System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1882, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1882 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1882
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 21:00 UTC
- **Last Updated**: March 04, 2025 at 15:48 UTC
- **Reserved Date**: March 03, 2025 at 12:25 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-1262: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**i-Drive - i11**
Affected versions:
- 20250227 (Status: affected)
**i-Drive - i12**
Affected versions:
- 20250227 (Status: affected)
### References
1. [VDB-298196 | i-Drive i11/i12 Device Setting improper access control for register interface](https://vuldb.com/?id.298196)
2. [VDB-298196 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.298196)
3. [Submit #510955 | i-DRIVE Dashcam i11, i12 Improper Access Control for Register Interface](https://vuldb.com/?submit.510955)
4. [](https://github.com/geo-chen/i-Drive)
### Credits
- geochen (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9189, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9189 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9189
- **State**: PUBLISHED
- **Published Date**: March 25, 2019 at 19:10 UTC
- **Last Updated**: August 06, 2024 at 13:40 UTC
- **Reserved Date**: December 02, 2014 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Honeywell - Experion PKS**
Affected versions:
- R40x prior to R400.6 (Status: affected)
- R41x prior to R410.6 (Status: affected)
- R43x prior to R430.2 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-14-352-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32406
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1 allows a remote attacker to execute arbitrary code via a crafted payload to the Batch-Issue Exam Tickets function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3349, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3349
- **State**: PUBLISHED
- **Published Date**: September 14, 2016 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 23:56 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The kernel-mode drivers in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [92783](http://www.securityfocus.com/bid/92783)
2. [1036786](http://www.securitytracker.com/id/1036786)
3. [MS16-106](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-106) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2277, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2277
- **State**: PUBLISHED
- **Published Date**: April 01, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: July 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to "context data."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39037](http://www.securityfocus.com/bid/39037)
2. [[security-announce] 20100329 VMSA-2010-0005 VMware products address vulnerabilities in WebAccess](http://lists.vmware.com/pipermail/security-announce/2010/000086.html)
3. [](http://www.vmware.com/security/advisories/VMSA-2010-0005.html)
4. [oval:org.mitre.oval:def:7080](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7080) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49682
- **State**: REJECTED
- **Published Date**: December 21, 2023 at 23:07 UTC
- **Last Updated**: January 02, 2024 at 19:55 UTC
- **Reserved Date**: November 29, 2023 at 17:48 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6229, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6229
- **State**: PUBLISHED
- **Published Date**: February 14, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 23:55 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: brocade
### Vulnerability Description
Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.
### Affected Products
**Brocade Communications Systems, Inc. - Ruckus Networks Unleashed APs and Zone Director**
Affected versions:
- Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before (Status: affected)
### References
1. [](https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1374, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1374
- **State**: PUBLISHED
- **Published Date**: July 28, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 22:55 UTC
- **Reserved Date**: January 04, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The web framework in Cisco Unified Computing System (UCS) Performance Manager 2.0.0 and earlier allows remote authenticated users to execute arbitrary commands via crafted parameters in a GET request, aka Bug ID CSCuy07827.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160720 Cisco Unified Computing System Performance Manager Input Validation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160720-ucsperf)
2. [92044](http://www.securityfocus.com/bid/92044)
3. [1036410](http://www.securitytracker.com/id/1036410) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38460
- **State**: PUBLISHED
- **Published Date**: October 12, 2021 at 13:38 UTC
- **Last Updated**: September 17, 2024 at 00:42 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-523: Security Weakness
### Affected Products
**Moxa - MXview Network Management Software**
Affected versions:
- 3.x (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03)
### Credits
- Noam Moshe from Claroty reported these vulnerabilities to Moxa. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4214, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4214
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0336, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0336 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0336
- **State**: PUBLISHED
- **Published Date**: September 17, 2020 at 20:52 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In SurfaceFlinger, there is possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153467444
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33477
- **State**: PUBLISHED
- **Published Date**: June 06, 2023 at 00:00 UTC
- **Last Updated**: January 08, 2025 at 15:36 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Harmonic NSG 9000-6G devices, an authenticated remote user can obtain source code by directly requesting a special path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Skr11lex/CVE-2023-33477) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000081, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000081
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: February 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. This attack appear to be exploitable via An attacker can freeze te server by sending a giant string to the ID parameter ..
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10927, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10927 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10927
- **State**: PUBLISHED
- **Published Date**: August 13, 2019 at 18:55 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SCALANCE SC-600 (V2.0), SCALANCE XB-200 (V4.1), SCALANCE XC-200 (V4.1), SCALANCE XF-200BA (V4.1), SCALANCE XP-200 (V4.1), SCALANCE XR-300WG (V4.1). An authenticated attacker with network access to to port 22/tcp of an affected device may cause a Denial-of-Service condition. The security vulnerability could be exploited by an authenticated attacker with network access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the availability of the affected device.
### Weakness Classification (CWE)
- CWE-703: Security Weakness
### Affected Products
**Siemens AG - SCALANCE SC-600**
Affected versions:
- V2.0 (Status: affected)
**Siemens AG - SCALANCE XB-200**
Affected versions:
- V4.1 (Status: affected)
**Siemens AG - SCALANCE XC-200**
Affected versions:
- V4.1 (Status: affected)
**Siemens AG - SCALANCE XF-200BA**
Affected versions:
- V4.1 (Status: affected)
**Siemens AG - SCALANCE XP-200**
Affected versions:
- V4.1 (Status: affected)
**Siemens AG - SCALANCE XR-300WG**
Affected versions:
- V4.1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32507, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32507 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32507
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:24 UTC
- **Reserved Date**: April 09, 2025 at 11:19 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aakif Kadiwala Event Espresso – Custom Email Template Shortcode allows Reflected XSS. This issue affects Event Espresso – Custom Email Template Shortcode: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Aakif Kadiwala - Event Espresso – Custom Email Template Shortcode**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/email-shortcode/vulnerability/wordpress-event-espresso-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7767
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:11 UTC
- **Last Updated**: March 20, 2025 at 13:09 UTC
- **Reserved Date**: August 13, 2024 at 18:40 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
An improper access control vulnerability exists in danswer-ai/danswer version v0.3.94. This vulnerability allows the first user created in the system to view, modify, and delete chats created by an Admin. This can lead to unauthorized access to sensitive information, loss of data integrity, and potential compliance violations.
