VDB-279213 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.279213) 3. [Submit #413878 | D-Link DIR-605L 2.13B01 BETA Buffer Overflow](https://vuldb.com/?submit.413878) 4. [](https://github.com/noahze01/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetQoS.md) 5. [](https://www.dlink.com/) ### Credits - noahze (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-2797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-2797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-2797 - **State**: PUBLISHED - **Published Date**: October 08, 2010 at 20:00 UTC - **Last Updated**: September 17, 2024 at 02:53 UTC - **Reserved Date**: July 22, 2010 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Directory traversal vulnerability in lib/translation.functions.php in CMS Made Simple before 1.8.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the default_cms_lang parameter to an admin script, as demonstrated by admin/addbookmark.php, a different vulnerability than CVE-2008-5642. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.cmsmadesimple.org/2010/07/3/announcing-cms-made-simple-1-8-1-mankara/) 2. [[oss-security] 20100802 CVE request: cmsmadesimple < 1.8.1](http://www.openwall.com/lists/oss-security/2010/08/01/2) 3. [40031](http://secunia.com/advisories/40031) 4. [](http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html) 5. [[oss-security] 20100802 Re: CVE request: cmsmadesimple < 1.8.1](http://www.openwall.com/lists/oss-security/2010/08/02/8)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-26049, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-26049 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-26049 - **State**: PUBLISHED - **Published Date**: April 18, 2023 at 20:35 UTC - **Last Updated**: February 13, 2025 at 16:44 UTC - **Reserved Date**: February 17, 2023 at 22:44 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **eclipse - jetty.project** Affected versions: - < 9.4.51 (Status: affected) - >= 10.0.0, < 10.0.14 (Status: affected) - >= 11.0.0, < 11.0.14 (Status: affected) - >= 12.0.0.alpha0, < 12.0.0.beta0 (Status: affected) ### References 1. [https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c](https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c) 2. [https://github.com/eclipse/jetty.project/pull/9339](https://github.com/eclipse/jetty.project/pull/9339) 3. [https://github.com/eclipse/jetty.project/pull/9352](https://github.com/eclipse/jetty.project/pull/9352) 4. [https://www.rfc-editor.org/rfc/rfc2965](https://www.rfc-editor.org/rfc/rfc2965) 5. [https://www.rfc-editor.org/rfc/rfc6265](https://www.rfc-editor.org/rfc/rfc6265) 6. [](https://security.netapp.com/advisory/ntap-20230526-0001/) 7. [](https://www.debian.org/security/2023/dsa-5507) 8. [](https://lists.debian.org/debian-lts-announce/2023/09/msg00039.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-36713, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-36713 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-36713 - **State**: PUBLISHED - **Published Date**: June 07, 2023 at 01:51 UTC - **Last Updated**: December 28, 2024 at 00:55 UTC - **Reserved Date**: June 06, 2023 at 12:58 UTC - **Assigned By**: Wordfence ### Vulnerability Description The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account. ### CVSS Metrics - **CVSS Base Score**: 9.8/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **inspireui - MStore API** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve) 2. [](https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/) 3. [](https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/) ### Credits - Jerome Bruandet
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-22808, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-22808 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-22808 - **State**: PUBLISHED - **Published Date**: February 09, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 03:21 UTC - **Reserved Date**: January 07, 2022 at 00:00 UTC - **Assigned By**: schneider ### Vulnerability Description A CWE-352: Cross-Site Request Forgery (CSRF) exists that could cause a remote attacker to gain unauthorized access to the product when conducting cross-domain attacks based on same-origin policy or cross-site request forgery protections bypass. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13) ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **n/a - EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13)** Affected versions: - EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13) (Status: affected) ### References 1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8839, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8839 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8839 - **State**: PUBLISHED - **Published Date**: February 12, 2020 at 14:42 UTC - **Last Updated**: August 04, 2024 at 10:12 UTC - **Reserved Date**: February 10, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stored XSS was discovered on CHIYU BF-430 232/485 TCP/IP Converter devices before 1.16.00, as demonstrated by the /if.cgi TF_submask field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://drive.google.com/open?id=1eDN0rsGPs4-yxeMxl7MGh__yjdbl-wON) 2. [](http://packetstormsecurity.com/files/156289/CHIYU-BF430-TCP-IP-Converter-Cross-Site-Scripting.