System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12726, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12726
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:06 UTC
- **Last Updated**: May 20, 2025 at 19:31 UTC
- **Reserved Date**: December 17, 2024 at 18:16 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The ClipArt WordPress plugin through 0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - ClipArt**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/88d748fc-6c2f-4656-99c5-c00cbed9d7e0/)
### Credits
- Hassan Khan Yusufzai - Splint3r7
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44146
- **State**: PUBLISHED
- **Published Date**: September 16, 2024 at 23:22 UTC
- **Last Updated**: March 25, 2025 at 16:30 UTC
- **Reserved Date**: August 20, 2024 at 21:42 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15. An app may be able to break out of its sandbox.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121238) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2761
- **State**: PUBLISHED
- **Published Date**: March 27, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:24 UTC
- **Reserved Date**: March 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Exceptions and Scanning Exceptions Pages in Websense TRITON AP-WEB before 8.0.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0)
2. [73414](http://www.securityfocus.com/bid/73414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41976, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41976 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41976
- **State**: PUBLISHED
- **Published Date**: April 10, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 15:59 UTC
- **Reserved Date**: September 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An privilege escalation issue was discovered in Scada-LTS 2.7.1.1 build 2948559113 allows remote attackers, authenticated in the application as a low-privileged user to change role (e.g., to administrator) by updating their user profile.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://scada-lts.org/)
2. [](https://github.com/SCADA-LTS/Scada-LTS/releases)
3. [](https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7601
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12309, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12309 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12309
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 18:36 UTC
- **Reserved Date**: August 03, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705.
### Weakness Classification (CWE)
- CWE-113: Security Weakness
### Affected Products
**n/a - Cisco Email Security Appliance**
Affected versions:
- Cisco Email Security Appliance (Status: affected)
### References
1. [1039831](http://www.securitytracker.com/id/1039831)
2. [101928](http://www.securityfocus.com/bid/101928)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-esa) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43683
- **State**: PUBLISHED
- **Published Date**: October 04, 2024 at 19:56 UTC
- **Last Updated**: November 01, 2024 at 15:59 UTC
- **Reserved Date**: August 14, 2024 at 15:39 UTC
- **Assigned By**: Microchip
### Vulnerability Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0.
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Microchip - TimeProvider 4100**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-improper-verification-of-host-header)
2. [](https://www.gruppotim.it/it/footer/red-team.html)
### Credits
- Armando Huesca Prida
- Marco Negro
- Antonio Carriero
- Vito Pistillo
- Davide Renna
- Manuel Leone
- Massimiliano Brolli
- TIM Security Red Team Research |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45137, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45137 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45137
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 20:13 UTC
- **Last Updated**: September 10, 2024 at 19:44 UTC
- **Reserved Date**: October 04, 2023 at 16:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-2 and prior to version 13.4-rc-1, as well as `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, are vulnerable to cross-site scripting. When trying to create a document that already exists, XWiki displays an error message in the form for creating it. Due to missing escaping, this error message is vulnerable to raw HTML injection and thus XSS. The injected code is the document reference of the existing document so this requires that the attacker first creates a non-empty document whose name contains the attack code. This has been patched in `org.xwiki.platform:xwiki-platform-web` version 13.4-rc-1 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by adding the appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 3.1-milestone-2, < 13.4-rc-1 (Status: affected)
- >= 14.0-rc-1, < 14.10.12 (Status: affected)
- >= 15.0-rc-1, < 15.5-rc-1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-93gh-jgjj-r929](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-93gh-jgjj-r929)
2. [https://github.com/xwiki/xwiki-platform/commit/ed8ec747967f8a16434806e727a57214a8843581](https://github.com/xwiki/xwiki-platform/commit/ed8ec747967f8a16434806e727a57214a8843581)
3. [https://jira.xwiki.org/browse/XWIKI-20961](https://jira.xwiki.org/browse/XWIKI-20961) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0351
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:14 UTC
- **Reserved Date**: May 23, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Some packaging commands in SCO UnixWare 7.1.0 have insecure privileges, which allows local users to add or remove software packages.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SB-99.09](ftp://ftp.sco.com/SSE/security_bulletins/SB-99.09b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38407
- **State**: PUBLISHED
- **Published Date**: November 06, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 17:39 UTC
- **Reserved Date**: July 17, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FRRouting/frr/pull/12951)
2. [](https://github.com/FRRouting/frr/pull/12956)
3. [](https://github.com/FRRouting/frr/compare/frr-8.5-rc...frr-8.5)
4. [[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update](https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10334
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:50 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1039608](http://www.securitytracker.com/id/1039608)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21377
- **State**: PUBLISHED
- **Published Date**: January 19, 2022 at 11:26 UTC
- **Last Updated**: September 24, 2024 at 20:17 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web API). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - Primavera Portfolio Management**
Affected versions:
- 18.0.0.0-18.0.3.0 (Status: affected)
- 19.0.0.0-19.0.1.2 (Status: affected)
- 20.0.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1186
- **State**: PUBLISHED
- **Published Date**: April 19, 2022 at 20:26 UTC
- **Last Updated**: May 05, 2025 at 16:43 UTC
- **Reserved Date**: March 30, 2022 at 00:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**bepopiacompliant - Be POPIA Compliant**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/0fcdd6b5-a273-4916-a894-a753be0a7921?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2701343%40be-popia-compliant&new=2701343%40be-popia-compliant&sfp_email=&sfph_mail=)
### Credits
- Chris Meistre |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-40907, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-40907 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-40907
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 13:03 UTC
- **Last Updated**: May 16, 2025 at 15:09 UTC
- **Reserved Date**: April 16, 2025 at 09:05 UTC
- **Assigned By**: CPANSec
### Vulnerability Description
FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library.
The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
### Weakness Classification (CWE)
- CWE-1395: Security Weakness
### Affected Products
**ETHER - FCGI**
Affected versions:
- 0.44 (Status: affected)
### References
1. [](http://www.openwall.com/lists/oss-security/2025/04/23/4)
2. [](https://github.com/FastCGI-Archives/fcgi2/issues/67)
3. [](https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5)
4. [](https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library)
5. [](https://github.com/perl-catalyst/FCGI/issues/14)
6. [](https://patch-diff.githubusercontent.com/raw/FastCGI-Archives/fcgi2/pull/74.patch)
### Credits
- Synacktiv |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2152
- **State**: PUBLISHED
- **Published Date**: July 01, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: July 01, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in 'raw' page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=271848)
2. [12692](http://secunia.com/advisories/12692/)
3. [mediawiki-raw-output-xss(17578)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17578)
4. [10454](http://www.osvdb.org/10454)
5. [11302](http://www.securityfocus.com/bid/11302) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42991, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42991 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42991
- **State**: PUBLISHED
- **Published Date**: September 03, 2024 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 16:04 UTC
- **Reserved Date**: August 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MCMS v5.4.1 has front-end file upload vulnerability which can lead to remote command execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitee.com/mingSoft/MCMS/issues/IAHN9F) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11809, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11809 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11809
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 04:23 UTC
- **Last Updated**: December 16, 2024 at 20:08 UTC
- **Reserved Date**: November 26, 2024 at 16:23 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'img_src' parameter in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**primersoftware - Primer MyData for Woocommerce**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/aca092cf-9482-468e-8dd4-af04e25bcf33?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3205727%40primer-mydata%2Ftrunk&old=3188823%40primer-mydata%2Ftrunk&sfp_email=&sfph_mail=)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-26419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-26419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-26419
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:05 UTC
- **Reserved Date**: February 22, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Adobe - Acrobat Reader**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb23-24.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9434
- **State**: PUBLISHED
- **Published Date**: January 17, 2025 at 23:11 UTC
- **Last Updated**: March 24, 2025 at 16:04 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- Android Kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-07-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9145
- **State**: PUBLISHED
- **Published Date**: October 01, 2024 at 07:23 UTC
- **Last Updated**: November 21, 2024 at 16:56 UTC
- **Reserved Date**: September 24, 2024 at 09:58 UTC
- **Assigned By**: Wiz
### Vulnerability Description
Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Wiz - Wiz Code Visual Studio Code extension**
Affected versions:
- 1.0.0 (Status: affected)
- 0.13.0 (Status: affected)
### References
1. [](https://www.wiz.io/security-advisories)
2. [](https://marketplace.visualstudio.com/items/WizCloud.wizcli-vscode/changelog)
3. [](https://marketplace.visualstudio.com/items/WizCloud.wiz-vscode/changelog)
### Credits
- Rohit Kumar |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13834, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13834
- **State**: PUBLISHED
- **Published Date**: February 15, 2025 at 14:21 UTC
- **Last Updated**: February 18, 2025 at 19:35 UTC
- **Reserved Date**: February 04, 2025 at 20:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Responsive Plus – Starter Templates, Advanced Features and Customizer Settings for Responsive Theme plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.4 via the 'remote_request' function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**cyberchimps - Responsive Plus – Starter Templates, Advanced Features and Customizer Settings for Responsive Theme.**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b2833265-f1e5-4cfd-ad2f-ca28a59de82f?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3240422/responsive-add-ons)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24424, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24424
- **State**: PUBLISHED
- **Published Date**: January 24, 2023 at 00:00 UTC
- **Last Updated**: April 02, 2025 at 14:10 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.