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**danswer-ai - danswer-ai/danswer**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/1425dada-72d8-4bd9-a3e7-2863bb3e1a6c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3248, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3248 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3248
- **State**: REJECTED
- **Published Date**: June 27, 2006 at 10:00 UTC
- **Last Updated**: August 08, 2006 at 09:00 UTC
- **Reserved Date**: June 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3645, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3645
- **State**: PUBLISHED
- **Published Date**: June 14, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 19:47 UTC
- **Reserved Date**: May 22, 2013 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Orchard.Comments module in Orchard before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://docs.orchardproject.net/Documentation/Patch-4-30-2013)
2. [JVNDB-2013-000057](http://jvndb.jvn.jp/jvndb/JVNDB-2013-000057)
3. [JVN#53622030](http://jvn.jp/en/jp/JVN53622030/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2376
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:44 UTC
- **Last Updated**: December 20, 2021 at 22:44 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2607, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2607 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2607
- **State**: PUBLISHED
- **Published Date**: March 21, 2025 at 21:00 UTC
- **Last Updated**: March 24, 2025 at 14:31 UTC
- **Reserved Date**: March 21, 2025 at 13:24 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in phplaozhang LzCMS-LaoZhangBoKeXiTong up to 1.1.4. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/upload/upimage.html of the component HTTP POST Request Handler. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**phplaozhang - LzCMS-LaoZhangBoKeXiTong**
Affected versions:
- 1.1.0 (Status: affected)
- 1.1.1 (Status: affected)
- 1.1.2 (Status: affected)
- 1.1.3 (Status: affected)
- 1.1.4 (Status: affected)
### References
1. [VDB-300590 | phplaozhang LzCMS-LaoZhangBoKeXiTong HTTP POST Request upimage.html unrestricted upload](https://vuldb.com/?id.300590)
2. [VDB-300590 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300590)
3. [Submit #518021 | https://gitee.com/phplaozhang/LzCMS-LaoZhangBoKeXiTong LzCMS-LaoZhangBoKeXiTong <=1.1.4 file upload vulnerability](https://vuldb.com/?submit.518021)
4. [](https://github.com/Jingyi-u/lzcms/tree/main)
### Credits
- Jing1 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49783
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 14:09 UTC
- **Last Updated**: May 04, 2025 at 08:45 UTC
- **Reserved Date**: May 01, 2025 at 14:05 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: Drop fpregs lock before inheriting FPU permissions
Mike Galbraith reported the following against an old fork of preempt-rt
but the same issue also applies to the current preempt-rt tree.
BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: systemd
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
Preemption disabled at:
fpu_clone
CPU: 6 PID: 1 Comm: systemd Tainted: G E (unreleased)
Call Trace:
<TASK>
dump_stack_lvl
? fpu_clone
__might_resched
rt_spin_lock
fpu_clone
? copy_thread
? copy_process
? shmem_alloc_inode
? kmem_cache_alloc
? kernel_clone
? __do_sys_clone
? do_syscall_64
? __x64_sys_rt_sigprocmask
? syscall_exit_to_user_mode
? do_syscall_64
? syscall_exit_to_user_mode
? do_syscall_64
? syscall_exit_to_user_mode
? do_syscall_64
? exc_page_fault
? entry_SYSCALL_64_after_hwframe
</TASK>
Mike says:
The splat comes from fpu_inherit_perms() being called under fpregs_lock(),
and us reaching the spin_lock_irq() therein due to fpu_state_size_dynamic()
returning true despite static key __fpu_state_size_dynamic having never
been enabled.
Mike's assessment looks correct. fpregs_lock on a PREEMPT_RT kernel disables
preemption so calling spin_lock_irq() in fpu_inherit_perms() is unsafe. This
problem exists since commit
9e798e9aa14c ("x86/fpu: Prepare fpu_clone() for dynamically enabled features").
Even though the original bug report should not have enabled the paths at
all, the bug still exists.
fpregs_lock is necessary when editing the FPU registers or a task's FP
state but it is not necessary for fpu_inherit_perms(). The only write
of any FP state in fpu_inherit_perms() is for the new child which is
not running yet and cannot context switch or be borrowed by a kernel
thread yet. Hence, fpregs_lock is not protecting anything in the new
child until clone() completes and can be dropped earlier. The siglock
still needs to be acquired by fpu_inherit_perms() as the read of the
parent's permissions has to be serialised.