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-0132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-0132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-0132 - **State**: PUBLISHED - **Published Date**: March 03, 2011 at 19:00 UTC - **Last Updated**: August 06, 2024 at 21:43 UTC - **Reserved Date**: December 23, 2010 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description Use-after-free vulnerability in the Runin box functionality in the Cascading Style Sheets (CSS) 2.1 Visual Formatting Model implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.apple.com/kb/HT4564) 2. [](http://www.zerodayinitiative.com/advisories/ZDI-11-098) 3. [](http://support.apple.com/kb/HT4566) 4. [APPLE-SA-2011-03-02-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html) 5. [APPLE-SA-2011-03-09-1](http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html) 6. [](http://support.apple.com/kb/HT4554) 7. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27038, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27038 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27038 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 12:53 UTC - **Last Updated**: May 04, 2025 at 09:02 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: clk: Fix clk_core_get NULL dereference It is possible for clk_core_get to dereference a NULL in the following sequence: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() can return NULL which is dereferenced by clk_core_get() at hw->core. Prior to commit dde4eff47c82 ("clk: Look for parents with clkdev based clk_lookups") the check IS_ERR_OR_NULL() was performed which would have caught the NULL. Reading the description of this function it talks about returning NULL but that cannot be so at the moment. Update the function to check for hw before dereferencing it and return NULL if hw is NULL. ### Affected Products **Linux - Linux** Affected versions: - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) - dde4eff47c82c52a72af333d9e55370eee6d95d6 (Status: affected) **Linux - Linux** Affected versions: - 5.2 (Status: affected) - 0 (Status: unaffected) - 5.4.273 (Status: unaffected) - 5.10.214 (Status: unaffected) - 5.15.153 (Status: unaffected) - 6.1.83 (Status: unaffected) - 6.6.23 (Status: unaffected) - 6.7.11 (Status: unaffected) - 6.8.2 (Status: unaffected) - 6.9 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07) 2. [](https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185) 3. [](https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2) 4. [](https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959) 5. [](https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed) 6. [](https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6) 7. [](https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51) 8. [](https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-15037, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-15037 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-15037 - **State**: PUBLISHED - **Published Date**: January 21, 2024 at 05:00 UTC - **Last Updated**: September 12, 2024 at 18:33 UTC - **Reserved Date**: January 19, 2024 at 14:11 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as problematic, has been found in go4rayyan Scumblr up to 2.0.1a. Affected by this issue is some unknown functionality of the component Task Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.2 is able to address this issue. The patch is identified as 5c9120f2362ddb7cbe48f2c4620715adddc4ee35. It is recommended to upgrade the affected component. VDB-251570 is the identifier assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 2.4/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **go4rayyan - Scumblr** Affected versions: - 2.0.1a (Status: affected) ### References 1. [](https://vuldb.com/?id.251570) 2. [](https://vuldb.com/?ctiid.251570) 3. [](https://github.com/go4rayyan/CG1/commit/5c9120f2362ddb7cbe48f2c4620715adddc4ee35) 4. [](https://github.com/go4rayyan/CG1/releases/tag/v2.0.2) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-5052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-5052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-5052 - **State**: PUBLISHED - **Published Date**: November 23, 2011 at 01:00 UTC - **Last Updated**: August 07, 2024 at 04:09 UTC - **Reserved Date**: November 22, 2011 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in admin/components.