System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0598
- **State**: PUBLISHED
- **Published Date**: March 06, 2019 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 17:51 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0595, CVE-2019-0596, CVE-2019-0597, CVE-2019-0599, CVE-2019-0625.
### Affected Products
**Microsoft - Windows**
Affected versions:
- 7 for 32-bit Systems Service Pack 1 (Status: affected)
- 7 for x64-based Systems Service Pack 1 (Status: affected)
- 8.1 for 32-bit systems (Status: affected)
- 8.1 for x64-based systems (Status: affected)
- RT 8.1 (Status: affected)
- 10 for 32-bit Systems (Status: affected)
- 10 for x64-based Systems (Status: affected)
- 10 Version 1607 for 32-bit Systems (Status: affected)
- 10 Version 1607 for x64-based Systems (Status: affected)
- 10 Version 1703 for 32-bit Systems (Status: affected)
- 10 Version 1703 for x64-based Systems (Status: affected)
- 10 Version 1709 for 32-bit Systems (Status: affected)
- 10 Version 1709 for x64-based Systems (Status: affected)
- 10 Version 1803 for 32-bit Systems (Status: affected)
- 10 Version 1803 for x64-based Systems (Status: affected)
- 10 Version 1803 for ARM64-based Systems (Status: affected)
- 10 Version 1809 for 32-bit Systems (Status: affected)
- 10 Version 1809 for x64-based Systems (Status: affected)
- 10 Version 1809 for ARM64-based Systems (Status: affected)
- 10 Version 1709 for ARM64-based Systems (Status: affected)
**Microsoft - Windows Server**
Affected versions:
- 2008 R2 for x64-based Systems Service Pack 1 (Core installation) (Status: affected)
- 2008 R2 for Itanium-Based Systems Service Pack 1 (Status: affected)
- 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Core installation) (Status: affected)
- 2012 (Status: affected)
- 2012 (Core installation) (Status: affected)
- 2012 R2 (Status: affected)
- 2012 R2 (Core installation) (Status: affected)
- 2016 (Status: affected)
- 2016 (Core installation) (Status: affected)
- version 1709 (Core Installation) (Status: affected)
- version 1803 (Core Installation) (Status: affected)
- 2019 (Status: affected)
- 2019 (Core installation) (Status: affected)
- 2008 for Itanium-Based Systems Service Pack 2 (Status: affected)
- 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Status: affected)
- 2008 for x64-based Systems Service Pack 2 (Core installation) (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0598)
2. [106924](http://www.securityfocus.com/bid/106924) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51651
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 10:49 UTC
- **Last Updated**: January 07, 2025 at 14:18 UTC
- **Reserved Date**: October 30, 2024 at 15:05 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in CubeWP CubeWP Forms – All-in-One Form Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CubeWP Forms – All-in-One Form Builder: from n/a through 1.1.5.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**CubeWP - CubeWP Forms – All-in-One Form Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cubewp-forms/vulnerability/wordpress-cubewp-forms-plugin-1-1-5-broken-access-control-vulnerability?_s_id=cve)
### Credits
- hunter85 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5189
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 13:54 UTC
- **Last Updated**: August 01, 2024 at 21:03 UTC
- **Reserved Date**: May 21, 2024 at 22:14 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘custom_js’ parameter in all versions up to, and including, 5.9.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**wpdevteam - Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/aa70238b-530e-4c90-82f4-c3113887d0e1?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/tags/5.9.21/includes/Classes/Asset_Builder.php#L264)
3. [](https://plugins.trac.wordpress.org/changeset/3099937/)
### Credits
- wesley |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13171
- **State**: PUBLISHED
- **Published Date**: March 13, 2020 at 18:17 UTC
- **Last Updated**: August 04, 2024 at 23:41 UTC
- **Reserved Date**: July 02, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by one or more stack-based buffer overflow vulnerabilities in the Google Cloud Print implementation that would allow an unauthenticated attacker to execute arbitrary code on the device. This was caused by an insecure handling of the register parameters, because the size used within a memcpy() function, which copied the action value into a local variable, was not checked properly.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.business.xerox.com/)
2. [](https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1633
- **State**: PUBLISHED
- **Published Date**: September 20, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:01 UTC
- **Reserved Date**: March 12, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Password Policy module before 6.x-1.4 and 7.x-1.0 beta3 for Drupal allows remote attackers to hijack the authentication of administrative users for requests that unblock a user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/1401678)
2. [](http://drupalcode.org/project/password_policy.git/commit/3c688c3b4a3ed96fdc4b89883595633338c7ebb6)
3. [[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)](http://www.openwall.com/lists/oss-security/2012/04/07/1)
4. [51385](http://www.securityfocus.com/bid/51385)
5. [47541](http://secunia.com/advisories/47541) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0300, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0300 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0300
- **State**: PUBLISHED
- **Published Date**: June 21, 2018 at 11:00 UTC
- **Last Updated**: November 29, 2024 at 14:59 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the process of uploading new application images to Cisco FXOS on the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance could allow an authenticated, remote attacker using path traversal techniques to create or overwrite arbitrary files on an affected device. The vulnerability is due to insufficient validation during the application image upload process. An attacker could exploit this vulnerability by creating an application image containing malicious code and installing the image on the affected device using the CLI or web-based user interface (web UI). These actions occur prior to signature verification and could allow the attacker to create and execute arbitrary code with root privileges. Note: A missing or invalid signature in the application image will cause the upload process to fail, but does not prevent the exploit. Cisco Bug IDs: CSCvc21901.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - Cisco Firepower 4100 Series Next-Generation Firewall and Firepower 9300 Security Appliance unknown**
Affected versions:
- Cisco Firepower 4100 Series Next-Generation Firewall and Firepower 9300 Security Appliance unknown (Status: affected)
### References
1. [1041169](http://www.securitytracker.com/id/1041169)
2. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepwr-pt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46906
- **State**: PUBLISHED
- **Published Date**: February 26, 2024 at 17:20 UTC
- **Last Updated**: May 04, 2025 at 07:00 UTC
- **Reserved Date**: February 25, 2024 at 13:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: fix info leak in hid_submit_ctrl
In hid_submit_ctrl(), the way of calculating the report length doesn't
take into account that report->size can be zero. When running the
syzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to
calculate transfer_buffer_length as 16384. When this urb is passed to
the usb core layer, KMSAN reports an info leak of 16384 bytes.
To fix this, first modify hid_report_len() to account for the zero
report size case by using DIV_ROUND_UP for the division. Then, call it
from hid_submit_ctrl().
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.4.274 (Status: unaffected)
- 4.9.274 (Status: unaffected)
- 4.14.238 (Status: unaffected)
- 4.19.196 (Status: unaffected)
- 5.4.127 (Status: unaffected)
- 5.10.45 (Status: unaffected)
- 5.12.12 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366)
2. [](https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce)
3. [](https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0)
4. [](https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82)
5. [](https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1)
6. [](https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9)
7. [](https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8)
8. [](https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48121
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 15:45 UTC
- **Last Updated**: May 16, 2025 at 16:50 UTC
- **Reserved Date**: May 15, 2025 at 18:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steve Puddick WP Notes Widget allows DOM-Based XSS. This issue affects WP Notes Widget: from n/a through 1.0.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Steve Puddick - WP Notes Widget**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-notes-widget/vulnerability/wordpress-wp-notes-widget-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- siavashvafshar (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5711, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5711 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5711
- **State**: PUBLISHED
- **Published Date**: June 06, 2025 at 02:00 UTC
- **Last Updated**: June 09, 2025 at 13:40 UTC
- **Reserved Date**: June 05, 2025 at 04:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /Admin/InsertCity.php. The manipulation of the argument cmbState leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Real Estate Property Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311232 | code-projects Real Estate Property Management System InsertCity.php sql injection](https://vuldb.com/?id.311232)
2. [VDB-311232 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311232)
3. [Submit #590522 | code-projects Real Estate Property Management System V1.0 SQL Injection](https://vuldb.com/?submit.590522)
4. [](https://github.com/kingmamalv/cve/issues/4)
5. [](https://code-projects.org/)
### Credits
- lyx050918 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4753, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4753 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4753
- **State**: PUBLISHED
- **Published Date**: December 26, 2014 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 16:52 UTC
- **Reserved Date**: July 02, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.11.9 and earlier allow remote authenticated users to inject arbitrary web script or HTML via (1) the Search field in an inbox action to messaging/messagebox.php, (2) the "First name" field to auth/profile.php, or (3) the Speakers field in an rqAdd action to calendar/agenda.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.xchg.info/?p=406) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5260
- **State**: PUBLISHED
- **Published Date**: December 13, 2019 at 21:52 UTC
- **Last Updated**: August 04, 2024 at 19:47 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. Due to insufficient input validation of specific value when parsing the messages, an attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices to exploit this vulnerability. Successful exploit may cause an infinite loop and the device to reboot.