[ bp: Cleanup splat. ]
### Affected Products
**Linux - Linux**
Affected versions:
- 9e798e9aa14c45fb94e47b30bf6347b369ce9df7 (Status: affected)
- 9e798e9aa14c45fb94e47b30bf6347b369ce9df7 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.16 (Status: affected)
- 0 (Status: unaffected)
- 6.0.10 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/c6e8a7a1780af3da65e78a615f7d0874da6aabb0)
2. [](https://git.kernel.org/stable/c/36b038791e1e2baea892e9276588815fd14894b4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6328
- **State**: PUBLISHED
- **Published Date**: December 13, 2007 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DOSBox 0.72 and earlier allows local users to obtain access to the filesystem on the host operating system via the mount command. NOTE: the researcher reports a vendor response stating that this is not a security problem
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20071210 Filesystem access in DOSBox 0.72](http://www.securityfocus.com/archive/1/484835/100/0/threaded)
2. [ADV-2007-4170](http://www.vupen.com/english/advisories/2007/4170)
3. [](http://aluigi.org/poc/dosboxxx.zip)
4. [dosbox-mount-unauthorized-access(38970)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38970)
5. [26802](http://www.securityfocus.com/bid/26802)
6. [3442](http://securityreason.com/securityalert/3442)
7. [44766](http://osvdb.org/44766) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41810
- **State**: PUBLISHED
- **Published Date**: May 02, 2022 at 19:06 UTC
- **Last Updated**: September 16, 2024 at 17:18 UTC
- **Reserved Date**: September 29, 2021 at 00:00 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Admin tool allows storing configuration data with script which may then get run by another vault administrator. Requires vault admin level authentication and is not remotely exploitable
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**M-Files Corporation - M-Files Server**
Affected versions:
- M-Files Server (Status: affected)
### References
1. [](https://www.m-files.com/about/trust-center/security-advisories/cve-2021-41810/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7216
- **State**: PUBLISHED
- **Published Date**: February 18, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 06:24 UTC
- **Reserved Date**: February 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in esop/toolkit/profile/regData.do in Bravo Tejari Procurement Portal allows remote authenticated users to hijack the authentication of application users for requests that modify their personal data by leveraging lack of anti-CSRF tokens.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.securityfocus.com/archive/1/541782/30/0/threaded)
2. [44256](https://www.exploit-db.com/exploits/44256/)
3. [](http://seclists.org/fulldisclosure/2018/Feb/44)
4. [](https://packetstormsecurity.com/files/146409/Tejari-Cross-Site-Request-Forgery.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14067
- **State**: PUBLISHED
- **Published Date**: June 02, 2020 at 15:05 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Using non-time-constant functions like memcmp to compare sensitive data can lead to information leakage through timing side channel issue. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56747
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 11:30 UTC
- **Last Updated**: May 04, 2025 at 10:03 UTC
- **Reserved Date**: December 29, 2024 at 11:26 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
Hook "qedi_ops->common->sb_init = qed_sb_init" does not release the DMA
memory sb_virt when it fails. Add dma_free_coherent() to free it. This
is the same way as qedr_alloc_mem_sb() and qede_alloc_mem_sb().
### Affected Products
**Linux - Linux**
Affected versions:
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
- ace7f46ba5fde7273207c7122b0650ceb72510e0 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.10 (Status: affected)
- 0 (Status: unaffected)
- 4.19.325 (Status: unaffected)
- 5.4.287 (Status: unaffected)
- 5.10.231 (Status: unaffected)
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4e48e5b26b3edc0e1dd329201ffc924a7a1f9337)
2. [](https://git.kernel.org/stable/c/eaf92fad1f21be63427920c12f22227e5f757424)
3. [](https://git.kernel.org/stable/c/a4d2011cbe039b25024831427b60ab91ee247066)
4. [](https://git.kernel.org/stable/c/bb8b45883eb072adba297922b67d1467082ac880)
5. [](https://git.kernel.org/stable/c/b778b5240485106abf665eb509cc01779ed0cb00)
6. [](https://git.kernel.org/stable/c/10a6fc486ac40a410f0fb84cc15161238eccd20a)
7. [](https://git.kernel.org/stable/c/cfc76acaf2c4b43d1e140f1e4cbde15adb540bc5)
8. [](https://git.kernel.org/stable/c/20b775cf274cfbfa3da871a1108877e17b8b19e1)
9. [](https://git.kernel.org/stable/c/95bbdca4999bc59a72ebab01663d421d6ce5775d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4180
- **State**: PUBLISHED
- **Published Date**: September 16, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) power and (2) ipmi_boot actions in the HostController in Foreman before 1.2.2 allow remote attackers to cause a denial of service (memory consumption) via unspecified input that is converted to a symbol.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2013:1196](http://rhn.redhat.com/errata/RHSA-2013-1196.html)
2. [](http://projects.theforeman.org/issues/2860)
3. [](http://theforeman.org/manuals/1.2/index.html#Releasenotesfor1.2.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21211
- **State**: PUBLISHED
- **Published Date**: April 26, 2021 at 16:25 UTC
- **Last Updated**: August 03, 2024 at 18:01 UTC
- **Reserved Date**: December 21, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html)
2. [](https://crbug.com/1103119)
3. [DSA-4906](https://www.debian.org/security/2021/dsa-4906)
4. [GLSA-202104-08](https://security.gentoo.org/glsa/202104-08)
5. [FEDORA-2021-c3754414e7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/)
6. [FEDORA-2021-ff893e12c5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/)
7. [FEDORA-2021-35d2bb4627](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13631
- **State**: PUBLISHED
- **Published Date**: May 27, 2020 at 14:42 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: May 27, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2020-0477f8840e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/)
2. [USN-4394-1](https://usn.ubuntu.com/4394-1/)
3. [](https://www.oracle.com/security-alerts/cpujul2020.html)
4. [](https://bugs.chromium.org/p/chromium/issues/detail?id=1080459)
5. [](https://security.netapp.com/advisory/ntap-20200608-0002/)
6. [](https://sqlite.org/src/info/eca0ba2cf4c0fdf7)
7. [GLSA-202007-26](https://security.gentoo.org/glsa/202007-26)
8. [FreeBSD-SA-20:22](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc)
9. [](https://support.apple.com/kb/HT211843)
10. [](https://support.apple.com/kb/HT211850)
11. [](https://support.apple.com/kb/HT211844)
12. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
13. [](https://support.apple.com/kb/HT211931)
14. [](https://support.apple.com/kb/HT211952)
15. [20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0](http://seclists.org/fulldisclosure/2020/Nov/19)
16. [20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0](http://seclists.org/fulldisclosure/2020/Nov/20)
17. [20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0](http://seclists.org/fulldisclosure/2020/Nov/22)
18. [](https://support.apple.com/kb/HT211935)
19. [20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1](http://seclists.org/fulldisclosure/2020/Dec/32)
20. [[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.](https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E)