### Affected Products
**Jenkins Project - Jenkins OpenId Connect Authentication Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22390
- **State**: PUBLISHED
- **Published Date**: May 16, 2024 at 20:47 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 10, 2024 at 04:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Intel(R) FPGA products**
Affected versions:
- before version 2.9.1 (Status: affected)
### References
1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6913
- **State**: PUBLISHED
- **Published Date**: October 04, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Dive The World (aka com.paperton.wl.divetheworld) application 1.53 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#420929](http://www.kb.cert.org/vuls/id/420929)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2831
- **State**: PUBLISHED
- **Published Date**: June 16, 2023 at 09:06 UTC
- **Last Updated**: December 06, 2024 at 22:59 UTC
- **Reserved Date**: May 22, 2023 at 09:30 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost fails to unescape Markdown strings in a memory-efficient way, allowing an attacker to cause a Denial of Service by sending a message containing a large number of escaped characters.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
- 0 (Status: affected)
- 7.10.0 (Status: affected)
- 7.1.10 (Status: unaffected)
- 7.8.5 (Status: unaffected)
- 7.9.4 (Status: unaffected)
- 7.10.1 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates/)
### Credits
- claverrat |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40664, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40664 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40664
- **State**: PUBLISHED
- **Published Date**: October 12, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 15:02 UTC
- **Reserved Date**: September 13, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**Apache Software Foundation - Apache Shiro**
Affected versions:
- Apache Shiro (Status: affected)
### References
1. [](https://lists.apache.org/thread/loc2ktxng32xpy7lfwxto13k4lvnhjwg)
2. [[oss-security] 20221011 CVE-2022-40664: Apache Shiro: Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher](http://www.openwall.com/lists/oss-security/2022/10/12/1)
3. [[oss-security] 20221012 Re: CVE-2022-40664: Apache Shiro: Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher](http://www.openwall.com/lists/oss-security/2022/10/12/2)
4. [[oss-security] 20221012 Re: CVE-2022-40664: Apache Shiro: Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher](http://www.openwall.com/lists/oss-security/2022/10/13/1)
5. [](https://security.netapp.com/advisory/ntap-20221118-0005/)
### Credits
- Apache Shiro would like to thank Y4tacker for reporting this issue |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3873
- **State**: PUBLISHED
- **Published Date**: October 06, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 12, 2015 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23016072, 23248776, 23247055, 22845824, 22008959, 21814993, 21048776, 20718524, 20674674, 22388975, 20674086, 21443020, and 22077698, a different vulnerability than CVE-2015-7716.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[android-security-updates] 20151005 Nexus Security Bulletin (October 2015)](https://groups.google.com/forum/message/raw?msg=android-security-updates/_Rm-lKnS2M8/dGTcilt0CAAJ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18678
- **State**: PUBLISHED
- **Published Date**: November 26, 2019 at 16:15 UTC
- **Last Updated**: August 05, 2024 at 02:02 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/squid-cache/squid/pull/445)
2. [](https://bugzilla.suse.com/show_bug.cgi?id=1156323)
3. [](http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch)
4. [](http://www.squid-cache.org/Advisories/SQUID-2019_10.txt)
5. [USN-4213-1](https://usn.ubuntu.com/4213-1/)
6. [FEDORA-2019-0b16cbdd0e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEMOYTMCCFWK5NOXSXEIH5D2VGWVXR67/)
7. [FEDORA-2019-9538783033](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW53672NVLMC/)
8. [[debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html)
9. [GLSA-202003-34](https://security.gentoo.org/glsa/202003-34)
10. [DSA-4682](https://www.debian.org/security/2020/dsa-4682)
11. [[debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0562
- **State**: PUBLISHED
- **Published Date**: February 10, 2011 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 21:58 UTC
- **Reserved Date**: January 20, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0570 and CVE-2011-0588.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2011-0492](http://www.vupen.com/english/advisories/2011/0492)
2. [](http://www.acrossecurity.com/aspr/ASPR-2011-02-11-1-PUB.txt)
3. [20110211 ASPR #2011-02-11-1: Remote Binary Planting in Adobe Reader](http://www.securityfocus.com/archive/1/516399/100/0/threaded)
4. [43470](http://secunia.com/advisories/43470)
5. [RHSA-2011:0301](http://www.redhat.com/support/errata/RHSA-2011-0301.html)
6. [oval:org.mitre.oval:def:12555](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12555)
7. [ADV-2011-0337](http://www.vupen.com/english/advisories/2011/0337)
8. [1025033](http://www.securitytracker.com/id?1025033)
9. [46252](http://www.securityfocus.com/bid/46252)
10. [](http://www.adobe.com/support/security/bulletins/apsb11-03.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2230, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2230
- **State**: PUBLISHED
- **Published Date**: July 12, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:22 UTC
- **Reserved Date**: July 12, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Electronic Mail Operator (elmo) 1.3.2-r1 and earlier creates the elmostats temporary file insecurely, which allows local users to overwrite arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15977](http://secunia.com/advisories/15977)
2. [](http://www.zataz.net/adviso/elmo-06272005.txt)
3. [14235](http://www.securityfocus.com/bid/14235) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20657, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20657
- **State**: PUBLISHED
- **Published Date**: January 09, 2024 at 17:56 UTC
- **Last Updated**: May 03, 2025 at 01:46 UTC
- **Reserved Date**: November 28, 2023 at 22:58 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Group Policy Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Group Policy Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9756, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9756
- **State**: PUBLISHED
- **Published Date**: April 17, 2019 at 16:11 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GitLab Community and Enterprise Edition 10.x (starting from 10.8) and 11.x before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control, a different vulnerability than CVE-2019-9732.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://about.gitlab.com/blog/categories/releases/)
2. [](https://about.gitlab.com/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/)
3. [](https://gitlab.com/gitlab-org/gitlab-ce/issues/54243) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18382
- **State**: PUBLISHED
- **Published Date**: October 23, 2019 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on AVStar PE204 3.10.70 IP camera devices. A denial of service can occur on open TCP port 23456. After a TELNET connection, no TCP ports are open.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gusrmsdlrh/CVE-PE204) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0495, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0495 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0495
- **State**: PUBLISHED
- **Published Date**: June 23, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: May 27, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2004:255](http://www.redhat.com/support/errata/RHSA-2004-255.html)
2. [10566](http://www.securityfocus.com/bid/10566)
3. [RHSA-2004:260](http://www.redhat.com/support/errata/RHSA-2004-260.html)
4. [linux-drivers-gain-privileges(16449)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16449)
5. [FEDORA-2004-186](http://lwn.net/Articles/91155/)
6. [oval:org.mitre.oval:def:2961](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961)
7. [CLA-2004:845](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845)
8. [CLA-2004:846](http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846)
9. [MDKSA-2004:066](http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066)
10. [oval:org.mitre.oval:def:10155](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155)
11. [GLSA-200407-02](http://security.gentoo.org/glsa/glsa-200407-02.xml)
12. [SUSE-SA:2004:020](http://www.novell.com/linux/security/advisories/2004_20_kernel.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27192
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 12:44 UTC