### Affected Products
**n/a - HUAWEI Y9 2019;Honor View 20**
Affected versions:
- 8.2.0.160(C185R2P2) (Status: affected)
- 8.2.0.162(C605) (Status: affected)
- 8.2.0.163(C605) (Status: affected)
- 9.0.1.169(C636E1R4P1) (Status: affected)
- 9.0.1.170(C185E2R3P1) (Status: affected)
- 9.0.1.170(C432E1R3P1) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190911-01-mobile-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0671
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 08:50 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 18, 2024 at 10:10 UTC
- **Assigned By**: Arm
### Vulnerability Description
Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Midgard GPU Kernel Driver: from r19p0 through r32p0; Bifrost GPU Kernel Driver: from r7p0 through r48p0; Valhall GPU Kernel Driver: from r19p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r48p0.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Arm Ltd - Midgard GPU Kernel Driver**
Affected versions:
- r19p0 (Status: affected)
**Arm Ltd - Bifrost GPU Kernel Driver**
Affected versions:
- r7p0 (Status: affected)
**Arm Ltd - Valhall GPU Kernel Driver**
Affected versions:
- r19p0 (Status: affected)
**Arm Ltd - Arm 5th Gen GPU Architecture Kernel Driver**
Affected versions:
- r41p0 (Status: affected)
### References
1. [](https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29499
- **State**: PUBLISHED
- **Published Date**: March 22, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via /anchor/admin/users/delete/2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/daddywolf/cms/blob/main/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24751, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24751 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24751
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 18:30 UTC
- **Last Updated**: August 01, 2024 at 23:28 UTC
- **Reserved Date**: January 29, 2024 at 20:51 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
sf_event_mgt is an event management and registration extension for the TYPO3 CMS based on ExtBase and Fluid. In affected versions the existing access control check for events in the backend module got broken during the update of the extension to TYPO3 12.4, because the `RedirectResponse` from the `$this->redirect()` function was never handled. This issue has been addressed in version 7.4.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-863: Incorrect Authorization
### Affected Products
**derhansen - sf_event_mgt**
Affected versions:
- >= 7.0.0, < 7.4.0 (Status: affected)
### References
1. [https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-4576-pgh2-g34j](https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-4576-pgh2-g34j)
2. [https://github.com/derhansen/sf_event_mgt/commit/a08c2cd48695c07e462d15eeb70434ddc0206e4c](https://github.com/derhansen/sf_event_mgt/commit/a08c2cd48695c07e462d15eeb70434ddc0206e4c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24899
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 23:45 UTC
- **Last Updated**: April 23, 2025 at 18:29 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**contao - contao**
Affected versions:
- < 4.13.3 (Status: affected)
### References
1. [](https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c)
2. [](https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2)
3. [](https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8241
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 09:30 UTC
- **Last Updated**: September 10, 2024 at 13:28 UTC
- **Reserved Date**: August 27, 2024 at 19:09 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Nova Blocks by Pixelgrade plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' attribute of the 'wp:separator' Gutenberg block in all versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**pixelgrade - Nova Blocks by Pixelgrade**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3011befd-c0c6-4800-a370-e592c3ec483f?source=cve)
2. [](https://wordpress.org/plugins/nova-blocks/#developers)
3. [](https://plugins.trac.wordpress.org/changeset/3148752/)
4. [](https://github.com/pixelgrade/nova-blocks/commit/655b5b804306c3ca3a59707cc2f12098e193b4ca)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33806, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33806
- **State**: PUBLISHED
- **Published Date**: June 03, 2021 at 11:22 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: June 03, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The BDew BdLib library before 1.16.1.7 for Minecraft allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of its use of Java serialization.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bdew.net)
2. [](https://www.curseforge.com/minecraft/mc-mods/bdlib/files/3331330)
3. [](https://vuln.ryotak.me/advisories/46)
4. [](https://github.com/bdew-minecraft/bdlib/commit/447210530ceec72fb3374efecb0930ed359d2297) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44298
- **State**: PUBLISHED
- **Published Date**: January 27, 2023 at 00:00 UTC
- **Last Updated**: March 28, 2025 at 14:49 UTC
- **Reserved Date**: October 30, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SiteServer CMS 7.1.3 is vulnerable to SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/siteserver/cms/issues/3492) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23094
- **State**: PUBLISHED
- **Published Date**: February 22, 2024 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 16:21 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /cover/addons/info_media_gallery/action/edit_addon_post.php
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TinkAnet/cve/blob/main/csrf3.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4706
- **State**: PUBLISHED
- **Published Date**: January 24, 2011 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:55 UTC
- **Reserved Date**: January 24, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123)
2. [GLSA-201206-31](http://security.gentoo.org/glsa/glsa-201206-31.xml)
3. [[oss-security] 20101004 Re: Minor security flaw with pam_xauth](http://openwall.com/lists/oss-security/2010/10/03/1)
4. [46045](http://www.securityfocus.com/bid/46045)
5. [49711](http://secunia.com/advisories/49711)
6. [linuxpam-pamsmclosesession-weak-security(65035)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65035) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1666, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1666 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1666
- **State**: PUBLISHED
- **Published Date**: April 10, 2011 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Metaways Tine 2.0 allows remote attackers to obtain sensitive information via unknown vectors in (1) Crm/Controller.php, (2) Crm/Export/Csv.php, or (3) Calendar/Model/Attender.php, which reveal the full installation path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.htbridge.ch/advisory/path_disclosure_in_tine_2_0.html)
2. [47102](http://www.securityfocus.com/bid/47102)
3. [tine-multiple-info-disc(66558)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66558)
4. [8191](http://securityreason.com/securityalert/8191)
5. [20110331 HTB22909: Path disclosure in Tine 2.0](http://www.securityfocus.com/archive/1/517269/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41560, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41560 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41560
- **State**: PUBLISHED
- **Published Date**: December 12, 2022 at 01:49 UTC
- **Last Updated**: April 22, 2025 at 19:29 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The Statement Set Upload via the Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Denial of Service Attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: version 10.5.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**TIBCO Software Inc. - TIBCO Nimbus**
Affected versions:
- 10.5.0 (Status: affected)
### References
1. [](https://www.tibco.com/services/support/advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45242, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45242 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45242
- **State**: PUBLISHED
- **Published Date**: October 24, 2024 at 00:00 UTC
- **Last Updated**: October 28, 2024 at 19:10 UTC
- **Reserved Date**: August 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242_Extended_Report.pdf)
2. [](https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30729
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 13:42 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 14.6 and iPadOS 14.6. A device may accept invalid activation results.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212528) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13422
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 11:13 UTC
- **Last Updated**: January 23, 2025 at 14:38 UTC