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the val[] parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20100525 XSS vulnerability in GetSimple CMS](http://www.securityfocus.com/archive/1/511458/100/0/threaded) 2. [](http://www.htbridge.ch/advisory/xss_vulnerability_in_getsimple_cms.html) 3. [40374](http://www.securityfocus.com/bid/40374)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21844, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21844 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21844 - **State**: PUBLISHED - **Published Date**: March 12, 2025 at 09:42 UTC - **Last Updated**: May 04, 2025 at 07:22 UTC - **Reserved Date**: December 29, 2024 at 08:45 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard() Add check for the return value of cifs_buf_get() and cifs_small_buf_get() in receive_encrypted_standard() to prevent null pointer dereference. ### Affected Products **Linux - Linux** Affected versions: - b03c8099a738a04d2343547ae6a04e5f0f63d3fa (Status: affected) - 858e73ff25639a0cc1f6f8d2587b62c045867e41 (Status: affected) - 9f528a8e68327117837b5e28b096f52af4c26a05 (Status: affected) - 534733397da26de0303057ce0b93a22bda150365 (Status: affected) - eec04ea119691e65227a97ce53c0da6b9b74b0b7 (Status: affected) - eec04ea119691e65227a97ce53c0da6b9b74b0b7 (Status: affected) - eec04ea119691e65227a97ce53c0da6b9b74b0b7 (Status: affected) **Linux - Linux** Affected versions: - 6.7 (Status: affected) - 0 (Status: unaffected) - 5.10.235 (Status: unaffected) - 5.15.179 (Status: unaffected) - 6.1.130 (Status: unaffected) - 6.6.80 (Status: unaffected) - 6.12.17 (Status: unaffected) - 6.13.5 (Status: unaffected) - 6.14 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/f277e479eea3d1aa18bc712abe1d2bf3dece2e30) 2. [](https://git.kernel.org/stable/c/f618aeb6cad2307e48a641379db610abcf593edf) 3. [](https://git.kernel.org/stable/c/24e8e4523d3071bc5143b0db9127d511489f7b3b) 4. [](https://git.kernel.org/stable/c/9e5d99a4cf2e23c716b44862975548415fae5391) 5. [](https://git.kernel.org/stable/c/a9b0b4b29877cb4dc5d0842b59b5ccbacddb85bd) 6. [](https://git.kernel.org/stable/c/554736b583f529ee159aa95af9a0cbc12b5ffc96) 7. [](https://git.kernel.org/stable/c/860ca5e50f73c2a1cef7eefc9d39d04e275417f7)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-18228, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-18228 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-18228 - **State**: PUBLISHED - **Published Date**: October 31, 2019 at 21:09 UTC - **Last Updated**: August 05, 2024 at 01:47 UTC - **Reserved Date**: October 22, 2019 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - Honeywell equIP series IP cameras** Affected versions: - H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812 (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsa-19-304-02)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-40234, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-40234 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-40234 - **State**: PUBLISHED - **Published Date**: September 19, 2022 at 17:25 UTC - **Last Updated**: September 16, 2024 at 23:45 UTC - **Reserved Date**: September 08, 2022 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Versions of IBM Spectrum Protect Plus prior to 10.1.12 (excluding 10.1.12) include the private key information for a certificate inside the generated .crt file when uploading a TLS certificate to IBM Spectrum Protect Plus. If this generated .crt file is shared, an attacker can obtain the private key information for the uploaded certificate. IBM X-Force ID: 235718. ### Affected Products **IBM - Spectrum Protect Plus** Affected versions: - 10.1.0 (Status: affected) - 10.1.11 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/6619947) 2. [ibm-spectrum-cve202240234-info-disc (235718)](https://exchange.xforce.ibmcloud.com/vulnerabilities/235718)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-46580, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-46580 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-46580 - **State**: PUBLISHED - **Published Date**: April 27, 2025 at 01:49 UTC - **Last Updated**: April 28, 2025 at 15:33 UTC - **Reserved Date**: April 25, 2025 at 00:28 UTC - **Assigned By**: zte ### Vulnerability Description There is a code-related vulnerability in the GoldenDB database product. Attackers can access system tables to disrupt the normal operation of business SQL. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-400: Security Weakness ### Affected Products **ZTE - GoldenDB** Affected versions: - 6.1.03 (Status: affected) ### References 1. [](https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/4828497866583347285)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8769, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8769 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8769 - **State**: PUBLISHED - **Published Date**: April 02, 2017 at 20:00 UTC - **Last Updated**: September 16, 2024 at 22:21 UTC - **Reserved Date**: October 18, 2016 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description Huawei UTPS earlier than UTPS-V200R003B015D16SPC00C983 has an unquoted service path vulnerability which can lead to the truncation of UTPS service query paths. An attacker may put an executable file in the search path of the affected service and obtain elevated privileges after the executable file is executed. ### Affected Products **Huawei Technologies Co., Ltd. - Huawei UTPS** Affected versions: - earlier than UTPS-V200R003B015D16SPC00C983 (Status: affected) ### References 1. [](http://www.security-geek.in/2017/02/07/0day-discovery-system-level-access-by-privilege-escalation-of-huawei-manufactured-airtel-photon-dongles/) 2. [94403](http://www.securityfocus.com/bid/94403) 3. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161116-01-utps-en) 4. [40807](https://www.exploit-db.com/exploits/40807/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-12376, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-12376 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-12376 - **State**: PUBLISHED - **Published Date**: March 20, 2025 at 10:10 UTC - **Last Updated**: March 20, 2025 at 18:21 UTC - **Reserved Date**: December 09, 2024 at 18:14 UTC - **Assigned By**: @huntr_ai ### Vulnerability Description A Server-Side Request Forgery (SSRF) vulnerability was identified in the lm-sys/fastchat web server, specifically in the affected version git 2c68a13. This vulnerability allows an attacker to access internal server resources and data that are otherwise inaccessible, such as AWS metadata credentials. ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **lm-sys - lm-sys/fastchat** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.com/bounties/c9cc3f28-ee9f-4d2d-9ee5-8c6455a11892)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-2331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-2331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-2331 - **State**: PUBLISHED - **Published Date**: March 30, 2015 at 10:00 UTC - **Last Updated**: August 06, 2024 at 05:10 UTC - **Reserved Date**: March 18, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-3198](http://www.debian.org/security/2015/dsa-3198) 2. [](http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5) 3. [openSUSE-SU-2015:0615](http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html) 4. [HPSBMU03409](http://marc.info/?l=bugtraq&m=144050155601375&w=2) 5. [openSUSE-SU-2015:0644](http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html) 6. [FEDORA-2015-4699](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html) 7. [FEDORA-2015-4556](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html) 8. [APPLE-SA-2015-09-30-3](http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html) 9. [HPSBMU03380](http://marc.info/?l=bugtraq&m=143748090628601&w=2) 10. [MDVSA-2015:079](http://www.mandriva.com/security/advisories?name=MDVSA-2015:079) 11. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html) 12. [SSRT102066](http://marc.info/?l=bugtraq&m=143403519711434&w=2) 13. [FEDORA-2015-4559](http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html) 14. [](http://php.net/ChangeLog-5.php) 15. [](https://support.apple.com/HT205267) 16. [FEDORA-2015-4565](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html) 17. [](https://bugs.php.net/bug.php?id=69253) 18. [FEDORA-2015-4669](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html) 19. [](http://hg.nih.at/libzip/rev/9f11d54f692e) 20. [FEDORA-2015-4553](http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html) 21. [1031985](http://www.securitytracker.com/id/1031985) 22. [HPSBUX03337](http://marc.info/?l=bugtraq&m=143403519711434&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-7251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-7251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-7251 - **State**: PUBLISHED - **Published Date**: December 06, 2014 at 15:00 UTC - **Last Updated**: August 06, 2024 at 12:40 UTC - **Reserved Date**: September 30, 2014 at 00:00 UTC - **Assigned By**: jpcert ### Vulnerability Description XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/TOOLS before R9.05-SP2 allows local users to cause a denial of service (CPU or network traffic consumption) or read arbitrary files via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0004E.pdf) 2. [JVN#54775800](http://jvn.jp/en/jp/JVN54775800/index.html) 3. [fast-tools-cve20147251-info-disc(99018)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99018) 4. [JVNDB-2014-000141](http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000141.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-12759, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-12759 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-12759 - **State**: PUBLISHED - **Published Date**: May 09, 2019 at 17:16 UTC - **Last Updated**: August 05, 2024 at 18:51 UTC - **Reserved Date**: August 09, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Ynet Interactive - http://demo.ynetinteractive.com/soa/ SOA School Management 3.0 is affected by: SQL Injection. The impact is: Code execution (remote). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://demo.ynetinteractive.com/soa/) 2. [](http://soa.com) 3. [](https://www.exploit-db.com/exploits/42499)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3373 - **State**: PUBLISHED - **Published Date**: August 03, 2023 at 23:44 UTC - **Last Updated**: February 27, 2025 at 21:11 UTC - **Reserved Date**: June 23, 2023 at 01:32 UTC - **Assigned By**: Mitsubishi ### Vulnerability Description Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L` ### Weakness Classification (CWE) - CWE-342: Security Weakness ### Affected Products **Mitsubishi Electric Corporation - GOT2000 Series GT21 model** Affected versions: - 01.49.000 and prior (Status: affected) **Mitsubishi Electric Corporation - GOT SIMPLE Series GS21 model** Affected versions: - 01.49.000 and prior (Status: affected) ### References 1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf) 2. [](https://jvn.jp/vu/JVNVU92167394/index.html) 3. [](https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-34785, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-34785 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-34785 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 05:01 UTC - **Last Updated**: November 07, 2024 at 22:00 UTC - **Reserved Date**: June 15, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in Cisco BroadWorks CommPilot Application Software could allow an authenticated, remote attacker to delete arbitrary user accounts or gain elevated privileges on an affected system. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-620: Security Weakness ### Affected Products **Cisco - Cisco BroadWorks** Affected versions: - n/a (Status: affected) ### References 1. [20210908 Cisco BroadWorks CommPilot Application Software Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-38057, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-38057 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-38057 - **State**: PUBLISHED - **Published Date**: July 24, 2023 at 08:27 UTC - **Last Updated**: October 17, 2024 at 13:02 UTC - **Reserved Date**: July 12, 2023 at 08:05 UTC - **Assigned By**: OTRS ### Vulnerability Description An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent. This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22. ### CVSS Metrics - **CVSS Base Score**: 4.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **OTRS AG - OTRS** Affected versions: - 7.0.x (Status: affected) - 8.0.x (Status: affected) **OTRS AG - ((OTRS)) Community Edition** Affected versions: - 6.0.x (Status: affected) ### References 1. [](https://otrs.com/release-notes/otrs-security-advisory-2023-06/) ### Credits - Special thanks to Daniel Mizael, Raphael Fiorin and Marcelo Makotofrom for reporting these vulnerability.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2000-0701, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2000-0701 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2000-0701 - **State**: PUBLISHED - **Published Date**: September 21, 2000 at 04:00 UTC - **Last Updated**: August 08, 2024 at 05:28 UTC - **Reserved Date**: September 19, 2000 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20000801 Advisory: mailman local compromise](http://www.securityfocus.com/archive/1/73220) 2. [RHSA-2000:030](http://www.redhat.com/support/errata/RHSA-2000-030.html) 3. [20000802 MDKSA-2000:030 - Linux-Mandrake not affected by mailman problem](http://archives.neohapsis.com/archives/bugtraq/2000-07/0479.html) 4. [20000802 CONECTIVA LINUX SECURITY ANNOUNCEMENT - mailman](http://archives.neohapsis.com/archives/bugtraq/2000-07/0474.html) 5. [1539](http://www.securityfocus.com/bid/1539) 6. [](http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000802105050.A11733%40rak.isternet.sk)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-10764, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-10764 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-10764 - **State**: PUBLISHED - **Published Date**: July 05, 2017 at 19:00 UTC - **Last Updated**: August 05, 2024 at 17:50 UTC - **Reserved Date**: July 01, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at COMCTL32!Tab_OnGetItem+0x000000000000002f." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10764)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-33040, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-33040 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-33040 - **State**: PUBLISHED - **Published Date**: January 17, 2022 at 16:14 UTC - **Last Updated**: August 03, 2024 at 23:42 UTC - **Reserved Date**: May 17, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373) 2. [](https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89) 3. [](https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3885, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3885 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3885 - **State**: REJECTED - **Published Date**: October 08, 2010 at 21:00 UTC - **Last Updated**: October 28, 2010 at 09:00 UTC - **Reserved Date**: October 08, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0594 - **State**: PUBLISHED - **Published Date**: June 08, 2018 at 17:00 UTC - **Last Updated**: September 16, 2024 at 20:16 UTC - **Reserved Date**: December 28, 2013 at 00:00 UTC - **Assigned By**: microfocus ### Vulnerability Description In the Open Build Service (OBS) before version 2.4.6 the CSRF protection is incorrectly disabled in the web interface, allowing for requests without the user's consent. ### Weakness Classification (CWE) - CWE-352: Cross-Site Request Forgery (CSRF) ### Affected Products **openSUSE - Open Build Service** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/openSUSE/open-build-service/commit/2188c059b67b82171d0e28ef59f77e62d22a09d8) 2. [](https://bugzilla.suse.com/show_bug.cgi?id=870606)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-21727, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-21727 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-21727 - **State**: PUBLISHED - **Published Date**: February 03, 2022 at 11:07 UTC - **Last Updated**: May 05, 2025 at 16:32 UTC - **Reserved Date**: November 16, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### CVSS Metrics - **CVSS Base Score**: 7.