21. [](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1275, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1275 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1275
- **State**: PUBLISHED
- **Published Date**: March 19, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GGZ Gaming Zone 0.0.12 allows remote attackers to cause a denial of service (client disconnect) via inputs that produce malformed XML, including (1) trailing ' (apostrophe) character on the ID attribute in a PLAYER XML tag, (2) joining with a long ID attribute or non-trailing ' characters, which causes a <none> name to be assigned, and then disconnecting, or (3) a long CDATA message attribute, which prevents closing tags from being added to the string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-0935](http://www.vupen.com/english/advisories/2006/0935)
2. [ggzgaminzone-xml-dos(25164)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25164)
3. [17094](http://www.securityfocus.com/bid/17094)
4. [](http://aluigi.altervista.org/adv/ggzcdos-adv.txt)
5. [19212](http://secunia.com/advisories/19212)
6. [23848](http://www.osvdb.org/23848) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1678, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1678
- **State**: PUBLISHED
- **Published Date**: May 16, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 13, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16577](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16577)
2. [DSA-2699](http://www.debian.org/security/2013/dsa-2699)
3. [MDVSA-2013:165](http://www.mandriva.com/security/advisories?name=MDVSA-2013:165)
4. [openSUSE-SU-2013:0825](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html)
5. [USN-1823-1](http://www.ubuntu.com/usn/USN-1823-1)
6. [RHSA-2013:0821](http://rhn.redhat.com/errata/RHSA-2013-0821.html)
7. [openSUSE-SU-2013:0929](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html)
8. [](https://bugzilla.mozilla.org/show_bug.cgi?id=839745)
9. [openSUSE-SU-2013:0831](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html)
10. [RHSA-2013:0820](http://rhn.redhat.com/errata/RHSA-2013-0820.html)
11. [openSUSE-SU-2013:0834](http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html)
12. [openSUSE-SU-2013:0946](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html)
13. [USN-1822-1](http://www.ubuntu.com/usn/USN-1822-1)
14. [59864](http://www.securityfocus.com/bid/59864)
15. [](http://www.mozilla.org/security/announce/2013/mfsa2013-48.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4315
- **State**: PUBLISHED
- **Published Date**: August 13, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 13, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26448](http://secunia.com/advisories/26448)
2. [](http://blogs.zdnet.com/security/?p=438)
3. [25265](http://www.securityfocus.com/bid/25265)
4. [](http://blogs.zdnet.com/security/?p=427) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4718
- **State**: REJECTED
- **Published Date**: March 15, 2017 at 18:00 UTC
- **Last Updated**: March 15, 2017 at 17:57 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11734
- **State**: PUBLISHED
- **Published Date**: July 10, 2019 at 17:19 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In e107 v2.1.7, output without filtering results in XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/e107inc/e107/issues/3170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6383
- **State**: REJECTED
- **Published Date**: June 26, 2017 at 13:00 UTC
- **Last Updated**: June 26, 2017 at 12:57 UTC
- **Reserved Date**: February 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28290, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28290
- **State**: PUBLISHED
- **Published Date**: April 25, 2022 at 16:31 UTC
- **Last Updated**: August 03, 2024 at 05:48 UTC
- **Reserved Date**: March 31, 2022 at 00:00 UTC
- **Assigned By**: CSW
### Vulnerability Description
Reflective Cross-Site Scripting vulnerability in WordPress Country Selector Plugin Version 1.6.5. The XSS payload executes whenever the user tries to access the country selector page with the specified payload as a part of the HTTP request
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - WordPress Country Selector Plugin**
Affected versions:
- Version 1.6.5 (Status: affected)
### References
1. [](https://cybersecurityworks.com/zerodays/cve-2022-28290-reflected-cross-site-scripting-in-welaunch.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9023
- **State**: PUBLISHED
- **Published Date**: November 20, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 20, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Twilio module 7.x-1.x before 7.x-1.9 for Drupal does not properly restrict access to the Twilio administration pages, which allows remote authenticated users to read and modify authentication tokens by leveraging the "access administration pages" Drupal permission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2337623)
2. [](https://www.drupal.org/node/2344363) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34218, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34218 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34218
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 13:03 UTC
- **Last Updated**: January 09, 2025 at 20:54 UTC
- **Reserved Date**: May 31, 2023 at 12:49 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**JetBrains - TeamCity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37254, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37254 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37254
- **State**: PUBLISHED
- **Published Date**: November 01, 2024 at 14:18 UTC
- **Last Updated**: November 01, 2024 at 16:04 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in mndpsingh287 File Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects File Manager: from n/a through 7.2.7.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**mndpsingh287 - File Manager**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-file-manager/wordpress-wp-file-manager-plugin-7-2-7-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4848
- **State**: REJECTED
- **Last Updated**: July 29, 2024 at 11:06 UTC
- **Reserved Date**: May 13, 2024 at 18:37 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2545
- **State**: PUBLISHED
- **Published Date**: June 06, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Skype 3.6.0.248, and other versions before 3.8.0.139, uses a case-sensitive comparison when checking for dangerous extensions, which allows user-assisted remote attackers to bypass warning dialogs and possibly execute arbitrary code via a file: URI with a dangerous extension that uses a different case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1020201](http://www.securitytracker.com/id?1020201)
2. [30547](http://secunia.com/advisories/30547)
3. [skype-fileuri-case-security-bypass(43044)](https://exchange.xforce.ibmcloud.com/vulnerabilities/43044)
4. [ADV-2008-1749](http://www.vupen.com/english/advisories/2008/1749/references)
5. [29553](http://www.securityfocus.com/bid/29553)
6. [20080604 Skype File URI Security Bypass Code Execution Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=711)
7. [](http://www.skype.com/security/skype-sb-2008-003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12923
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:42 UTC
- **Last Updated**: June 11, 2021 at 21:42 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7559
- **State**: PUBLISHED
- **Published Date**: November 19, 2020 at 21:04 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause a crash of the PLC simulator present in EcoStruxureª Control Expert software when receiving a specially crafted request over Modbus.