- **Last Updated**: August 02, 2024 at 00:27 UTC
- **Reserved Date**: February 21, 2024 at 07:35 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Configure SMTP allows Reflected XSS.This issue affects Configure SMTP: from n/a through 3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Scott Reilly - Configure SMTP**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/configure-smtp/wordpress-configure-smtp-plugin-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21626
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 09:14 UTC
- **Last Updated**: October 24, 2024 at 18:59 UTC
- **Reserved Date**: December 07, 2022 at 02:58 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Cryptographic issue in HLOS due to improper authentication while performing key velocity checks using more than one key.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-320: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- APQ8009 (Status: affected)
- APQ8017 (Status: affected)
- APQ8037 (Status: affected)
- AQT1000 (Status: affected)
- AR8035 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FSM10056 (Status: affected)
- MDM8207 (Status: affected)
- MDM9205 (Status: affected)
- MDM9206 (Status: affected)
- MDM9207 (Status: affected)
- MDM9607 (Status: affected)
- MDM9628 (Status: affected)
- MSM8108 (Status: affected)
- MSM8208 (Status: affected)
- MSM8209 (Status: affected)
- MSM8608 (Status: affected)
- MSM8917 (Status: affected)
- MSM8920 (Status: affected)
- MSM8937 (Status: affected)
- MSM8940 (Status: affected)
- PM8937 (Status: affected)
- QAM8295P (Status: affected)
- QCA4004 (Status: affected)
- QCA4020 (Status: affected)
- QCA6174A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6390 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCA9379 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCN7606 (Status: affected)
- QCS2290 (Status: affected)
- QCS405 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS603 (Status: affected)
- QCS605 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS8155 (Status: affected)
- QCX315 (Status: affected)
- QSM8350 (Status: affected)
- Qualcomm215 (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA415M (Status: affected)
- SA515M (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8295P (Status: affected)
- SA8540P (Status: affected)
- SA9000P (Status: affected)
- SC8180X+SDX55 (Status: affected)
- SD 455 (Status: affected)
- SD 636 (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD 8cx Gen2 (Status: affected)
- SD 8cx Gen3 (Status: affected)
- SD205 (Status: affected)
- SD210 (Status: affected)
- SD429 (Status: affected)
- SD439 (Status: affected)
- SD450 (Status: affected)
- SD460 (Status: affected)
- SD480 (Status: affected)
- SD625 (Status: affected)
- SD626 (Status: affected)
- SD632 (Status: affected)
- SD660 (Status: affected)
- SD662 (Status: affected)
- SD665 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD678 (Status: affected)
- SD680 (Status: affected)
- SD690 5G (Status: affected)
- SD695 (Status: affected)
- SD710 (Status: affected)
- SD720G (Status: affected)
- SD730 (Status: affected)
- SD750G (Status: affected)
- SD765 (Status: affected)
- SD765G (Status: affected)
- SD768G (Status: affected)
- SD778G (Status: affected)
- SD780G (Status: affected)
- SD7c (Status: affected)
- SD835 (Status: affected)
- SD845 (Status: affected)
- SD850 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD870 (Status: affected)
- SD888 (Status: affected)
- SD888 5G (Status: affected)
- SDA429W (Status: affected)
- SDM429W (Status: affected)
- SDM630 (Status: affected)
- SDX24 (Status: affected)
- SDX50M (Status: affected)
- SDX55 (Status: affected)
- SDX55M (Status: affected)
- SDX65 (Status: affected)
- SDXR1 (Status: affected)
- SDXR2 5G (Status: affected)
- SM4125 (Status: affected)
- SM4375 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- SXR2150P (Status: affected)
- WCD9306 (Status: affected)
- WCD9326 (Status: affected)
- WCD9330 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3610 (Status: affected)
- WCN3615 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660 (Status: affected)
- WCN3660B (Status: affected)
- WCN3680 (Status: affected)
- WCN3680B (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN3991 (Status: affected)
- WCN3998 (Status: affected)
- WCN6740 (Status: affected)
- WCN6750 (Status: affected)
- WCN6850 (Status: affected)
- WCN6851 (Status: affected)
- WCN6855 (Status: affected)
- WCN6856 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0098
- **State**: PUBLISHED
- **Published Date**: April 13, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 21:43 UTC
- **Reserved Date**: December 21, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Integer signedness error in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via an XLS file with a large record size, aka "Excel Heap Overflow Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-102A](http://www.us-cert.gov/cas/techalerts/TA11-102A.html)
2. [39122](http://secunia.com/advisories/39122)
3. [71759](http://osvdb.org/71759)
4. [oval:org.mitre.oval:def:12034](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12034)
5. [1025337](http://www.securitytracker.com/id?1025337)
6. [47235](http://www.securityfocus.com/bid/47235)
7. [](http://secunia.com/secunia_research/2011-32/)
8. [MS11-021](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021)
9. [ADV-2011-0940](http://www.vupen.com/english/advisories/2011/0940) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-38156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-38156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38156
- **State**: PUBLISHED
- **Published Date**: June 12, 2023 at 00:00 UTC
- **Last Updated**: January 03, 2025 at 23:48 UTC
- **Reserved Date**: August 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A remote command injection issues exists in the web server of the Kratos SpectralNet device with SpectralNet Narrowband (NB) before 1.7.5. As an admin user, an attacker can send a crafted password in order to execute Linux commands as the root user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.kratosdefense.com/-/media/k/pdf/s/sy/os-011-spectralnet-narrowband.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0600
- **State**: PUBLISHED
- **Published Date**: May 27, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 00:52 UTC
- **Reserved Date**: February 10, 2010 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not properly restrict network access to an unspecified configuration file, which allows remote attackers to read passwords and unspecified other account details via a (1) XML RPC or (2) XML RPC over HTTPS session, aka Bug ID CSCtb83512.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024027](http://securitytracker.com/id?1024027)
2. [40384](http://www.securityfocus.com/bid/40384)
3. [20100526 Multiple Vulnerabilities in Cisco Network Building Mediator](http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c518.shtml)
4. [](http://www.us-cert.gov/control_systems/pdf/ICSA-10-147-01_Cisco_Network_Building_Mediator.pdf)
5. [VU#757804](http://www.kb.cert.org/vuls/id/757804)
6. [39904](http://secunia.com/advisories/39904) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10665
- **State**: PUBLISHED
- **Published Date**: June 04, 2018 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
herbivore is a packet sniffing and crafting library. Built on libtins herbivore 0.0.3 and below download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HackerOne - herbivore node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3)
2. [](https://nodesecurity.io/advisories/258) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41344, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41344
- **State**: PUBLISHED
- **Published Date**: October 15, 2024 at 00:00 UTC
- **Last Updated**: October 15, 2024 at 19:25 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20934
- **State**: PUBLISHED
- **Published Date**: February 28, 2023 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 17:52 UTC
- **Reserved Date**: November 03, 2022 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In resolveAttributionSource of ServiceUtilities.cpp, there is a possible way to disable the microphone privacy indicator due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-258672042
### Affected Products
**n/a - Android**
Affected versions:
- Android-12 Android-12L Android-13 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2023-02-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26148
- **State**: PUBLISHED
- **Published Date**: March 21, 2022 at 19:51 UTC
- **Last Updated**: August 03, 2024 at 04:56 UTC
- **Reserved Date**: February 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://2k8.org/post-319.html)