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw) 2. [](https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b) 3. [](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0199, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0199 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0199 - **State**: PUBLISHED - **Published Date**: March 09, 2001 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:14 UTC - **Reserved Date**: March 08, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in SEDUM HTTP Server 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the HTTP GET request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2335](http://www.securityfocus.com/bid/2335) 2. [14797](http://www.osvdb.org/14797) 3. [VU#651994](http://www.kb.cert.org/vuls/id/651994) 4. [sedum-directory-traversal(6063)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6063) 5. [20010204 Vulnerability in SEDUM HTTP Server](http://archives.neohapsis.com/archives/bugtraq/2001-02/0064.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-3689, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-3689 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-3689 - **State**: PUBLISHED - **Published Date**: July 16, 2023 at 15:31 UTC - **Last Updated**: August 02, 2024 at 07:01 UTC - **Reserved Date**: July 15, 2023 at 16:26 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability classified as critical was found in Bylancer QuickQR 6.3.7. Affected by this vulnerability is an unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234235. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Bylancer - QuickQR** Affected versions: - 6.3.7 (Status: affected) ### References 1. [](https://vuldb.com/?id.234235) 2. [](https://vuldb.com/?ctiid.234235) ### Credits - skalvin (VulDB User)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-26518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-26518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-26518 - **State**: PUBLISHED - **Published Date**: May 12, 2022 at 17:01 UTC - **Last Updated**: April 15, 2025 at 19:02 UTC - **Reserved Date**: March 22, 2022 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An OS command injection vulnerability exists in the console infactory_net functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **InHand Networks - InRouter302** Affected versions: - V3.5.37 (Status: affected) ### References 1. [](https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf) 2. [](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-41714, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-41714 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-41714 - **State**: PUBLISHED - **Published Date**: October 21, 2024 at 00:00 UTC - **Last Updated**: October 22, 2024 at 14:03 UTC - **Reserved Date**: July 22, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A vulnerability in the Web Interface component of Mitel MiCollab through 9.8 SP1 (9.8.1.5) and MiVoice Business Solution Virtual Instance (MiVB SVI) through 1.0.0.27 could allow an authenticated attacker to conduct a command injection attack, due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges within the context of the system. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0021)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-8293, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-8293 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-8293 - **State**: PUBLISHED - **Published Date**: October 25, 2016 at 14:00 UTC - **Last Updated**: October 10, 2024 at 18:09 UTC - **Reserved Date**: September 26, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.54 and 8.55 allows remote attackers to affect confidentiality and integrity via vectors related to Integration Broker, a different vulnerability than CVE-2016-5529 and CVE-2016-5530. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html) 2. [93726](http://www.securityfocus.com/bid/93726) 3. [1037046](http://www.securitytracker.com/id/1037046)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2053, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2053 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2053 - **State**: PUBLISHED - **Published Date**: June 04, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 09:58 UTC - **Reserved Date**: February 19, 2014 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description getID3() before 1.9.8, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [DSA-3001](http://www.debian.org/security/2014/dsa-3001) 2. [](https://wordpress.org/news/2014/08/wordpress-3-9-2/) 3. [](http://getid3.sourceforge.net/source/changelog.txt) 4. [58002](http://secunia.com/advisories/58002) 5. [](http://owncloud.org/about/security/advisories/oC-SA-2014-006/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7133, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7133 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7133 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: September 16, 2015 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-40765, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-40765 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-40765 - **State**: PUBLISHED - **Published Date**: August 28, 2023 at 00:00 UTC - **Last Updated**: October 02, 2024 at 15:35 UTC - **Reserved Date**: August 22, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description User enumeration is found in PHPJabbers Event Booking Calendar v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.phpjabbers.com/event-booking-calendar/) 2. [](https://medium.com/%40mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3972, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3972 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3972 - **State**: PUBLISHED - **Published Date**: December 03, 2005 at 19:00 UTC - **Last Updated**: August 07, 2024 at 23:31 UTC - **Reserved Date**: December 03, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in extremesearch.php in Extreme Search Corporate Edition 6.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [21336](http://www.osvdb.org/21336) 2. [ADV-2005-2687](http://www.vupen.com/english/advisories/2005/2687) 3. [15675](http://www.securityfocus.com/bid/15675) 4. [17816](http://secunia.com/advisories/17816) 5. [](http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15566, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15566 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15566 - **State**: PUBLISHED - **Published Date**: November 01, 2017 at 17:00 UTC - **Last Updated**: August 05, 2024 at 19:57 UTC - **Reserved Date**: October 17, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Insecure SPANK environment variable handling exists in SchedMD Slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [101675](http://www.securityfocus.com/bid/101675) 2. [](https://www.schedmd.com/news.php?id=193#OPT_193) 3. [DSA-4023](https://www.debian.org/security/2017/dsa-4023)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0463, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0463 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0463 - **State**: PUBLISHED - **Published Date**: March 09, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:21 UTC - **Reserved Date**: May 24, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in cal_make.pl in PerlCal allows remote attackers to read arbitrary files via a .. (dot dot) in the p0 parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.perlcal.com/calendar/docs/bugs.txt) 2. [2663](http://www.securityfocus.com/bid/2663) 3. [20010427 PerlCal (CGI) show files vulnerability](http://archives.neohapsis.com/archives/bugtraq/2001-04/0506.html) 4. [perlcal-calmake-directory-traversal(6480)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6480)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-1999-1349, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-1999-1349 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-1999-1349 - **State**: PUBLISHED - **Published Date**: September 12, 2001 at 04:00 UTC - **Last Updated**: August 01, 2024 at 17:11 UTC - **Reserved Date**: August 31, 2001 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NFS daemon (nfsd.exe) for Omni-NFS/X 6.1 allows remote attackers to cause a denial of service (resource exhaustion) via certain packets, possibly with the Urgent (URG) flag set, to port 111. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [19991006 Omni-NFS/X Enterprise (nfsd.exe) DOS](http://marc.info/?l=bugtraq&m=93923679004325&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-5796, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-5796 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-5796 - **State**: PUBLISHED - **Published Date**: September 09, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 11:55 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Chest Workout (aka net.p4p.chest) application 2.0.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) 3. [VU#304505](http://www.kb.cert.org/vuls/id/304505)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24525 - **State**: PUBLISHED - **Published Date**: March 09, 2022 at 17:08 UTC - **Last Updated**: January 02, 2025 at 18:35 UTC - **Reserved Date**: February 05, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Windows Update Stack Elevation of Privilege Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Windows 10 Version 1909** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H1** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows Server version 20H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 11 version 21H2** Affected versions: - 10.0.0 (Status: affected) **Microsoft - Windows 10 Version 21H2** Affected versions: - 10.0.19043.0 (Status: affected) ### References 1. [Windows Update Stack Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24525)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-22291, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-22291 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-22291 - **State**: PUBLISHED - **Published Date**: February 16, 2025 at 22:17 UTC - **Last Updated**: February 18, 2025 at 16:09 UTC - **Reserved Date**: January 03, 2025 at 13:15 UTC - **Assigned By**: Patchstack ### Vulnerability Description Missing Authorization vulnerability in enituretechnology LTL Freight Quotes – Worldwide Express Edition allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LTL Freight Quotes – Worldwide Express Edition: from n/a through 5.0.20. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-862: Missing Authorization ### Affected Products **enituretechnology - LTL Freight Quotes – Worldwide Express Edition** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/ltl-freight-quotes-worldwide-express-edition/vulnerability/wordpress-ltl-freight-quotes-worldwide-express-edition-plugin-5-0-20-arbitrary-content-deletion-vulnerability?_s_id=cve) ### Credits - Mika (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-43729, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-43729 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-43729 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 22:04 UTC - **Last Updated**: January 07, 2025 at 17:36 UTC - **Reserved Date**: August 15, 2024 at 17:12 UTC - **Assigned By**: adobe ### Vulnerability Description Adobe Experience Manager versions 6.5.21 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a high impact on integrity. Exploitation of this issue does not require user interaction. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-285: Security Weakness ### Affected Products **Adobe - Adobe Experience Manager** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-2660, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-2660 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-2660 - **State**: PUBLISHED - **Published Date**: September 30, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 22:45 UTC - **Reserved Date**: August 22, 2005 at 00:00 UTC - **Assigned By**: debian ### Vulnerability Description apachetop 0.12.5 and earlier, when running in debug mode, allows local users to create or append to arbitrary files via a symlink attack on atop.debug. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1014996](http://securitytracker.com/id?1014996) 2. [](http://www.zataz.net/adviso/apachetop-09022005.txt) 3. [38](http://securityreason.com/securityalert/38) 4. [14982](http://www.securityfocus.com/bid/14982) 5. [](http://bugs.gentoo.org/show_bug.cgi?id=104473)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41877, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41877 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41877 - **State**: PUBLISHED - **Published Date**: March 20, 2024 at 14:27 UTC - **Last Updated**: August 02, 2024 at 19:09 UTC - **Reserved Date**: September 04, 2023 at 16:31 UTC - **Assigned By**: GitHub_M ### Vulnerability Description GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A path traversal vulnerability in versions 2.23.4 and prior requires GeoServer Administrator with access to the admin console to misconfigure the Global Settings for log file location to an arbitrary location. The admin console GeoServer Logs page provides a preview of these contents. As this issue requires GeoServer administrators access, often representing a trusted party, the vulnerability has not received a patch as of time of publication. As a workaround, a system administrator responsible for running GeoServer can use the `GEOSERVER_LOG_FILE` setting to override any configuration option provided by the Global Settings page. The `GEOSERVER_LOG_LOCATION` parameter can be set as system property, environment variables, or servlet context parameters. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **geoserver - geoserver** Affected versions: - <= 2.23.4 (Status: affected) ### References 1. [https://github.com/geoserver/geoserver/security/advisories/GHSA-8g7v-vjrc-x4g5](https://github.com/geoserver/geoserver/security/advisories/GHSA-8g7v-vjrc-x4g5) 2. [https://docs.geoserver.org/latest/en/user/configuration/globalsettings.html#log-location](https://docs.geoserver.org/latest/en/user/configuration/globalsettings.html#log-location)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-39577, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-39577 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-39577 - **State**: PUBLISHED - **Published Date**: April 16, 2025 at 12:44 UTC - **Last Updated**: April 16, 2025 at 13:51 UTC - **Reserved Date**: April 16, 2025 at 06:26 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Property Hive PropertyHive allows Stored XSS. This issue affects PropertyHive: from n/a through 2.1.2. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Property Hive - PropertyHive** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/propertyhive/vulnerability/wordpress-propertyhive-2-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - muhammad yudha (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-9306, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-9306 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-9306 - **State**: PUBLISHED - **Published Date**: September 27, 2019 at 18:05 UTC - **Last Updated**: August 04, 2024 at 21:46 UTC - **Reserved Date**: February 28, 2019 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In libMpegTPDec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661348 ### Affected Products **n/a - Android** Affected versions: - Android-10 (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/android-10)