- **Reserved Date**: January 15, 2025 at 18:57 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The SEO Blogger to WordPress Migration using 301 Redirection plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' parameter in all versions up to, and including, 0.4.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**suhas93 - SEO Blogger to WordPress Migration using 301 Redirection**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e095b5-9c0b-45ac-a78d-e50feda348cb?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/seo-blogger-to-wordpress-301-redirector/trunk/seo-blogger-to-wordpress.php#L356)
### Credits
- Colin Xu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24832, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24832
- **State**: PUBLISHED
- **Published Date**: May 18, 2023 at 21:24 UTC
- **Last Updated**: January 21, 2025 at 20:23 UTC
- **Reserved Date**: January 30, 2023 at 21:12 UTC
- **Assigned By**: facebook
### Vulnerability Description
A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
### Affected Products
**Facebook - Hermes**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.facebook.com/security/advisories/cve-2023-24832)
2. [](https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38772, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38772 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38772
- **State**: PUBLISHED
- **Published Date**: August 01, 2024 at 20:49 UTC
- **Last Updated**: August 01, 2024 at 21:02 UTC
- **Reserved Date**: June 19, 2024 at 12:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Crocoblock JetWidgets for Elementor and WooCommerce allows PHP Local File Inclusion.This issue affects JetWidgets for Elementor and WooCommerce: from n/a through 1.1.7.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Crocoblock - JetWidgets for Elementor and WooCommerce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/jetwoo-widgets-for-elementor/wordpress-jetwidgets-for-elementor-and-woocommerce-plugin-1-1-7-contributor-limited-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6505, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6505
- **State**: PUBLISHED
- **Published Date**: October 15, 2014 at 22:03 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70516](http://www.securityfocus.com/bid/70516)
2. [SUSE-SU-2015:0743](http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html)
3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html)
4. [](http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2427
- **State**: PUBLISHED
- **Published Date**: May 05, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 17:53 UTC
- **Reserved Date**: April 30, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**thorsten - thorsten/phpmyfaq**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d)
2. [](https://github.com/thorsten/phpmyfaq/commit/514f4df2ad918e69575028d58b2e33aaf536e59b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-29059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-29059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-29059
- **State**: PUBLISHED
- **Published Date**: November 24, 2020 at 20:58 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default panger123 password for the suma123 account for certain old firmware.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4538
- **State**: PUBLISHED
- **Published Date**: July 01, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 23, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in process.php in the Malware Finder plugin 1.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the query parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11030
- **State**: PUBLISHED
- **Published Date**: December 05, 2017 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: July 07, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the HDMI video driver function hdmi_edid_sysfs_rda_res_info(), userspace can perform an arbitrary write into kernel memory.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39703, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39703
- **State**: PUBLISHED
- **Published Date**: September 01, 2023 at 00:00 UTC
- **Last Updated**: October 01, 2024 at 13:17 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross site scripting (XSS) vulnerability in the Markdown Editor component of Typora v1.6.7 allows attackers to execute arbitrary code via uploading a crafted Markdown file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://c0olw.github.io/2023/07/31/Typora-XSS-Vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1458, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1458
- **State**: PUBLISHED
- **Published Date**: February 03, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: February 03, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Fortinet FortiAuthenticator 3.0.0 allows local users to bypass intended restrictions and gain privileges by creating /tmp/privexec/dbgcore_enable_shell_access and executing the "shell" command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html)
2. [fortinetfortiauthenticator-shell-sec-bypass(100559)](https://exchange.xforce.ibmcloud.com/vulnerabilities/100559)
3. [72378](http://www.securityfocus.com/bid/72378)
4. [](http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1055
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: November 29, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large TACACS+ packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ciscosecure-tacacs-dos(5273)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5273)
2. [20000921 Multiple Vulnerabilities in CiscoSecure ACS for Windows NT Server](http://www.cisco.com/warp/public/707/csecureacsnt-pub.shtml)
3. [1706](http://www.securityfocus.com/bid/1706)
4. [1569](http://www.osvdb.org/1569) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2949, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2949
- **State**: PUBLISHED
- **Published Date**: August 18, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 23:15 UTC
- **Reserved Date**: July 27, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to execute arbitrary code via crafted ID3v2 tags in an MP3 file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1025943](http://www.securitytracker.com/id?1025943)
2. [](http://service.real.com/realplayer/security/08162011_player/en/)
3. [](http://zerodayinitiative.com/advisories/ZDI-11-267/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25843, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25843 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25843
- **State**: PUBLISHED
- **Published Date**: February 27, 2024 at 00:00 UTC
- **Last Updated**: August 29, 2024 at 15:03 UTC
- **Reserved Date**: February 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the module "Import/Update Bulk Product from any Csv/Excel File Pro" (ba_importer) up to version 1.1.28 from Buy Addons for PrestaShop, a guest can perform SQL injection in affected versions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://addons.prestashop.com/en/data-import-export/20579-import-update-bulk-product-from-any-csv-excel-file-pro.html)
2. [](https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44233
- **State**: PUBLISHED
- **Published Date**: October 06, 2023 at 15:04 UTC
- **Last Updated**: February 19, 2025 at 21:21 UTC
- **Reserved Date**: September 27, 2023 at 06:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in FooPlugins Best WordPress Gallery Plugin – FooGallery plugin <= 2.2.44 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**FooPlugins - Best WordPress Gallery Plugin – FooGallery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- FearZzZz (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32714
- **State**: PUBLISHED
- **Published Date**: July 07, 2021 at 19:35 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**hyperium - hyper**
Affected versions:
- < 0.14.10 (Status: affected)
### References
1. [](https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0282
- **State**: PUBLISHED
- **Published Date**: January 20, 2022 at 11:15 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 19, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Cross-site Scripting in Packagist microweber/microweber prior to 1.2.11.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**microweber - microweber/microweber**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd)
2. [](https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20073, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20073 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20073
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 19:38 UTC
- **Last Updated**: August 03, 2024 at 02:02 UTC
- **Reserved Date**: October 12, 2021 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In preloader (usb), there is a possible out of bounds write due to a integer underflow. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160841; Issue ID: ALPS06160841.