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**n/a - PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) **
Affected versions:
- PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-07)
2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1140) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2439
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:44 UTC
- **Last Updated**: September 25, 2024 at 19:43 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). Supported versions that are affected are 11.1.2.4 and 11.2.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hyperion BI+ accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - Hyperion BI+**
Affected versions:
- 11.1.2.4 (Status: affected)
- 11.2.5.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40702
- **State**: PUBLISHED
- **Published Date**: September 27, 2021 at 15:42 UTC
- **Last Updated**: September 16, 2024 at 18:29 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Premiere**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3915
- **State**: PUBLISHED
- **Published Date**: April 26, 2025 at 05:34 UTC
- **Last Updated**: April 28, 2025 at 15:34 UTC
- **Reserved Date**: April 23, 2025 at 23:27 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Aeropage Sync for Airtable plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'aeropageDeletePost' function in all versions up to, and including, 3.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**aeropage - Aeropage Sync for Airtable**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f98aab54-877b-47df-9c8a-5e70ea985c1c?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L475)
3. [](https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L476)
4. [](https://plugins.trac.wordpress.org/changeset/3281904/)
### Credits
- Cheng Liu |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48891
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 06:10 UTC
- **Last Updated**: May 04, 2025 at 08:25 UTC
- **Reserved Date**: August 21, 2024 at 06:06 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
regulator: da9211: Use irq handler when ready
If the system does not come from reset (like when it is kexec()), the
regulator might have an IRQ waiting for us.
If we enable the IRQ handler before its structures are ready, we crash.
This patch fixes:
[ 1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078
[ 1.316096] Call trace:
[ 1.316101] blocking_notifier_call_chain+0x20/0xa8
[ 1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests
[ 1.327823] regulator_notifier_call_chain+0x1c/0x2c
[ 1.327825] da9211_irq_handler+0x68/0xf8
[ 1.327829] irq_thread+0x11c/0x234
[ 1.327833] kthread+0x13c/0x154
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.14.303 (Status: unaffected)
- 4.19.270 (Status: unaffected)
- 5.4.229 (Status: unaffected)
- 5.10.164 (Status: unaffected)
- 5.15.89 (Status: unaffected)
- 6.1.7 (Status: unaffected)
- 6.2 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91)
2. [](https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236)
3. [](https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5)
4. [](https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae)
5. [](https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01)
6. [](https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53)
7. [](https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2957
- **State**: PUBLISHED
- **Published Date**: May 27, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 12, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in IBM InfoSphere Optim Data Growth for Oracle E-Business Suite 6.x, 7.x, and 9.x before 9.1.0.3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21637444)
2. [ibm-optim-cve20132957-xss(83666)](https://exchange.xforce.ibmcloud.com/vulnerabilities/83666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6875
- **State**: PUBLISHED
- **Published Date**: March 28, 2025 at 20:34 UTC
- **Last Updated**: May 06, 2025 at 16:13 UTC
- **Reserved Date**: July 18, 2024 at 05:05 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**Unknown - Unknown**
Affected versions:
- 0 (Status: affected)
**Red Hat - Red Hat Data Grid 8**
**Red Hat - Red Hat JBoss Data Grid 7**
### References
1. [](https://access.redhat.com/security/cve/CVE-2024-6875)
2. [RHBZ#2298555](https://bugzilla.redhat.com/show_bug.cgi?id=2298555) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5564
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 03:15 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Cybozu Garoon 4.0.0 to 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the application 'E-mail'.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 4.0.0 to 4.10.3 (Status: affected)
### References
1. [](https://jvn.jp/en/jp/JVN35649781/index.html)
2. [](https://kb.cybozu.support/article/36116/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0578
- **State**: PUBLISHED
- **Published Date**: February 05, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: February 04, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the web management login page in Tripwire Enterprise 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1019279](http://www.securitytracker.com/id?1019279)
2. [20080129 Advisory: Tripwire Enterprise/Server XSS Vulnerability](http://www.securityfocus.com/archive/1/487229/100/0/threaded)
3. [ADV-2008-0372](http://www.vupen.com/english/advisories/2008/0372/references)
4. [28687](http://secunia.com/advisories/28687)
5. [27486](http://www.securityfocus.com/bid/27486)
6. [tripwire-login-xss(40016)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40016)
7. [3610](http://securityreason.com/securityalert/3610)
8. [](http://www.liquidmatrix.org/blog/2008/01/29/advisory-tripwire-enterprise-xss-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1446
- **State**: PUBLISHED
- **Published Date**: August 30, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 23:21 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Emptoris Spend Analysis 9.5.0.0 through 10.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128171.
### Affected Products
**IBM - Emptoris Spend Analysis**
Affected versions:
- 9.5.0.0 (Status: affected)
- 10.0.0 (Status: affected)
- 10.0.1 (Status: affected)
- 10.0.2 (Status: affected)
- 10.0.4 (Status: affected)
- 10.1.0 (Status: affected)
- 10.1.1 (Status: affected)
### References
1. [99541](http://www.securityfocus.com/bid/99541)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/128171)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg22005787) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0404
- **State**: PUBLISHED
- **Published Date**: February 26, 2021 at 20:19 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In mobile_log_d, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05457039.