2. [](https://security.netapp.com/advisory/ntap-20220425-0005/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25104, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25104
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 10:11 UTC
- **Last Updated**: February 07, 2025 at 15:06 UTC
- **Reserved Date**: February 03, 2025 at 13:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in mraliende URL-Preview-Box allows Cross Site Request Forgery. This issue affects URL-Preview-Box: from n/a through 1.20.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**mraliende - URL-Preview-Box**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/good-url-preview-box/vulnerability/wordpress-url-preview-box-plugin-1-20-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2403
- **State**: PUBLISHED
- **Published Date**: April 16, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 13, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2187-1](http://www.ubuntu.com/usn/USN-2187-1)
2. [RHSA-2014:0675](http://rhn.redhat.com/errata/RHSA-2014-0675.html)
3. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414)
4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
5. [USN-2191-1](http://www.ubuntu.com/usn/USN-2191-1)
6. [HPSBUX03091](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
7. [RHSA-2014:0413](https://access.redhat.com/errata/RHSA-2014:0413)
8. [SSRT101667](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
9. [HPSBUX03092](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
10. [RHSA-2014:0685](http://rhn.redhat.com/errata/RHSA-2014-0685.html)
11. [66918](http://www.securityfocus.com/bid/66918)
12. [DSA-2912](http://www.debian.org/security/2014/dsa-2912)
13. [](http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html)
14. [58415](http://secunia.com/advisories/58415)
15. [SSRT101668](http://marc.info/?l=bugtraq&m=140852974709252&w=2)
16. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3441
- **State**: PUBLISHED
- **Published Date**: October 31, 2022 at 00:00 UTC
- **Last Updated**: May 06, 2025 at 20:06 UTC
- **Reserved Date**: October 10, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Rock Convert WordPress plugin before 2.11.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Rock Convert**
Affected versions:
- 2.11.0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023)
### Credits
- José Ricardo |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7563
- **State**: PUBLISHED
- **Published Date**: April 12, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 07:51 UTC
- **Reserved Date**: September 29, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in TeamPass 2.1.24 and earlier allows remote attackers to hijack the authentication of an authenticated user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39559](https://www.exploit-db.com/exploits/39559/)
2. [](https://github.com/nilsteampassnet/TeamPass/pull/1140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4872
- **State**: PUBLISHED
- **Published Date**: February 05, 2012 at 11:00 UTC
- **Last Updated**: September 17, 2024 at 02:37 UTC
- **Reserved Date**: December 21, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Multiple HTC Android devices including Desire HD FRG83D and GRI40, Glacier FRG83, Droid Incredible FRF91, Thunderbolt 4G FRG83D, Sensation Z710e GRI40, Sensation 4G GRI40, Desire S GRI40, EVO 3D GRI40, and EVO 4G GRI40 allow remote attackers to obtain 802.1X Wi-Fi credentials and SSID via a crafted application that uses the android.permission.ACCESS_WIFI_STATE permission to call the toString method on the WifiConfiguration class.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#763355](http://www.kb.cert.org/vuls/id/763355)
2. [20120201 802.1X password exploit on many HTC Android devices](http://archives.neohapsis.com/archives/bugtraq/2012-02/0002.html)
3. [47837](http://secunia.com/advisories/47837)
4. [](http://blog.mywarwithentropy.com/2012/02/8021x-password-exploit-on-many-htc.html)
5. [51790](http://www.securityfocus.com/bid/51790) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23978
- **State**: PUBLISHED
- **Published Date**: February 02, 2024 at 06:38 UTC
- **Last Updated**: May 15, 2025 at 19:50 UTC
- **Reserved Date**: January 25, 2024 at 01:46 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By processing invalid values, arbitrary code may be executed. Note that the affected products are no longer supported.
### Affected Products
**KDDI CORPORATION - HOME SPOT CUBE2**
Affected versions:
- V102 and earlier (Status: affected)
### References
1. [](https://www.au.com/support/service/mobile/guide/wlan/home_spot_cube_2/)
2. [](https://jvn.jp/en/vu/JVNVU93740658/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1912
- **State**: PUBLISHED
- **Published Date**: May 11, 2010 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 11, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SdcWebSecureBase interface in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to bypass intended restrictions on ActiveX execution via "instantiation/free attacks."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#602801](http://www.kb.cert.org/vuls/id/602801)
2. [](http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html)
3. [](http://www.wintercore.com/downloads/rootedcon_0day.pdf)
4. [20100507 [Wintercore Research] Consona Products - Multiple vulnerabilities](http://www.securityfocus.com/archive/1/511176/100/0/threaded)
5. [consona-sdcwebsecurebase-sec-bypass(58607)](https://exchange.xforce.ibmcloud.com/vulnerabilities/58607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9681, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9681
- **State**: PUBLISHED
- **Published Date**: April 16, 2021 at 17:10 UTC
- **Last Updated**: September 17, 2024 at 02:26 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Adobe - GoCart**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/integrity_service/apsb20-42.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42308
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 00:00 UTC
- **Last Updated**: August 21, 2024 at 15:15 UTC
- **Reserved Date**: September 08, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in Manage Fastrack Subjects in Code-Projects Exam Form Submission 1.0 allows attackers to run arbitrary code via the "Subject Name" and "Subject Code" Section.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ASR511-OO7/CVE-2023-42308/blob/main/CVE-7) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0033, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0033 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0033
- **State**: PUBLISHED
- **Published Date**: May 07, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:06 UTC
- **Reserved Date**: February 01, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20001208 Vulnerabilities in KTH Kerberos IV](http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html)
2. [kerberos4-user-config(5738)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5738)
3. [20001210 KTH upgrade and FIX](http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27139
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 19:52 UTC
- **Last Updated**: February 25, 2025 at 20:07 UTC
- **Reserved Date**: February 19, 2025 at 16:30 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Combodo iTop is a web based IT service management tool. Versions prior to 2.7.12, 3.1.2, and 3.2.0 are vulnerable to cross-site scripting when the preferences page is opened. Versions 2.7.12, 3.1.2, and 3.2.0 fix the issue.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Combodo - iTop**
Affected versions:
- < 2.7.12 (Status: affected)
- >= 3.0.0-alpha, < 3.1.2 (Status: affected)
- >= 3.2.0-alpha1, < 3.2.0 (Status: affected)
### References
1. [https://github.com/Combodo/iTop/security/advisories/GHSA-c6mg-9537-c8cf](https://github.com/Combodo/iTop/security/advisories/GHSA-c6mg-9537-c8cf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15136, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15136
- **State**: PUBLISHED
- **Published Date**: February 27, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 08, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is then reset to the hostname of a previously registered system the previously registered system will lose access to updates including security updates.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Red Hat, Inc. - Satellite 6**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [103210](http://www.securityfocus.com/bid/103210)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1540343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21945
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 17:15 UTC
- **Last Updated**: November 13, 2024 at 20:18 UTC
- **Reserved Date**: January 03, 2024 at 16:43 UTC
- **Assigned By**: AMD
### Vulnerability Description
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-276: Security Weakness