### Affected Products
**MediaTek, Inc. - MT2601, MT6580, MT6735, MT6739, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6799, MT6833, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8183, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8667, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797**
Affected versions:
- Android 10.0, 11.0, 12.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/April-2022) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21103, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21103 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21103
- **State**: PUBLISHED
- **Published Date**: April 16, 2024 at 21:26 UTC
- **Last Updated**: March 13, 2025 at 16:13 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Linux hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3564
- **State**: PUBLISHED
- **Published Date**: November 16, 2005 at 07:37 UTC
- **Last Updated**: August 07, 2024 at 23:17 UTC
- **Reserved Date**: November 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
envd daemon in HP-UX B.11.00 through B.11.11 allows local users to obtain privileges via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1015172](http://securitytracker.com/id?1015172)
2. [oval:org.mitre.oval:def:1572](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1572)
3. [hpux-envd-gain-privilege(23039)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23039)
4. [SSRT051012](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561)
5. [20678](http://www.osvdb.org/20678)
6. [17506](http://secunia.com/advisories/17506)
7. [15359](http://www.securityfocus.com/bid/15359)
8. [HPSBUX02073](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561)
9. [oval:org.mitre.oval:def:1429](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1429)
10. [ADV-2005-2357](http://www.vupen.com/english/advisories/2005/2357) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3169, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3169 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3169
- **State**: PUBLISHED
- **Published Date**: September 09, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: August 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=581784)
2. [SUSE-SA:2010:049](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html)
3. [](https://bugzilla.mozilla.org/show_bug.cgi?id=583225)
4. [](http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox)
5. [FEDORA-2010-14362](http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html)
6. [](http://support.avaya.com/css/P8/documents/100110210)
7. [](https://bugzilla.mozilla.org/show_bug.cgi?id=532730)
8. [oval:org.mitre.oval:def:12145](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12145)
9. [](http://support.avaya.com/css/P8/documents/100112690)
10. [mozilla-safety-code-execution(61657)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61657)
11. [](https://bugzilla.mozilla.org/show_bug.cgi?id=564461)
12. [42867](http://secunia.com/advisories/42867)
13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=584357)
14. [ADV-2011-0061](http://www.vupen.com/english/advisories/2011/0061)
15. [](https://bugzilla.mozilla.org/show_bug.cgi?id=572232)
16. [MDVSA-2010:173](http://www.mandriva.com/security/advisories?name=MDVSA-2010:173)
17. [](https://bugzilla.mozilla.org/show_bug.cgi?id=568465)
18. [ADV-2010-2323](http://www.vupen.com/english/advisories/2010/2323)
19. [](http://www.mozilla.org/security/announce/2010/mfsa2010-49.html)
20. [DSA-2106](http://www.debian.org/security/2010/dsa-2106)
21. [43118](http://www.securityfocus.com/bid/43118) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-15970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-15970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15970
- **State**: PUBLISHED
- **Published Date**: October 29, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 20:13 UTC
- **Reserved Date**: October 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP CityPortal 2.0 allows SQL Injection via the nid parameter to index.php in a page=news action, or the cat parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/144440/PHP-CityPortal-2.0-SQL-Injection.html)
2. [43089](https://www.exploit-db.com/exploits/43089/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29158
- **State**: PUBLISHED
- **Published Date**: April 23, 2021 at 20:34 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sonatype Nexus Repository Manager 3 Pro up to and including 3.30.0 has Incorrect Access Control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.sonatype.com/hc/en-us/categories/201980768-Welcome-to-the-Sonatype-Support-Knowledge-Base)
2. [](https://support.sonatype.com/hc/en-us/articles/1500006126462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0875
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:37 UTC
- **Reserved Date**: December 11, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Internet Explorer 5.5 and 6.0 allows remote attackers to cause the File Download dialogue box to misrepresent the name of the file in the dialogue in a way that could fool users into thinking that the file type is safe to download.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011126 File extensions spoofable in MSIE download dialog](http://www.securityfocus.com/archive/1/245594)
2. [ie-file-download-ext-spoof(7636)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7636)
3. [oval:org.mitre.oval:def:1014](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1014)
4. [3597](http://www.securityfocus.com/bid/3597)
5. [MS01-058](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-058) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-45343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-45343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-45343
- **State**: PUBLISHED
- **Published Date**: May 28, 2025 at 00:00 UTC
- **Last Updated**: May 28, 2025 at 15:44 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing functionality of the account module in the goform/setmodules route.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tenda.com.cn/)
2. [](http://w18e.com)
3. [](https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8002
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 19:32 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-41.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20172, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20172
- **State**: PUBLISHED
- **Published Date**: May 18, 2023 at 00:00 UTC
- **Last Updated**: October 24, 2024 at 17:00 UTC
- **Reserved Date**: October 27, 2022 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-602: Security Weakness
### Affected Products
**Cisco - Cisco Identity Services Engine Software **
Affected versions:
- n/a (Status: affected)
### References
1. [20230517 Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4034
- **State**: PUBLISHED
- **Published Date**: December 02, 2011 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 23:16 UTC
- **Reserved Date**: October 13, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.scada.schneider-electric.com/sites/scada/en/login/historian-vulnerability.page)
2. [](http://www.us-cert.gov/control_systems/pdf/ICSA-11-307-01.pdf)
3. [](http://www.citect.com/index.php?option=com_content&view=article&id=1656&Itemid=1695) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1559
- **State**: PUBLISHED
- **Published Date**: May 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:51 UTC
- **Reserved Date**: May 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The web module in Neteyes Nexusway allows remote attackers to execute arbitrary commands via hex-encoded shell metacharacters in the ip parameter for (1) nslookup.cgi or (2) ping.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [15150](http://secunia.com/advisories/15150)
2. [20050511 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability](http://marc.info/?l=bugtraq&m=111585017832066&w=2)
3. [nexusway-web-command-execution(20557)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20557)
4. [20050510 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability](http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033945.html)
5. [16449](http://www.osvdb.org/16449)
6. [16448](http://www.osvdb.org/16448) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1154
- **State**: REJECTED
- **Published Date**: July 24, 2017 at 16:00 UTC
- **Last Updated**: July 24, 2017 at 15:57 UTC
- **Reserved Date**: March 29, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25942
- **State**: PUBLISHED
- **Published Date**: February 19, 2025 at 00:00 UTC
- **Last Updated**: February 20, 2025 at 14:39 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/993) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40410
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 00:00 UTC
- **Last Updated**: November 25, 2024 at 19:50 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain a hardcoded cryptographic key used for encryption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.cybelesoft.com/thinfinity-workspace-security-bulletin-nov-2024/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2315
- **State**: PUBLISHED
- **Published Date**: September 21, 2022 at 07:50 UTC
- **Last Updated**: May 28, 2025 at 15:27 UTC
- **Reserved Date**: July 05, 2022 at 00:00 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Database Software Accreditation Tracking/Presentation Module product before version 2 has an unauthenticated SQL Injection vulnerability. This is fixed in version 2.
### CVSS Metrics
- **CVSS Base Score**: 9.4/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Database Software - Database Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-22-0634)
### Credits
- Bartu Utku Sarp |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6237
- **State**: PUBLISHED
- **Published Date**: December 27, 2017 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 07:15 UTC
- **Reserved Date**: August 14, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The RPC service in Tripwire (formerly nCircle) IP360 VnE Manager 7.2.2 before 7.2.6 allows remote attackers to bypass authentication and (1) enumerate users, (2) reset passwords, or (3) manipulate IP filter restrictions via crafted "privileged commands."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20151002 CVE-2015-6237 - Tripwire IP360 VnE Remote Administrative API Authentication Bypass/Privilege Acquisition Vulnerability](http://www.securityfocus.com/archive/1/536609/100/0/threaded)
2. [20151005 CVE-2015-6237 - Tripwire IP360 VnE Remote Administrative API Authentication Bypass/Privilege Acquisition Vulnerability](http://seclists.org/fulldisclosure/2015/Oct/20) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24650, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24650 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24650
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:24 UTC
- **Last Updated**: January 24, 2025 at 18:58 UTC
- **Reserved Date**: January 23, 2025 at 14:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in Themefic Tourfic allows Upload a Web Shell to a Web Server. This issue affects Tourfic: from n/a through 2.15.3.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Themefic - Tourfic**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- l8BL (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3357, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3357
- **State**: PUBLISHED
- **Published Date**: September 25, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco IOS 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.3.xSE before 3.3.2SE, 3.3.xXO before 3.3.1XO, 3.5.xE before 3.5.2E, and 3.11.xS before 3.11.1S allow remote attackers to cause a denial of service (device reload) via malformed mDNS packets, aka Bug ID CSCul90866.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [70132](http://www.securityfocus.com/bid/70132)
2. [](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns/cvrf/cisco-sa-20140924-mdns_cvrf.xml)
3. [20140924 Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns)
4. [ciscoios-cve20143357-dos(96182)](https://exchange.xforce.ibmcloud.com/vulnerabilities/96182)
5. [1030898](http://www.securitytracker.com/id/1030898) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13588, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13588
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 04:21 UTC
- **Last Updated**: February 18, 2025 at 15:09 UTC
- **Reserved Date**: January 21, 2025 at 14:42 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Simplebooklet PDF Viewer and Embedder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simplebooklet' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**kenkwasnicki - Simplebooklet PDF Viewer and Embedder**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/59d9ff2e-4b0b-4096-91ca-1a029f31796b?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/simplebooklet/trunk/simplebooklet.php)
3. [](https://wordpress.org/plugins/simplebooklet/)
### Credits
- zakaria |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30683, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30683
- **State**: PUBLISHED
- **Published Date**: September 08, 2021 at 14:28 UTC
- **Last Updated**: August 03, 2024 at 22:40 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application could execute arbitrary code leading to compromise of user information.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212529)
2. [](https://support.apple.com/en-us/HT212530)
3. [](https://support.apple.com/en-us/HT212531) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24998
- **State**: PUBLISHED
- **Published Date**: February 20, 2023 at 15:57 UTC
- **Last Updated**: February 13, 2025 at 16:44 UTC
- **Reserved Date**: February 01, 2023 at 10:32 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Commons FileUpload**
Affected versions:
- 0 (Status: affected)
**Apache Software Foundation - Apache Tomcat**
Affected versions:
- 11.0.0-M1 (Status: affected)
- 10.0.0-M1 (Status: affected)
- 9.0.0-M1 (Status: affected)
- 8.5.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy)
2. [](http://www.openwall.com/lists/oss-security/2023/05/22/1)
3. [](https://security.gentoo.org/glsa/202305-37)
4. [](https://www.debian.org/security/2023/dsa-5522)
5. [](https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html)
### Credits
- Jakob Ackermann |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9197
- **State**: PUBLISHED
- **Published Date**: April 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 06, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI command parser of the Cisco Mobility Express 2800 and 3800 Series Wireless LAN Controllers could allow an authenticated, local attacker to obtain access to the underlying operating system shell with root-level privileges. More Information: CSCvb70351. Known Affected Releases: 8.3(102.0).