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-acknowledgements) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4526
- **State**: PUBLISHED
- **Published Date**: September 19, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
ABB DataManagerPro 1.x before 1.7.1 allows local users to gain privileges by replacing a DLL file in the package directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://library.e.abb.com/public/93e52dbfd6ab4f64aa435973ccf1b6e2/9ADB005557_ABB_SoftwareVulnerabilityHandlingAdvisory_DMPro.pdf)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-259-02)
3. [92980](http://www.securityfocus.com/bid/92980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24542
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13709
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for Tube, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Tube) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5280, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5280
- **State**: PUBLISHED
- **Published Date**: November 29, 2008 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: November 28, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Local ZIM Server in Zilab Chat and Instant Messaging (ZIM) Server 2.0 and 2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted requests without required parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [27940](http://www.securityfocus.com/bid/27940)
2. [](http://aluigi.org/poc/zilabzcsx.zip)
3. [29062](http://secunia.com/advisories/29062)
4. [ADV-2008-0664](http://www.vupen.com/english/advisories/2008/0664)
5. [ADV-2008-0665](http://www.vupen.com/english/advisories/2008/0665)
6. [](http://aluigi.altervista.org/adv/zilabzcsx-adv.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30591, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30591 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30591
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:00 UTC
- **Last Updated**: August 28, 2024 at 17:50 UTC
- **Reserved Date**: March 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27165
- **State**: PUBLISHED
- **Published Date**: April 12, 2022 at 15:11 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CSZ CMS 1.2.2 is vulnerable to SQL Injection via cszcms_admin_Plugin_manager_setstatus
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cskaza/cszcms/issues/41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21919
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: February 13, 2025 at 16:40 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.32 and prior (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html)
2. [](https://security.netapp.com/advisory/ntap-20230427-0007/)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/)
5. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9076, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9076 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9076
- **State**: PUBLISHED
- **Published Date**: May 19, 2017 at 06:25 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 19, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=83eaddab4378db256d00d295bda6ca997cd13a52)
2. [](https://patchwork.ozlabs.org/patch/760370/)
3. [](https://source.android.com/security/bulletin/2017-09-01)
4. [98586](http://www.securityfocus.com/bid/98586)
5. [RHSA-2017:2669](https://access.redhat.com/errata/RHSA-2017:2669)
6. [RHSA-2018:1854](https://access.redhat.com/errata/RHSA-2018:1854)
7. [](https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52)
8. [RHSA-2017:2077](https://access.redhat.com/errata/RHSA-2017:2077)
9. [DSA-3886](http://www.debian.org/security/2017/dsa-3886)
10. [RHSA-2017:1842](https://access.redhat.com/errata/RHSA-2017:1842) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35602
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:50 UTC
- **Last Updated**: September 25, 2024 at 19:26 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.26 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
2. [](https://security.netapp.com/advisory/ntap-20211022-0003/)
3. [FEDORA-2021-70dd0b9f5d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/)
4. [FEDORA-2021-46dc82116b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/)
5. [FEDORA-2021-f74148c6d4](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43325
- **State**: PUBLISHED
- **Published Date**: September 25, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 17:46 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://moosocial.com/)
2. [](https://travel.moosocial.com/)
3. [](https://github.com/ahrixia/CVE-2023-43325) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45491, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45491 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45491
- **State**: PUBLISHED
- **Published Date**: August 30, 2024 at 00:00 UTC
- **Last Updated**: October 18, 2024 at 13:07 UTC
- **Reserved Date**: August 30, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libexpat/libexpat/pull/891)
2. [](https://github.com/libexpat/libexpat/issues/888) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22955, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22955 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22955
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 22:51 UTC
- **Reserved Date**: January 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/matthiaskramm/swftools/issues/207) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24129, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24129
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 21:45 UTC
- **Last Updated**: January 31, 2025 at 21:35 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination.
### Affected Products
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122073)
2. [](https://support.apple.com/en-us/122072)
3. [](https://support.apple.com/en-us/122068)
4. [](https://support.apple.com/en-us/122071)
5. [](https://support.apple.com/en-us/122066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16126
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 20:13 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
The module botbait is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. botbait is known to record and track user information. The module tracks the following information. Source IP process.versions process.platform How the module was invoked (test, require, pre-install)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/483) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2902
- **State**: PUBLISHED
- **Published Date**: July 28, 2010 at 19:32 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 28, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SVG implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:11896](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11896)
2. [40743](http://secunia.com/advisories/40743)
3. [](http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html)
4. [](http://code.google.com/p/chromium/issues/detail?id=48284) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41318, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41318 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41318
- **State**: PUBLISHED
- **Published Date**: September 08, 2023 at 19:51 UTC
- **Last Updated**: September 26, 2024 at 14:03 UTC
- **Reserved Date**: August 28, 2023 at 16:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
matrix-media-repo is a highly customizable multi-domain media repository for the Matrix chat ecosystem. In affected versions an attacker could upload a malicious piece of media to the media repo, which would then be served with `Content-Disposition: inline` upon download. This vulnerability could be leveraged to execute scripts embedded in SVG content. Commits `77ec235` and `bf8abdd` fix the issue and are included in the 1.3.0 release. Operators should upgrade to v1.3.0 as soon as possible. Operators unable to upgrade should override the `Content-Disposition` header returned by matrix-media-repo as a workaround.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**turt2live - matrix-media-repo**