### Affected Products
**AMD - AMD Ryzen™ Master Monitoring SDK**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18329
- **State**: PUBLISHED
- **Published Date**: October 23, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 15, 2018 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
### Affected Products
**Trend Micro - Trend Micro Antivirus for Mac (Consumer)**
Affected versions:
- 7.0 (2017) and above (Status: affected)
### References
1. [](https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx)
2. [105757](http://www.securityfocus.com/bid/105757)
3. [](https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx)
4. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1297/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40335
- **State**: PUBLISHED
- **Published Date**: November 13, 2023 at 09:48 UTC
- **Last Updated**: August 28, 2024 at 15:09 UTC
- **Reserved Date**: August 14, 2023 at 14:47 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Jeremy O'Connell Cleverwise Daily Quotes allows Stored XSS.This issue affects Cleverwise Daily Quotes: from n/a through 3.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Jeremy O'Connell - Cleverwise Daily Quotes**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/cleverwise-daily-quotes/wordpress-cleverwise-daily-quotes-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Yuki Haruma (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-46481, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-46481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46481
- **State**: PUBLISHED
- **Published Date**: January 13, 2025 at 00:00 UTC
- **Last Updated**: January 13, 2025 at 20:19 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The login page of Venki Supravizio BPM up to 18.1.1 is vulnerable to open redirect leading to reflected XSS.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Venki - Supravizio BPM**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/Lorenzo-de-Sa/Vulnerability-Research)
2. [](https://www.venki.com.br/ferramenta-bpm/supravizio/)
3. [](https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46481.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43379, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43379 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43379
- **State**: PUBLISHED
- **Published Date**: August 19, 2024 at 14:29 UTC
- **Last Updated**: August 19, 2024 at 14:59 UTC
- **Reserved Date**: August 09, 2024 at 14:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed. The vulnerability has been resolved in TruffleHog v3.81.9 and later versions.
### CVSS Metrics
- **CVSS Base Score**: 3.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**trufflesecurity - trufflehog**
Affected versions:
- < 3.81.9 (Status: affected)
### References
1. [https://github.com/trufflesecurity/trufflehog/security/advisories/GHSA-3r74-v83p-f4f4](https://github.com/trufflesecurity/trufflehog/security/advisories/GHSA-3r74-v83p-f4f4)
2. [https://github.com/trufflesecurity/trufflehog/commit/fe5624c70923355128868cffd647b6e2cfe11443](https://github.com/trufflesecurity/trufflehog/commit/fe5624c70923355128868cffd647b6e2cfe11443) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22909
- **State**: PUBLISHED
- **Published Date**: January 10, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 18:36 UTC
- **Reserved Date**: January 10, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T320987)
2. [FEDORA-2023-30a7a812f0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4384
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 19:59 UTC
- **Last Updated**: March 25, 2025 at 20:41 UTC
- **Reserved Date**: December 09, 2022 at 14:57 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.
### Weakness Classification (CWE)
- CWE-862 Missing Authorization: Missing Authorization
### Affected Products
**Unknown - Stream**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5)
### Credits
- Krzysztof Zając
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8844, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8844
- **State**: PUBLISHED
- **Published Date**: October 27, 2020 at 19:55 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT210785)
2. [](https://support.apple.com/en-us/HT210789)
3. [](https://support.apple.com/en-us/HT210790)
4. [](https://support.apple.com/en-us/HT210793)
5. [](https://support.apple.com/en-us/HT210794)
6. [](https://support.apple.com/en-us/HT210792)
7. [](https://support.apple.com/en-us/HT210795) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-33581, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-33581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33581
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 15:17 UTC
- **Last Updated**: October 11, 2024 at 16:34 UTC
- **Reserved Date**: April 24, 2024 at 13:34 UTC
- **Assigned By**: lenovo
### Vulnerability Description
A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**Lenovo - PC Manager AI intelligent scenario**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://iknow.lenovo.com.cn/detail/423563)
### Credits
- Lenovo thanks ggid7788 for reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6290
- **State**: PUBLISHED
- **Published Date**: February 26, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 11:27 UTC
- **Reserved Date**: February 26, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in includefile.php in nicLOR Sito, when register_globals is enabled or magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the page_file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6990](https://www.exploit-db.com/exploits/6990)
2. [32556](http://secunia.com/advisories/32556)
3. [32111](http://www.securityfocus.com/bid/32111)
4. [sitoincludefile-includefile-file-include(46338)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46338) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48705
- **State**: PUBLISHED
- **Published Date**: November 22, 2023 at 15:15 UTC
- **Last Updated**: August 02, 2024 at 21:37 UTC
- **Reserved Date**: November 17, 2023 at 19:43 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application All users of Nautobot versions earlier than 1.6.6 or 2.0.5 are potentially affected by a cross-site scripting vulnerability. Due to incorrect usage of Django's `mark_safe()` API when rendering certain types of user-authored content; including custom links, job buttons, and computed fields; it is possible that users with permission to create or edit these types of content could craft a malicious payload (such as JavaScript code) that would be executed when rendering pages containing this content. The maintainers have fixed the incorrect uses of `mark_safe()` (generally by replacing them with appropriate use of `format_html()` instead) to prevent such malicious data from being executed. Users on Nautobot 1.6.x LTM should upgrade to v1.6.6 and users on Nautobot 2.0.x should upgrade to v2.0.5. Appropriate object permissions can and should be applied to restrict which users are permitted to create or edit the aforementioned types of user-authored content. Other than that, there is no direct workaround available.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**nautobot - nautobot**
Affected versions:
- < 1.6.6 (Status: affected)
- >= 2.0.0, < 2.0.5 (Status: affected)
### References
1. [https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr](https://github.com/nautobot/nautobot/security/advisories/GHSA-cf9f-wmhp-v4pr)
2. [https://github.com/nautobot/nautobot/pull/4832](https://github.com/nautobot/nautobot/pull/4832)
3. [https://github.com/nautobot/nautobot/pull/4833](https://github.com/nautobot/nautobot/pull/4833)
4. [https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2](https://github.com/nautobot/nautobot/commit/362850f5a94689a4c75e3188bf6de826c3b012b2)
5. [https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d](https://github.com/nautobot/nautobot/commit/54abe23331b6c3d0d82bf1b028c679b1d200920d)
6. [https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html](https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.html.format_html)
7. [https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe](https://docs.djangoproject.com/en/3.2/ref/utils/#django.utils.safestring.mark_safe) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-3414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-3414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3414
- **State**: PUBLISHED
- **Published Date**: August 26, 2022 at 15:25 UTC
- **Last Updated**: August 03, 2024 at 16:53 UTC
- **Reserved Date**: February 22, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in satellite. When giving granular permission related to the organization, other permissions allowing a user to view and manage other organizations are also granted. The highest threat from this vulnerability is to data confidentiality.