### Affected Products
**n/a - Cisco Mobility Express 2800 and 3800 Series Wireless LAN Controllers**
Affected versions:
- Cisco Mobility Express 2800 and 3800 Series Wireless LAN Controllers (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-cme)
2. [97469](http://www.securityfocus.com/bid/97469) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9988
- **State**: PUBLISHED
- **Published Date**: April 10, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 10, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20180925 [SECURITY] [DLA 1518-1] polarssl security update](https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html)
2. [](https://github.com/ARMmbed/mbedtls/commit/a1098f81c252b317ad34ea978aea2bc47760b215)
3. [](https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released)
4. [](https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1)
5. [[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update](https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0328
- **State**: PUBLISHED
- **Published Date**: February 28, 2022 at 09:06 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 21, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Simple Membership WordPress plugin before 4.0.9 does not have CSRF check when deleting members in bulk, which could allow attackers to make a logged in admin delete them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Simple Membership**
Affected versions:
- 4.0.9 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9)
2. [](https://plugins.trac.wordpress.org/changeset/2662855)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14662
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: September 21, 2017 at 00:00 UTC
- **Assigned By**: forcepoint
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44399
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 16:55 UTC
- **Last Updated**: September 19, 2024 at 14:18 UTC
- **Reserved Date**: September 28, 2023 at 17:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-640: Security Weakness
### Affected Products
**zitadel - zitadel**
Affected versions:
- < 2.37.3 (Status: affected)
### References
1. [https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff](https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff)
2. [https://github.com/zitadel/zitadel/releases/tag/v2.37.3](https://github.com/zitadel/zitadel/releases/tag/v2.37.3)
3. [https://github.com/zitadel/zitadel/releases/tag/v2.38.0](https://github.com/zitadel/zitadel/releases/tag/v2.38.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37146, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37146
- **State**: PUBLISHED
- **Published Date**: September 28, 2021 at 12:08 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 21, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An infinite loop in Open Robotics ros_comm XMLRPC server in ROS Melodic through 1.4.11 and ROS Noetic through1.15.11 allows remote attackers to cause a Denial of Service in ros_comm via a crafted XMLRPC call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ros/ros_comm)
2. [](https://discourse.ros.org/t/new-packages-for-melodic-2021-09-27/22446)
3. [](https://discourse.ros.org/t/new-packages-for-noetic-2021-09-27/22447) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25621
- **State**: PUBLISHED
- **Published Date**: March 11, 2022 at 17:54 UTC
- **Last Updated**: August 03, 2024 at 04:42 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: NEC
### Vulnerability Description
UUNIVERGE WA 1020 Ver8.2.11 and prior, UNIVERGE WA 1510 Ver8.2.11 and prior, UNIVERGE WA 1511 Ver8.2.11 and prior, UNIVERGE WA 1512 Ver8.2.11 and prior, UNIVERGE WA 2020 Ver8.2.11 and prior, UNIVERGE WA 2021 Ver8.2.11 and prior, UNIVERGE WA 2610-AP Ver8.2.11 and prior, UNIVERGE WA 2611-AP Ver8.2.11 and prior, UNIVERGE WA 2611E-AP Ver8.2.11 and prior, UNIVERGE WA WA2612-AP Ver8.2.11 and prior allows a remote attacker to execute arbitrary OS commands.
### Affected Products
**NEC Platforms, Ltd. - UNIVERGE DT**
Affected versions:
- UNIVERGE WA 1020 Ver8.2.11 and prior, UNIVERGE WA 1510 Ver8.2.11 and prior, UNIVERGE WA 1511 Ver8.2.11 and prior, UNIVERGE WA 1512 Ver8.2.11 and prior, UNIVERGE WA 2020 Ver8.2.11 and prior, UNIVERGE WA 2021 Ver8.2.11 and prior, UNIVERGE WA 2610-AP Ver8.2.11 and prior, UNIVERGE WA 2611-AP Ver8.2.11 and prior, UNIVERGE WA 2611E-AP Ver8.2.11 and prior, UNIVERGE WA WA2612-AP Ver8.2.11 and prior, (Status: affected)
### References
1. [](https://jpn.nec.com/security-info/secinfo/nv22-004_en.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23195, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23195
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 21:22 UTC
- **Last Updated**: January 22, 2025 at 14:49 UTC
- **Reserved Date**: January 13, 2025 at 14:34 UTC
- **Assigned By**: apache
### Vulnerability Description
An XML External Entity (XXE) vulnerability exists in the Ambari/Oozie
project, allowing an attacker to inject malicious XML entities. This
vulnerability occurs due to insecure parsing of XML input using the
`DocumentBuilderFactory` class without disabling external entity
resolution. An attacker can exploit this vulnerability to read arbitrary
files on the server or perform server-side request forgery (SSRF)
attacks. The issue has been fixed in both Ambari 2.7.9 and the trunk
branch.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Ambari**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/hsb6mvxd7g37dq1ygtd0pd88gs9tfcwq) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4492
- **State**: PUBLISHED
- **Published Date**: January 30, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 11:20 UTC
- **Reserved Date**: June 20, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html)
2. [](https://code.google.com/p/google-security-research/issues/detail?id=92)
3. [114862](http://www.osvdb.org/114862)
4. [](http://support.apple.com/HT204245)
5. [](http://support.apple.com/HT204246)
6. [APPLE-SA-2015-01-27-2](http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html)
7. [](http://support.apple.com/HT204244)
8. [35847](http://www.exploit-db.com/exploits/35847)
9. [APPLE-SA-2015-01-27-1](http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html)
10. [APPLE-SA-2015-01-27-4](http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34561
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 00:00 UTC
- **Last Updated**: November 08, 2024 at 15:43 UTC
- **Reserved Date**: June 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A buffer overflow in the level parsing code of RobTop Games AB Geometry Dash v2.113 allows attackers to execute arbitrary code via entering a Geometry Dash level.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=DMxucOWfLPc)
2. [](https://www.youtube.com/watch?v=kAeJvY6BBps)
3. [](https://www.youtube.com/watch?v=ev0VXbiduuQ)
4. [](https://www.youtube.com/watch?v=u7eXBr4HkKQ)
5. [](https://www.youtube.com/watch?v=RGMeWPchScg)
6. [](https://github.com/meltah/gd-rce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7220
- **State**: PUBLISHED
- **Published Date**: January 23, 2020 at 17:41 UTC
- **Last Updated**: August 04, 2024 at 09:25 UTC
- **Reserved Date**: January 17, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.hashicorp.com/blog/category/vault/)
2. [](https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#132-january-22nd-2020) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3302, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3302
- **State**: PUBLISHED
- **Published Date**: February 12, 2017 at 04:43 UTC
- **Last Updated**: October 08, 2024 at 20:13 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 5.5.54 and earlier (Status: affected)
- 5.6.20 and earlier (Status: affected)
### References
1. [96162](http://www.securityfocus.com/bid/96162)
2. [RHSA-2017:2787](https://access.redhat.com/errata/RHSA-2017:2787)
3. [1038287](http://www.securitytracker.com/id/1038287)
4. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
5. [RHSA-2018:0574](https://access.redhat.com/errata/RHSA-2018:0574)
6. [RHSA-2018:0279](https://access.redhat.com/errata/RHSA-2018:0279)
7. [DSA-3834](http://www.debian.org/security/2017/dsa-3834)
8. [DSA-3809](http://www.debian.org/security/2017/dsa-3809)
9. [](http://www.openwall.com/lists/oss-security/2017/02/11/11)
10. [RHSA-2017:2192](https://access.redhat.com/errata/RHSA-2017:2192) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2340