Affected versions:
- < 1.3.0 (Status: affected)
### References
1. [https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72](https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72)
2. [https://github.com/turt2live/matrix-media-repo/commit/77ec2354e8f46d5ef149d1dcaf25f51c04149137](https://github.com/turt2live/matrix-media-repo/commit/77ec2354e8f46d5ef149d1dcaf25f51c04149137)
3. [https://github.com/turt2live/matrix-media-repo/commit/bf8abdd7a5371118e280c65a8e0ec2b2e9bdaf59](https://github.com/turt2live/matrix-media-repo/commit/bf8abdd7a5371118e280c65a8e0ec2b2e9bdaf59)
4. [https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script](https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20968, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20968 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20968
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: November 21, 2024 at 18:43 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- * (Status: affected)
- 8.1.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0451
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 13:35 UTC
- **Last Updated**: April 21, 2025 at 13:56 UTC
- **Reserved Date**: February 01, 2022 at 00:00 UTC
- **Assigned By**: Google
### Vulnerability Description
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-305: Security Weakness
### Affected Products
**Google LLC - Dart SDK**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://dart-review.googlesource.com/c/sdk/+/229947)
2. [](https://github.com/dart-lang/sdk/commit/57db739be0ad4629079bfa94840064f615d35abc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5531, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5531 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5531
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 05:30 UTC
- **Last Updated**: February 05, 2025 at 19:16 UTC
- **Reserved Date**: October 11, 2023 at 17:25 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the delete functionality. This makes it possible for unauthenticated attackers to delete image lightboxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**nik00726 - Thumbnail Slider With Lightbox**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/055b7ed5-268a-485e-ac7d-8082dc9fb2ad?source=cve)
2. [](https://wordpress.org/plugins/wp-responsive-slider-with-lightbox/)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1263536%40wp-responsive-slider-with-lightbox&new=1263536%40wp-responsive-slider-with-lightbox&sfp_email=&sfph_mail=)
### Credits
- Ala Arfaoui |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0734
- **State**: PUBLISHED
- **Published Date**: January 18, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ciscosecure-read-write(3133)](https://exchange.xforce.ibmcloud.com/vulnerabilities/3133)
2. [19990819 CiscoSecure Access Control Server for UNIX Remote Administration Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25158
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:18 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote attacker to disclose or tamper with a file in which password hash is saved in cleartext.
### Affected Products
**n/a - Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; itsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2**
Affected versions:
- Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions (Status: affected)
- Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q03UDECPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions (Status: affected)
- Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions (Status: affected)
- Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions (Status: affected)
- Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ71E71-100 all versions (Status: affected)
- Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf)
2. [](https://jvn.jp/vu/JVNVU96577897/index.html)
3. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23924
- **State**: PUBLISHED
- **Published Date**: January 31, 2023 at 23:54 UTC
- **Last Updated**: March 10, 2025 at 21:17 UTC
- **Reserved Date**: January 19, 2023 at 21:12 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. An attacker can exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will lead to the very least to an arbitrary file deletion and even remote code execution, depending on classes that are available.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H`
### Weakness Classification (CWE)
- CWE-551: Security Weakness
### Affected Products
**dompdf - dompdf**
Affected versions:
- < 2.0.2 (Status: affected)
### References
1. [https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg](https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg)
2. [https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85](https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85)
3. [https://github.com/dompdf/dompdf/releases/tag/v2.0.2](https://github.com/dompdf/dompdf/releases/tag/v2.0.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42354
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 14:44 UTC
- **Last Updated**: August 08, 2024 at 15:24 UTC
- **Reserved Date**: July 30, 2024 at 14:01 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Shopware is an open commerce platform. The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON. Prior to versions 6.6.5.1 and 6.5.8.13, the processing of the Criteria did not considered ManyToMany associations and so they were not considered properly and the protections didn't get used. This issue cannot be reproduced with the default entities by Shopware, but can be triggered with extensions. Update to Shopware 6.6.5.1 or 6.5.8.13 to receive a patch. For older versions of 6.2, 6.3, and 6.4, corresponding security measures are also available via a plugin.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**shopware - shopware**
Affected versions:
- <= 6.5.8.12 (Status: affected)
- >= 6.6.0.0, <= 6.6.5.0 (Status: affected)
### References
1. [https://github.com/shopware/shopware/security/advisories/GHSA-hhcq-ph6w-494g](https://github.com/shopware/shopware/security/advisories/GHSA-hhcq-ph6w-494g)
2. [https://github.com/shopware/core/commit/a784aa1cec0624e36e0ee4d41aeebaed40e0442f](https://github.com/shopware/core/commit/a784aa1cec0624e36e0ee4d41aeebaed40e0442f)
3. [https://github.com/shopware/core/commit/d35ee2eda5c995faeb08b3dad127eab65c64e2a2](https://github.com/shopware/core/commit/d35ee2eda5c995faeb08b3dad127eab65c64e2a2)
4. [https://github.com/shopware/shopware/commit/8504ba7e56e53add6a1d5b9d45015e3d899cd0ac](https://github.com/shopware/shopware/commit/8504ba7e56e53add6a1d5b9d45015e3d899cd0ac)
5. [https://github.com/shopware/shopware/commit/ad83d38809df457efef21c37ce0996430334bf01](https://github.com/shopware/shopware/commit/ad83d38809df457efef21c37ce0996430334bf01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8492
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:07 UTC
- **Last Updated**: May 17, 2025 at 03:12 UTC
- **Reserved Date**: September 05, 2024 at 17:32 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Hustle WordPress plugin through 7.8.5 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Hustle**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c7437eba-8e91-4fcc-82a3-ff8908b36877/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29621, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29621
- **State**: PUBLISHED
- **Published Date**: June 07, 2021 at 19:00 UTC
- **Last Updated**: August 03, 2024 at 22:11 UTC