### Weakness Classification (CWE)
- CWE-281: Security Weakness
### Affected Products
**n/a - satellite**
Affected versions:
- Satellite v6.7 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1926139)
2. [](https://access.redhat.com/security/cve/CVE-2021-3414) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7536, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7536 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7536
- **State**: PUBLISHED
- **Published Date**: April 20, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ImageMagick/ImageMagick/issues/130)
2. [[oss-security] 20160922 Re: CVE Requests: Various ImageMagick issues (as reported in the Debian BTS)](http://www.openwall.com/lists/oss-security/2016/09/22/2)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1378772)
4. [93225](http://www.securityfocus.com/bid/93225)
5. [](https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545367)
6. [](https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453)
7. [](https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6574
- **State**: PUBLISHED
- **Published Date**: September 21, 2020 at 19:06 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1102196)
3. [openSUSE-SU-2020:1499](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html)
4. [openSUSE-SU-2020:1510](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html)
5. [openSUSE-SU-2020:1514](http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html)
6. [FEDORA-2020-2d994b986d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/)
7. [FEDORA-2020-aea86f913e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/)
8. [openSUSE-SU-2020:1713](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html)
9. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3568
- **State**: PUBLISHED
- **Published Date**: August 10, 2008 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 09:45 UTC
- **Reserved Date**: August 10, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Absolute path traversal vulnerability in fckeditor/editor/filemanager/browser/default/connectors/php/connector.php in UNAK-CMS 1.5.5 allows remote attackers to include and execute arbitrary local files via a full pathname in the Dirroot parameter, a different vulnerability than CVE-2006-4890.1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [unakcms-connector-file-include(44212)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44212)
2. [4123](http://securityreason.com/securityalert/4123)
3. [30533](http://www.securityfocus.com/bid/30533)
4. [20080804 UNAK-CMS Lfi](http://www.securityfocus.com/archive/1/495090/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2456
- **State**: PUBLISHED
- **Published Date**: April 02, 2017 at 01:36 UTC
- **Last Updated**: August 05, 2024 at 13:55 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [97137](http://www.securityfocus.com/bid/97137)
2. [41778](https://www.exploit-db.com/exploits/41778/)
3. [](https://support.apple.com/HT207601)
4. [](https://support.apple.com/HT207615)
5. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=1083)
6. [1038138](http://www.securitytracker.com/id/1038138)
7. [](https://support.apple.com/HT207602)
8. [](https://support.apple.com/HT207617) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1947
- **State**: PUBLISHED
- **Published Date**: April 25, 2013 at 23:00 UTC
- **Last Updated**: September 16, 2024 at 18:19 UTC
- **Reserved Date**: February 19, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20130412 Re: Remote command injection in Ruby Gem kelredd-pruview 0.3.8](http://www.openwall.com/lists/oss-security/2013/04/12/2)
2. [[oss-security] 20130410 Remote command injection in Ruby Gem kelredd-pruview 0.3.8](http://www.openwall.com/lists/oss-security/2013/04/10/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5865
- **State**: PUBLISHED
- **Published Date**: July 02, 2024 at 15:55 UTC
- **Last Updated**: August 01, 2024 at 21:25 UTC
- **Reserved Date**: June 11, 2024 at 15:11 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
Vulnerability in Delinea Centrify PAS v. 21.3 and possibly others. The application is prone to the path traversal vulnerability allowing arbitrary files reading outside the web publish directory. Versions 23.1-HF7 and on have the patch.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-26: Security Weakness
### Affected Products
**Delinea - Centrify PAS**
Affected versions:
- v. 21.3 (Status: affected)
### References
1. [](https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-001.md)
### Credits
- The vulnerability was discovered by Vladas Bulavas from Kaspersky |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36279
- **State**: PUBLISHED
- **Published Date**: June 17, 2024 at 07:34 UTC
- **Last Updated**: August 02, 2024 at 03:37 UTC
- **Reserved Date**: June 03, 2024 at 03:52 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Reliance on obfuscation or encryption of security-relevant inputs without integrity checking issue exists in "FreeFrom - the nostr client" App versions prior to 1.3.5 for Android and iOS. If this vulnerability is exploited, the content of direct messages (DMs) between users may be manipulated by a man-in-the-middle attack.
### Affected Products
**FreeFrom K.K. - "FreeFrom - the nostr client" App for Android**
Affected versions:
- prior to 1.3.5 (Status: affected)
**FreeFrom K.K. - "FreeFrom - the nostr client" App for iOS**
Affected versions:
- prior to 1.3.5 (Status: affected)
### References
1. [](https://freefrom.space/)
2. [](https://play.google.com/store/apps/details?id=com.freefrom)
3. [](https://apps.apple.com/us/app/freefrom-the-nostr-client/id6446819930)
4. [](https://jvn.jp/en/jp/JVN55045256/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43712
- **State**: PUBLISHED
- **Published Date**: May 09, 2022 at 20:58 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 15, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored XSS in Add New Employee Form in Sourcecodester Employee Daily Task Management System 1.0 Allows Remote Attacker to Inject/Store Arbitrary Code via the Name Field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://employee.com)
2. [](http://sourcecodester.com)
3. [](https://patelvarshil.medium.com/cve-2021-43712-stored-xss-how-i-got-my-first-cve-5381370482d4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0905
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 19:57 UTC
- **Last Updated**: February 12, 2025 at 14:28 UTC
- **Reserved Date**: January 30, 2025 at 20:36 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25433.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 10.4.0.388 (Status: affected)
### References
1. [ZDI-25-067](https://www.zerodayinitiative.com/advisories/ZDI-25-067/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4435
- **State**: PUBLISHED
- **Published Date**: December 28, 2009 at 18:27 UTC
- **Last Updated**: August 07, 2024 at 07:01 UTC
- **Reserved Date**: December 28, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in F3Site 2009 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[nlang] parameter to (1) mod/poll.php and (2) mod/new.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37408](http://www.securityfocus.com/bid/37408)
2. [f3site-nlang-file-include(54908)](https://exchange.xforce.ibmcloud.com/vulnerabilities/54908)
3. [10536](http://www.exploit-db.com/exploits/10536)
4. [](http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1429
- **State**: PUBLISHED
- **Published Date**: May 06, 2021 at 12:40 UTC
- **Last Updated**: November 08, 2024 at 23:21 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-378: Security Weakness
### Affected Products
**Cisco - Cisco AnyConnect Secure Mobility Client**
Affected versions:
- n/a (Status: affected)
### References
1. [20210505 Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0066, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0066
- **State**: PUBLISHED
- **Published Date**: June 25, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:35 UTC
- **Reserved Date**: February 19, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Funk Software Proxy Host 3.x before 3.09A creates a Named Pipe that does not require authentication and is installed with insecure access control, which allows local and possibly remote users to use the Proxy Host's configuration utilities and gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [funk-proxy-named-pipe(8793)](http://www.iss.net/security_center/static/8793.php)
2. [4460](http://www.securityfocus.com/bid/4460)
3. [20020408 Unauthorized remote control access to systems running Funk Software's Proxy v3.x](http://razor.bindview.com/publish/advisories/adv_FunkProxy.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1555
- **State**: PUBLISHED
- **Published Date**: March 31, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:24 UTC
- **Reserved Date**: March 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in system/_b/contentFiles/gbincluder.php in BolinOS 4.6.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the _bFileToInclude parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28445](http://www.securityfocus.com/bid/28445)
2. [5309](https://www.exploit-db.com/exploits/5309)
3. [3788](http://securityreason.com/securityalert/3788)
4. [20080325 [DSECRG-08-022] Multiple Security Vulnerabilities in Bolinos 4.6.1](http://www.securityfocus.com/archive/1/490058/100/0/threaded)
5. [bolinos-gbincluder-file-include(41431)](https://exchange.xforce.ibmcloud.com/vulnerabilities/41431)
6. [29535](http://secunia.com/advisories/29535) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11933, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11933
- **State**: PUBLISHED
- **Published Date**: July 29, 2020 at 16:25 UTC
- **Last Updated**: September 17, 2024 at 00:40 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Canonical - snapd**
Affected versions:
- 2.45.2 (Status: affected)
**Canonical - core**
Affected versions:
- 2.45.2 (Status: affected)
### References
1. [](https://launchpad.net/bugs/1879530)
2. [](https://ubuntu.com/USN-4424-1)
### Credits
- Ian Johnson |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4549
- **State**: PUBLISHED
- **Published Date**: August 03, 2020 at 12:35 UTC
- **Last Updated**: September 16, 2024 at 23:10 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183317.