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:43 UTC
- **Last Updated**: September 26, 2024 at 14:05 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
### CVSS Metrics
- **CVSS Base Score**: 2.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.25 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
2. [](https://security.netapp.com/advisory/ntap-20210723-0001/)
3. [FEDORA-2021-dc4299a8d0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/)
4. [FEDORA-2021-df40c41094](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1010022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1010022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1010022
- **State**: PUBLISHED
- **Published Date**: July 15, 2019 at 03:00 UTC
- **Last Updated**: November 15, 2024 at 15:04 UTC
- **Reserved Date**: March 20, 2019 at 00:00 UTC
- **Assigned By**: dwf
### Vulnerability Description
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
### Affected Products
**GNU C Library - glibc**
Affected versions:
- current (At least as of 2018-02-16) (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22850)
2. [CVE-2019-1010022](https://security-tracker.debian.org/tracker/CVE-2019-1010022)
3. [CVE-2019-1010022](https://ubuntu.com/security/CVE-2019-1010022)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6262, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6262 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6262
- **State**: PUBLISHED
- **Published Date**: September 07, 2016 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 01:22 UTC
- **Reserved Date**: July 21, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160721 Re: CVE request: multiple issues fixed in GNU libidn 1.33](http://www.openwall.com/lists/oss-security/2016/07/21/4)
2. [openSUSE-SU-2016:2135](http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html)
3. [[oss-security] 20160720 CVE request: multiple issues fixed in GNU libidn 1.33](http://www.openwall.com/lists/oss-security/2016/07/20/6)
4. [openSUSE-SU-2016:1924](http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html)
5. [92070](http://www.securityfocus.com/bid/92070)
6. [[help-libidn] 20160720 Libidn 1.33 released](https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html)
7. [](http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60)
8. [USN-3068-1](http://www.ubuntu.com/usn/USN-3068-1)
9. [[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E)
10. [[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42046
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 20:48 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 06, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the GlobalWatchlist extension in MediaWiki through 1.36.2. The rev-deleted-user and ntimes messages were not properly escaped and allowed for users to inject HTML and JavaScript.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T286385)
2. [](https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d)
3. [](https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31299
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 14:53 UTC
- **Reserved Date**: April 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code via the Barcode field of a container.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/en/security-advisories/usd-2022-0055/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1732
- **State**: PUBLISHED
- **Published Date**: June 21, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:34 UTC
- **Reserved Date**: June 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Actinic Catalog 4.7.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string argument to certain .pl files, (2) the REFPAGE parameter to ca000007.pl, (3) PRODREF parameter to ss000007.pl, or (4) hop parameter to ca000001.pl.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [actinic-html-tags-css(8180)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8180)
2. [1003502](http://securitytracker.com/id?1003502)
3. [27095](http://www.osvdb.org/27095)
4. [20060720 vendor ack/fix: Actinic Catalog Unspecified .pl Files XSS (fwd)](http://www.attrition.org/pipermail/vim/2006-July/000929.html)
5. [27097](http://www.osvdb.org/27097)
6. [4042](http://www.securityfocus.com/bid/4042)
7. [27098](http://www.osvdb.org/27098)
8. [27096](http://www.osvdb.org/27096) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0201
- **State**: PUBLISHED
- **Published Date**: January 10, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:39 UTC
- **Reserved Date**: January 09, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27128](http://www.securityfocus.com/bid/27128)
2. [](http://websecurity.com.ua/1454/)
3. [](http://securityvulns.ru/Sdocument472.html)
4. [20080103 securityvulns.com russian vulnerabilities digest](http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html)
5. [20080103 securityvulns.com russian vulnerabilities digest](http://www.securityfocus.com/archive/1/485786/100/0/threaded)
6. [3539](http://securityreason.com/securityalert/3539)
7. [expressionengine-index-xss(39442)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39442) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-48020, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-48020 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-48020
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 18:15 UTC
- **Last Updated**: October 11, 2024 at 18:34 UTC
- **Reserved Date**: October 08, 2024 at 13:14 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Revmakx - Backup and Staging by WP Time Capsule**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-time-capsule/wordpress-backup-and-staging-by-wp-time-capsule-plugin-1-22-21-sql-injection-vulnerability?_s_id=cve)
### Credits
- Hakiduck (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000652
- **State**: PUBLISHED
- **Published Date**: August 20, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: August 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JabRef version <=4.3.1 contains a XML External Entity (XXE) vulnerability in MsBibImporter XML Parser that can result in disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted MsBib file. This vulnerability appears to have been fixed in after commit 89f855d.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/JabRef/jabref/issues/4229)
2. [](https://0dd.zone/2018/08/08/JabRef-XXE/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35510
- **State**: PUBLISHED
- **Published Date**: May 28, 2024 at 19:35 UTC
- **Last Updated**: February 13, 2025 at 15:58 UTC
- **Reserved Date**: May 17, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file upload vulnerability in /dede/file_manage_control.php of DedeCMS v5.7.114 allows attackers to execute arbitrary code via uploading a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/QianGeG/CVE/issues/14) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45783
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 10:22 UTC
- **Last Updated**: August 04, 2024 at 04:47 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bookeen Notea Firmware BK_R_1.0.5_20210608 is affected by a directory traversal vulnerability that allows an attacker to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bookeen.com)
2. [](https://github.com/cmaillioux/SecurityResearch/blob/main/CVE-2021-45783)
3. [](http://packetstormsecurity.com/files/167016/Bookeen-Notea-BK_R_1.0.5_20210608-Directory-Traversal.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0499
- **State**: PUBLISHED
- **Published Date**: February 10, 2009 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 04:40 UTC
- **Reserved Date**: February 09, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the forum code in Moodle 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to delete unauthorized forum posts via a link or IMG tag to post.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SR:2009:007](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html)
2. [](http://cvs.moodle.org/moodle/mod/forum/post.php?r1=1.154.2.14&r2=1.154.2.15)
3. [](http://moodle.org/security/)
4. [34418](http://secunia.com/advisories/34418)
5. [[oss-security] 20090204 CVS request - Moodle](http://www.openwall.com/lists/oss-security/2009/02/04/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13070
- **State**: PUBLISHED
- **Published Date**: July 02, 2018 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 03:23 UTC
- **Reserved Date**: July 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for EncryptedToken (ECC), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/VenusADLab/EtherTokens/blob/master/EncryptedToken/EncryptedToken.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3531
- **State**: PUBLISHED
- **Published Date**: July 12, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 18:30 UTC
- **Reserved Date**: July 12, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
includes/editor/insert_image.php in Pivot 1.30 RC2 and earlier creates the authentication credentials from parameters, which allows remote attackers to obtain privileges and upload arbitrary files via modified (1) pass and (2) session parameters, and (3) pass and (4) userlevel indices of the (a) Pivot_Vars[] or (b) Users[] array parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060707 Pivot <=1.30rc2 privilege escalation / remote commands execution](http://www.securityfocus.com/archive/1/439495/100/0/threaded)
2. [](http://retrogod.altervista.org/pivot_130RC2_xpl.html)
3. [ADV-2006-2744](http://www.vupen.com/english/advisories/2006/2744)
4. [pivot-insertimage-file-upload(27671)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27671)
5. [20962](http://secunia.com/advisories/20962)
6. [18881](http://www.securityfocus.com/bid/18881)
7. [1214](http://securityreason.com/securityalert/1214)
8. [27126](http://www.osvdb.org/27126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6451
- **State**: PUBLISHED
- **Published Date**: December 19, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 16:11 UTC
- **Reserved Date**: December 19, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27777](http://secunia.com/advisories/27777)
2. [](https://issues.rpath.com/browse/RPL-1975)
3. [29048](http://secunia.com/advisories/29048)
4. [](http://www.wireshark.org/security/wnpa-sec-2007-03.html)
5. [28564](http://secunia.com/advisories/28564)
6. [20080103 rPSA-2008-0004-1 tshark wireshark](http://www.securityfocus.com/archive/1/485792/100/0/threaded)
7. [GLSA-200712-23](http://security.gentoo.org/glsa/glsa-200712-23.xml)
8. [RHSA-2008:0059](http://www.redhat.com/support/errata/RHSA-2008-0059.html)
9. [28304](http://secunia.com/advisories/28304)
10. [28325](http://secunia.com/advisories/28325)
11. [MDVSA-2008:1](http://www.mandriva.com/security/advisories?name=MDVSA-2008:1)
12. [wireshark-cip-dissector-dos(39187)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39187)
13. [MDVSA-2008:001](http://www.mandriva.com/security/advisories?name=MDVSA-2008:001)
14. [RHSA-2008:0058](http://www.redhat.com/support/errata/RHSA-2008-0058.html)
15. [SUSE-SR:2008:004](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html)
16. [](http://bugs.gentoo.org/show_bug.cgi?id=199958)
17. [28315](http://secunia.com/advisories/28315)
18. [28583](http://secunia.com/advisories/28583)
19. [27071](http://www.securityfocus.com/bid/27071)
20. [28288](http://secunia.com/advisories/28288)
21. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004)
22. [oval:org.mitre.oval:def:9685](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9685)
23. [DSA-1446](http://www.debian.org/security/2008/dsa-1446) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28542
- **State**: PUBLISHED
- **Published Date**: July 04, 2023 at 04:46 UTC
- **Last Updated**: August 02, 2024 at 13:43 UTC
- **Reserved Date**: March 17, 2023 at 11:41 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory Corruption in WLAN HOST while fetching TX status information.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- 315 5G IoT Modem (Status: affected)
- APQ8064AU (Status: affected)
- AQT1000 (Status: affected)
- AR8031 (Status: affected)
- AR8035 (Status: affected)
- C-V2X 9150 (Status: affected)
- CSRA6620 (Status: affected)
- CSRA6640 (Status: affected)
- CSRB31024 (Status: affected)
- FastConnect 6200 (Status: affected)
- FastConnect 6700 (Status: affected)
- FastConnect 6800 (Status: affected)
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- Flight RB5 5G Platform (Status: affected)
- MDM9250 (Status: affected)
- MDM9628 (Status: affected)
- MDM9650 (Status: affected)
- MSM8996AU (Status: affected)
- QAM8255P (Status: affected)
- QAM8295P (Status: affected)
- QCA6174A (Status: affected)
- QCA6175A (Status: affected)
- QCA6310 (Status: affected)
- QCA6320 (Status: affected)
- QCA6335 (Status: affected)
- QCA6391 (Status: affected)
- QCA6420 (Status: affected)
- QCA6421 (Status: affected)
- QCA6426 (Status: affected)
- QCA6430 (Status: affected)
- QCA6431 (Status: affected)
- QCA6436 (Status: affected)
- QCA6554A (Status: affected)
- QCA6564 (Status: affected)
- QCA6564A (Status: affected)
- QCA6564AU (Status: affected)
- QCA6574 (Status: affected)
- QCA6574A (Status: affected)
- QCA6574AU (Status: affected)
- QCA6584 (Status: affected)
- QCA6584AU (Status: affected)
- QCA6595 (Status: affected)
- QCA6595AU (Status: affected)
- QCA6696 (Status: affected)
- QCA6698AQ (Status: affected)
- QCA6797AQ (Status: affected)
- QCA8081 (Status: affected)
- QCA8337 (Status: affected)
- QCA9367 (Status: affected)
- QCA9377 (Status: affected)
- QCM2290 (Status: affected)
- QCM4290 (Status: affected)
- QCM6125 (Status: affected)
- QCM6490 (Status: affected)
- QCN6024 (Status: affected)
- QCN9011 (Status: affected)
- QCN9012 (Status: affected)
- QCN9024 (Status: affected)
- QCN9074 (Status: affected)
- QCS2290 (Status: affected)
- QCS410 (Status: affected)
- QCS4290 (Status: affected)
- QCS610 (Status: affected)
- QCS6125 (Status: affected)
- QCS6490 (Status: affected)
- QCS8250 (Status: affected)
- QRB5165M (Status: affected)
- QRB5165N (Status: affected)
- Qualcomm Video Collaboration VC1 Platform (Status: affected)
- Qualcomm Video Collaboration VC3 Platform (Status: affected)
- Qualcomm Video Collaboration VC5 Platform (Status: affected)
- Robotics RB3 Platform (Status: affected)
- Robotics RB5 Platform (Status: affected)
- SA4150P (Status: affected)
- SA4155P (Status: affected)
- SA6145P (Status: affected)
- SA6150P (Status: affected)
- SA6155 (Status: affected)
- SA6155P (Status: affected)
- SA8145P (Status: affected)
- SA8150P (Status: affected)
- SA8155 (Status: affected)
- SA8155P (Status: affected)
- SA8195P (Status: affected)
- SA8255P (Status: affected)
- SA8295P (Status: affected)
- SD 675 (Status: affected)
- SD 8 Gen1 5G (Status: affected)
- SD660 (Status: affected)
- SD670 (Status: affected)
- SD675 (Status: affected)
- SD730 (Status: affected)
- SD835 (Status: affected)
- SD855 (Status: affected)
- SD865 5G (Status: affected)
- SD888 (Status: affected)
- SDX20M (Status: affected)
- SDX55 (Status: affected)
- SM4125 (Status: affected)
- SM6250 (Status: affected)
- SM6250P (Status: affected)
- SM7250P (Status: affected)
- SM7315 (Status: affected)
- SM7325P (Status: affected)
- Smart Audio 400 Platform (Status: affected)
- Snapdragon 4 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 4 Gen 2 Mobile Platform (Status: affected)
- Snapdragon 460 Mobile Platform (Status: affected)
- Snapdragon 480 5G Mobile Platform (Status: affected)
- Snapdragon 480+ 5G Mobile Platform (SM4350-AC) (Status: affected)
- Snapdragon 630 Mobile Platform (Status: affected)
- Snapdragon 636 Mobile Platform (Status: affected)
- Snapdragon 660 Mobile Platform (Status: affected)
- Snapdragon 662 Mobile Platform (Status: affected)
- Snapdragon 665 Mobile Platform (Status: affected)
- Snapdragon 670 Mobile Platform (Status: affected)
- Snapdragon 675 Mobile Platform (Status: affected)
- Snapdragon 678 Mobile Platform (SM6150-AC) (Status: affected)
- Snapdragon 680 4G Mobile Platform (Status: affected)
- Snapdragon 685 4G Mobile Platform (SM6225-AD) (Status: affected)
- Snapdragon 690 5G Mobile Platform (Status: affected)
- Snapdragon 695 5G Mobile Platform (Status: affected)
- Snapdragon 710 Mobile Platform (Status: affected)
- Snapdragon 720G Mobile Platform (Status: affected)
- Snapdragon 730 Mobile Platform (SM7150-AA) (Status: affected)
- Snapdragon 730G Mobile Platform (SM7150-AB) (Status: affected)
- Snapdragon 732G Mobile Platform (SM7150-AC) (Status: affected)
- Snapdragon 750G 5G Mobile Platform (Status: affected)
- Snapdragon 765 5G Mobile Platform (SM7250-AA) (Status: affected)
- Snapdragon 765G 5G Mobile Platform (SM7250-AB) (Status: affected)