### Affected Products
**IBM - i2 Analyst Notebook**
Affected versions:
- 9.2.1 (Status: affected)
- 9.2.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6254694)
2. [ibm-i2-cve20204549-bo (183317)](https://exchange.xforce.ibmcloud.com/vulnerabilities/183317) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49774
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 18:37 UTC
- **Last Updated**: November 05, 2024 at 18:59 UTC
- **Reserved Date**: October 18, 2024 at 13:43 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. SuiteCRM relies on the blacklist of functions/methods to prevent installation of malicious MLPs. But this checks can be bypassed with some syntax constructions. SuiteCRM uses token_get_all to parse PHP scripts and check the resulted AST against blacklists. But it doesn't take into account all scenarios. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**salesagility - SuiteCRM**
Affected versions:
- < 7.14.6 (Status: affected)
- >= 8.0.0, < 8.7.1 (Status: affected)
### References
1. [https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9v56-vhp4-x227](https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9v56-vhp4-x227) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20304
- **State**: REJECTED
- **Published Date**: January 02, 2020 at 20:33 UTC
- **Last Updated**: September 29, 2022 at 16:51 UTC
- **Reserved Date**: January 02, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7858
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 09:29 UTC
- **Last Updated**: August 30, 2024 at 14:48 UTC
- **Reserved Date**: August 15, 2024 at 17:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Media Library Folders plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several AJAX functions in the media-library-plus.php file in all versions up to, and including, 8.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several actions related to managing media files and folder along with controlling settings.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**maxfoundry - Media Library Folders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/fcc0fc00-b7d6-429c-9ab3-f08971c48777?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3143036%40media-library-plus&new=3143036%40media-library-plus&sfp_email=&sfph_mail=)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-34244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-34244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34244
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 02, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libmodbus v3.1.10 is vulnerable to Buffer Overflow via the modbus_write_bits function. This issue can be triggered when the function is fed with specially crafted input, which leads to out-of-bounds read and can potentially cause a crash or other unintended behaviors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/stephane/libmodbus/issues/743) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37208, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37208
- **State**: PUBLISHED
- **Published Date**: July 05, 2023 at 08:54 UTC
- **Last Updated**: November 20, 2024 at 21:35 UTC
- **Reserved Date**: June 28, 2023 at 18:07 UTC
- **Assigned By**: mozilla
### Vulnerability Description
When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1837675)
2. [](https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html)
3. [](https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html)
4. [](https://www.debian.org/security/2023/dsa-5450)
5. [](https://www.debian.org/security/2023/dsa-5451)
6. [](https://www.mozilla.org/security/advisories/mfsa2023-22/)
7. [](https://www.mozilla.org/security/advisories/mfsa2023-23/)
8. [](https://www.mozilla.org/security/advisories/mfsa2023-24/)
### Credits
- P Umar Farooq |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5393
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 13, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The "mozAddonManager" allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites. This vulnerability affects Firefox < 51.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1309282)
2. [1037693](http://www.securitytracker.com/id/1037693)
3. [](https://www.mozilla.org/security/advisories/mfsa2017-01/)
4. [95763](http://www.securityfocus.com/bid/95763) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2265
- **State**: PUBLISHED
- **Published Date**: May 09, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:43 UTC
- **Reserved Date**: May 08, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting vulnerability in admin/main.asp in Ocean12 Calendar Manager Pro 1.00 allows remote attackers to inject arbitrary web script or HTML via the date parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-1705](http://www.vupen.com/english/advisories/2006/1705)
2. [20036](http://secunia.com/advisories/20036)
3. [calendarmanagerpro-main-xss(26335)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26335)
4. [25347](http://www.osvdb.org/25347)
5. [17877](http://www.securityfocus.com/bid/17877) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48866
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 16:36 UTC
- **Last Updated**: December 06, 2024 at 19:29 UTC
- **Reserved Date**: October 09, 2024 at 00:22 UTC
- **Assigned By**: qnap
### Vulnerability Description
An improper handling of URL encoding (Hex Encoding) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to run the system into unexpected state.
We have already fixed the vulnerability in the following versions:
QTS 5.1.9.2954 build 20241120 and later
QTS 5.2.2.2950 build 20241114 and later
QuTS hero h5.1.9.2954 build 20241120 and later
QuTS hero h5.2.2.2952 build 20241116 and later
### Weakness Classification (CWE)
- CWE-177: Security Weakness
### Affected Products
**QNAP Systems Inc. - QTS**
Affected versions:
- 5.1.x (Status: affected)
- 5.2.x (Status: affected)
**QNAP Systems Inc. - QuTS hero**
Affected versions:
- h5.1.x (Status: affected)
- h5.2.x (Status: affected)
### References
1. [](https://www.qnap.com/en/security-advisory/qsa-24-49)
### Credits
- Pwn2Own 2024 - Chris Anastasio & Fabius Watson |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10621
- **State**: PUBLISHED
- **Published Date**: April 09, 2020 at 13:01 UTC
- **Last Updated**: August 04, 2024 at 11:06 UTC
- **Reserved Date**: March 16, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Multiple issues exist that allow files to be uploaded and executed on the WebAccess/NMS (versions prior to 3.0.2).
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**n/a - WebAccess/NMS**
Affected versions:
- Versions prior to 3.0.2 (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-20-098-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29216
- **State**: PUBLISHED
- **Published Date**: April 10, 2023 at 07:37 UTC
- **Last Updated**: February 13, 2025 at 16:49 UTC
- **Reserved Date**: April 03, 2023 at 15:04 UTC
- **Assigned By**: apache
### Vulnerability Description
In Apache Linkis <=1.3.1, because the parameters are not
effectively filtered, the attacker uses the MySQL data source and malicious parameters to
configure a new data source to trigger a deserialization vulnerability, eventually leading to
remote code execution.
Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users upgrade the version of Linkis to version 1.3.2.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Apache Software Foundation - Apache Linkis**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l)
2. [](http://www.openwall.com/lists/oss-security/2023/04/10/5)
### Credits
- sw0rd1ight |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13836
- **State**: PUBLISHED
- **Published Date**: July 12, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 10, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An integer overflow vulnerability exists in the function multiTransfer of Rocket Coin (XRC), an Ethereum token smart contract. An attacker could use it to set any user's balance.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VenusADLab/EtherTokens/tree/master/Rocket%20Coin%28XRC%29)
2. [](https://github.com/VenusADLab/EtherTokens/blob/master/SHARKTECH/SHARKTECH.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-7190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-7190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-7190
- **State**: PUBLISHED
- **Published Date**: December 20, 2013 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 18:01 UTC
- **Reserved Date**: December 20, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple directory traversal vulnerabilities in iScripts AutoHoster, possibly 2.4, allow remote attackers to read arbitrary files via the (1) tmpid parameter to websitebuilder/showtemplateimage.php, (2) fname parameter to admin/downloadfile.php, or (3) id parameter to support/admin/csvdownload.php; or (4) have an unspecified impact via unspecified vectors in support/parser/main_smtp.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [autohoster-mainsmtp-directory-traversal(89818)](https://exchange.xforce.ibmcloud.com/vulnerabilities/89818)
2. [20131215 iscripts autohoster , multiple vulns / php code injection exploit](http://seclists.org/fulldisclosure/2013/Dec/121) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-22201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-22201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22201
- **State**: PUBLISHED
- **Published Date**: April 02, 2021 at 16:17 UTC
- **Last Updated**: August 03, 2024 at 18:37 UTC
- **Reserved Date**: January 05, 2021 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server.
### CVSS Metrics
- **CVSS Base Score**: 9.6/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=13.9, <13.9.5 (Status: affected)
- >=13.10, <13.10.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/325562)
2. [](https://hackerone.com/reports/1132378)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22201.json)
### Credits
- Thanks [saltyyolk](https://hackerone.com/saltyyolk) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49817
- **State**: PUBLISHED
- **Published Date**: December 09, 2024 at 11:30 UTC
- **Last Updated**: December 09, 2024 at 16:42 UTC
- **Reserved Date**: November 30, 2023 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in heoLixfy Flexible Woocommerce Checkout Field Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flexible Woocommerce Checkout Field Editor: from n/a through 2.0.1.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**heoLixfy - Flexible Woocommerce Checkout Field Editor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/flexible-woocommerce-checkout-field-editor/vulnerability/wordpress-flexible-woocommerce-checkout-field-editor-plugin-2-0-1-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1617
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 04:00 UTC
- **Last Updated**: February 24, 2025 at 12:59 UTC
- **Reserved Date**: February 23, 2025 at 09:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, was found in Netis WF2780 2.1.41925. This affects an unknown part of the component Wireless 2.4G Menu. The manipulation of the argument SSID leads to cross site scripting. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**Netis - WF2780**
Affected versions:
- 2.1.41925 (Status: affected)
### References
1. [VDB-296607 | Netis WF2780 Wireless 2.4G Menu cross site scripting](https://vuldb.com/?id.296607)
2. [VDB-296607 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.296607)
3. [Submit #501472 | Netis WF2780 V2.1.41925 Cross Site Scripting](https://vuldb.com/?submit.501472)
### Credits
- Havook (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5338
- **State**: PUBLISHED
- **Published Date**: October 21, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: October 10, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2007-2601](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html)
2. [20071026 rPSA-2007-0225-1 firefox](http://www.securityfocus.com/archive/1/482876/100/200/threaded)
3. [ADV-2007-3587](http://www.vupen.com/english/advisories/2007/3587)
4. [27414](http://secunia.com/advisories/27414)
5. [20071029 FLEA-2007-0062-1 firefox](http://www.securityfocus.com/archive/1/482925/100/0/threaded)
6. [](https://issues.rpath.com/browse/RPL-1858)
7. [GLSA-200711-14](http://www.gentoo.org/security/en/glsa/glsa-200711-14.xml)
8. [](http://www.mozilla.org/security/announce/2007/mfsa2007-35.html)
9. [27360](http://secunia.com/advisories/27360)
10. [HPSBUX02153](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742)
11. [27298](http://secunia.com/advisories/27298)
12. [27315](http://secunia.com/advisories/27315)
13. [27327](http://secunia.com/advisories/27327)
14. [ADV-2007-3544](http://www.vupen.com/english/advisories/2007/3544)
15. [27276](http://secunia.com/advisories/27276)
16. [USN-535-1](https://usn.ubuntu.com/535-1/)
17. [DSA-1401](http://www.debian.org/security/2007/dsa-1401)
18. [DSA-1392](http://www.debian.org/security/2007/dsa-1392)
19. [RHSA-2007:0980](http://www.redhat.com/support/errata/RHSA-2007-0980.html)
20. [27383](http://secunia.com/advisories/27383)
21. [SUSE-SA:2007:057](http://www.novell.com/linux/security/advisories/2007_57_mozilla.html)
22. [27356](http://secunia.com/advisories/27356)
23. [RHSA-2007:0981](http://www.redhat.com/support/errata/RHSA-2007-0981.html)
24. [ADV-2008-0083](http://www.vupen.com/english/advisories/2008/0083)
25. [27387](http://secunia.com/advisories/27387)
26. [FEDORA-2007-3431](https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html)
27. [27403](http://secunia.com/advisories/27403)
28. [27336](http://secunia.com/advisories/27336)
29. [DSA-1396](http://www.debian.org/security/2007/dsa-1396)
30. [1018836](http://securitytracker.com/id?1018836)
31. [27425](http://secunia.com/advisories/27425)
32. [28398](http://secunia.com/advisories/28398)
33. [mozilla-xpcnativewrapper-code-execution(37288)](https://exchange.xforce.ibmcloud.com/vulnerabilities/37288)
34. [27311](http://secunia.com/advisories/27311)
35. [SSRT061181](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742)
36. [27325](http://secunia.com/advisories/27325)
37. [MDKSA-2007:202](http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202)
38. [27665](http://secunia.com/advisories/27665)
39. [RHSA-2007:0979](http://www.redhat.com/support/errata/RHSA-2007-0979.html)
40. [27335](http://secunia.com/advisories/27335)
41. [FEDORA-2007-2664](https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html)
42. [27480](http://secunia.com/advisories/27480)
43. [27680](http://secunia.com/advisories/27680)
44. [26132](http://www.securityfocus.com/bid/26132)
45. [oval:org.mitre.oval:def:10965](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10965)
46. [](http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html)
47. [201516](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1)
48. [20071029 rPSA-2007-0225-2 firefox thunderbird](http://www.securityfocus.com/archive/1/482932/100/200/threaded)
49. [USN-536-1](http://www.ubuntu.com/usn/usn-536-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4206
- **State**: PUBLISHED
- **Published Date**: June 08, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. macOS before 10.13.4 Security Update 2018-001 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Crash Reporter" component. It allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app that replaces a privileged port name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT208850)
2. [](https://support.apple.com/HT208851)
3. [1040744](http://www.securitytracker.com/id/1040744)
4. [](https://bugs.chromium.org/p/project-zero/issues/detail?id=1529)
5. [](https://support.apple.com/HT208743)
6. [103957](http://www.securityfocus.com/bid/103957)
7. [](https://support.apple.com/HT208742)
8. [103958](http://www.securityfocus.com/bid/103958)
9. [44562](https://www.exploit-db.com/exploits/44562/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4777
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 17:21 UTC
- **Last Updated**: March 13, 2025 at 16:28 UTC
- **Reserved Date**: May 10, 2024 at 17:37 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1878199%2C1893340)
2. [](https://www.mozilla.org/security/advisories/mfsa2024-21/)
3. [](https://www.mozilla.org/security/advisories/mfsa2024-22/)
4. [](https://www.mozilla.org/security/advisories/mfsa2024-23/)
5. [](https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html)
6. [](https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html)
### Credits
- Daniel Holbert and the Mozilla Fuzzing Team |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.