- Snapdragon 768G 5G Mobile Platform (SM7250-AC) (Status: affected)
- Snapdragon 778G 5G Mobile Platform (Status: affected)
- Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) (Status: affected)
- Snapdragon 780G 5G Mobile Platform (Status: affected)
- Snapdragon 782G Mobile Platform (SM7325-AF) (Status: affected)
- Snapdragon 7c+ Gen 3 Compute (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- Snapdragon 8+ Gen 1 Mobile Platform (Status: affected)
- Snapdragon 820 Automotive Platform (Status: affected)
- Snapdragon 835 Mobile PC Platform (Status: affected)
- Snapdragon 845 Mobile Platform (Status: affected)
- Snapdragon 855 Mobile Platform (Status: affected)
- Snapdragon 855+/860 Mobile Platform (SM8150-AC) (Status: affected)
- Snapdragon 865 5G Mobile Platform (Status: affected)
- Snapdragon 865+ 5G Mobile Platform (SM8250-AB) (Status: affected)
- Snapdragon 870 5G Mobile Platform (SM8250-AC) (Status: affected)
- Snapdragon 888 5G Mobile Platform (Status: affected)
- Snapdragon 888+ 5G Mobile Platform (SM8350-AC) (Status: affected)
- Snapdragon AR2 Gen 1 Platform (Status: affected)
- Snapdragon Auto 5G Modem-RF (Status: affected)
- Snapdragon W5+ Gen 1 Wearable Platform (Status: affected)
- Snapdragon X20 LTE Modem (Status: affected)
- Snapdragon X24 LTE Modem (Status: affected)
- Snapdragon X5 LTE Modem (Status: affected)
- Snapdragon X50 5G Modem-RF System (Status: affected)
- Snapdragon X55 5G Modem-RF System (Status: affected)
- Snapdragon X65 5G Modem-RF System (Status: affected)
- Snapdragon XR1 Platform (Status: affected)
- Snapdragon XR2 5G Platform (Status: affected)
- Snapdragon XR2+ Gen 1 Platform (Status: affected)
- Snapdragon Auto 4G Modem (Status: affected)
- SW5100 (Status: affected)
- SW5100P (Status: affected)
- SXR1120 (Status: affected)
- SXR2130 (Status: affected)
- Vision Intelligence 400 Platform (Status: affected)
- WCD9326 (Status: affected)
- WCD9335 (Status: affected)
- WCD9340 (Status: affected)
- WCD9341 (Status: affected)
- WCD9360 (Status: affected)
- WCD9370 (Status: affected)
- WCD9371 (Status: affected)
- WCD9375 (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3910 (Status: affected)
- WCN3950 (Status: affected)
- WCN3980 (Status: affected)
- WCN3988 (Status: affected)
- WCN3990 (Status: affected)
- WCN6740 (Status: affected)
- WSA8810 (Status: affected)
- WSA8815 (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11175
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 10:00 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: March 31, 2020 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
u'Use after free issue in Bluetooth transport driver when a method in the object is accessed after the object has been deleted due to improper timer handling.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables**
Affected versions:
- APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-0820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-0820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0820
- **State**: PUBLISHED
- **Published Date**: August 02, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:03 UTC
- **Reserved Date**: August 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FreeBSD kernel 4.6 and earlier closes the file descriptors 0, 1, and 2 after they have already been assigned to /dev/null when the descriptors reference procfs or linprocfs, which could allow local users to reuse the file descriptors in a setuid or setgid program to modify critical data and gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&frame=right&th=d429cd2ef1d3a2b7&seekm=ai6c0q%242289%241%40FreeBSD.csie.NCTU.edu.tw#link16)
2. [FreeBSD-SA-02:23](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:23.stdio.asc)
3. [20020731 [VulnWatch] FreeBSD <=4.6 kernel problems, yet Linux and *BSD much better than Windows](http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0047.html)
4. [20020819 Freebsd FD exploit](http://marc.info/?l=bugtraq&m=102979180524452&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31232, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31232
- **State**: PUBLISHED
- **Published Date**: August 30, 2022 at 20:25 UTC
- **Last Updated**: September 17, 2024 at 04:09 UTC
- **Reserved Date**: May 19, 2022 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Dell - Smart Fabric Storage Software**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000201667/dsa-2022-156-dell-emc-smartfabric-storage-software-security-update-for-multiple-component-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2297, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2297 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2297
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23555
- **State**: PUBLISHED
- **Published Date**: February 11, 2022 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:23 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P`
### Affected Products
**n/a - vm2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-VM2-2309905)
2. [](https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d)
### Credits
- Cris Staicu
- Abdullah Alhamdan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1394, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1394 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1394
- **State**: PUBLISHED
- **Published Date**: March 10, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Direct static code injection vulnerability in startsession.php in Flat Chat 2.0 allows remote attackers to execute arbitrary PHP code via the Chat Name field, which is inserted into online.txt and included by users.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0871](http://www.vupen.com/english/advisories/2007/0871)
2. [3428](https://www.exploit-db.com/exploits/3428)
3. [24433](http://secunia.com/advisories/24433)
4. [22865](http://www.securityfocus.com/bid/22865)
5. [33890](http://osvdb.org/33890)
6. [flatchat-startsession-code-execution(32882)](https://exchange.xforce.ibmcloud.com/vulnerabilities/32882) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1799, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1799 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1799
- **State**: PUBLISHED
- **Published Date**: April 18, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 21, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.automation.siemens.com/WW/view/en/59869684)
2. [81033](http://osvdb.org/81033)
3. [](http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf)
4. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16723
- **State**: PUBLISHED
- **Published Date**: September 23, 2019 at 14:24 UTC
- **Last Updated**: August 05, 2024 at 01:24 UTC
- **Reserved Date**: September 23, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Cacti/cacti/issues/2964)
2. [FEDORA-2019-6bf27b45b3](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSCUUCKSYVZLN3PQE7NU76AFWUGT3E2D/)
3. [FEDORA-2019-362f0e9710](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZO3ROHHPKLH2JRW7ES5FYSQTWIPNVLQB/)
4. [20200120 [SECURITY] [DSA 4604-1] cacti security update](https://seclists.org/bugtraq/2020/Jan/25)
5. [DSA-4604](https://www.debian.org/security/2020/dsa-4604)
6. [openSUSE-SU-2020:0272](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html)
7. [openSUSE-SU-2020:0284](http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html)
8. [GLSA-202003-40](https://security.gentoo.org/glsa/202003-40)
9. [openSUSE-SU-2020:0558](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html)
10. [openSUSE-SU-2020:0565](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-8848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-8848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8848
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: November 14, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21568
- **State**: PUBLISHED
- **Published Date**: August 16, 2021 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an insufficient logging vulnerability. An authenticated user with ISI_PRIV_LOGIN_PAPI could make un-audited and un-trackable configuration changes to settings that their roles have privileges to change.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Dell - PowerScale OneFS**
Affected versions:
- 8.2.x - 9.2.x (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000190408) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.