- **Reserved Date**: March 30, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. Upgrade to version 3.3.0 or higher to resolve.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-203: Improper Input Validation
### Affected Products
**dpgaspar - Flask-AppBuilder**
Affected versions:
- < 3.3.0 (Status: affected)
### References
1. [](https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-434h-p4gx-jm89)
2. [](https://github.com/dpgaspar/Flask-AppBuilder/commit/780bd0e8fbf2d36ada52edb769477e0a4edae580)
3. [](https://pypi.org/project/Flask-AppBuilder/)
4. [[announce] 20210618 Apache Airflow CVE: CVE-2021-29621: User enumeration in database authentication in Flask-AppBuilder <= 3.2.3.](https://lists.apache.org/thread.html/r5b754118ba4e996adf03863705d34168bffec202da5c6bdc9bf3add5%40%3Cannounce.apache.org%3E)
5. [[announce] 20210623 Success at Apache: Security in Practice](https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352%40%3Cannounce.apache.org%3E)
6. [[airflow-commits] 20210712 [GitHub] [airflow] ashb commented on pull request #16942: Relax version constraint on ``Flask-Appbuilder``](https://lists.apache.org/thread.html/r91067f953906d93aaa1c69fe2b5472754019cc6bd4f1ba81349d62a0%40%3Ccommits.airflow.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46476
- **State**: PUBLISHED
- **Published Date**: January 19, 2023 at 00:00 UTC
- **Last Updated**: April 03, 2025 at 18:34 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-859 A1 1.05 was discovered to contain a command injection vulnerability via the service= variable in the soapcgi_main function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22636, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22636
- **State**: PUBLISHED
- **Published Date**: February 27, 2023 at 08:55 UTC
- **Last Updated**: October 23, 2024 at 14:32 UTC
- **Reserved Date**: January 05, 2023 at 10:06 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An unauthorized configuration download vulnerability in FortiWeb 6.3.6 through 6.3.21, 6.4.0 through 6.4.2 and 7.0.0 through 7.0.4 may allow a local attacker to access confidential configuration files via a crafted http request.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Fortinet - FortiWeb**
Affected versions:
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
- 6.3.6 (Status: affected)
### References
1. [https://fortiguard.com/psirt/FG-IR-22-460](https://fortiguard.com/psirt/FG-IR-22-460) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3088
- **State**: PUBLISHED
- **Published Date**: May 16, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 19.0.1084.46 does not properly draw hairlines, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201205-03](http://security.gentoo.org/glsa/glsa-201205-03.xml)
2. [openSUSE-SU-2012:0656](http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html)
3. [1027067](http://www.securitytracker.com/id?1027067)
4. [oval:org.mitre.oval:def:15581](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15581)
5. [](http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html)
6. [53540](http://www.securityfocus.com/bid/53540)
7. [chrome-hairline-code-execution(75593)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75593)
8. [](http://code.google.com/p/chromium/issues/detail?id=120648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0994, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0994 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0994
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 24, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch)
2. [20001004 Re: OpenBSD Security Advisory](http://marc.info/?l=bugtraq&m=97068555106135&w=2)
3. [bsd-fstat-format(5338)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5338)
4. [1746](http://www.securityfocus.com/bid/1746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34910
- **State**: PUBLISHED
- **Published Date**: January 13, 2022 at 21:43 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14883.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Bentley - View**
Affected versions:
- 10.15.0.75 (Status: affected)
### References
1. [](https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-1499/)
### Credits
- Mat Powell of Trend Micro Zero Day Initiative |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28998
- **State**: PUBLISHED
- **Published Date**: January 26, 2021 at 01:22 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices. A vulnerability exists in the Telnet service that allows a remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.mygeeni.com/hc/en-us)
2. [](https://gist.github.com/tj-oconnor/e21adcf9c0539a12ad2841102928cbd5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23647
- **State**: PUBLISHED
- **Published Date**: January 30, 2024 at 16:10 UTC
- **Last Updated**: August 01, 2024 at 23:06 UTC
- **Reserved Date**: January 19, 2024 at 00:18 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Authentik is an open-source Identity Provider. There is a bug in our implementation of PKCE that allows an attacker to circumvent the protection that PKCE offers. PKCE adds the code_challenge parameter to the authorization request and adds the code_verifier parameter to the token request. Prior to 2023.8.7 and 2023.10.7, a downgrade scenario is possible: if the attacker removes the code_challenge parameter from the authorization request, authentik will not do the PKCE check. Because of this bug, an attacker can circumvent the protection PKCE offers, such as CSRF attacks and code injection attacks. Versions 2023.8.7 and 2023.10.7 fix the issue.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**goauthentik - authentik**
Affected versions:
- < 2023.8.7 (Status: affected)
- >= 2023.10.0, < 2023.10.7 (Status: affected)
### References
1. [https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj](https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj)
2. [https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a](https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1220
- **State**: PUBLISHED
- **Published Date**: April 22, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 22, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Shoutbox SCRIPT 3.0.2 and earlier allows remote attackers to obtain sensitive information via a direct request to db/settings.dat, which displays usernames and password hashes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [knusperleicht-settings-info-disclosure(20177)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20177)
2. [15695](http://www.osvdb.org/15695)
3. [20050419 Shoutbox SCRIPT <= 3.0.2 Administrative MD5 Username and Password Retrieval [x0n3-h4ck]](http://marc.info/?l=bugtraq&m=111402253108991&w=2)
4. [15015](http://secunia.com/advisories/15015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3572
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: September 16, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24478
- **State**: PUBLISHED
- **Published Date**: February 21, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 23:19 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef)
2. [](https://gitlab.com/wireshark/wireshark/-/issues/19347)
3. [](https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0863
- **State**: PUBLISHED
- **Published Date**: March 27, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 07, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GALAXY Apps (aka Samsung Apps, Samsung Updates, or com.sec.android.app.samsungapps) before 14120405.03.012 allows man-in-the-middle attackers to obtain sensitive information and execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nowsecure.com/blog/2015/01/26/samsung-account-and-galaxy-apps-technical-breakdown-cve-2015-0863-and-cve-2015-0864/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4941
- **State**: PUBLISHED
- **Published Date**: April 05, 2023 at 18:00 UTC
- **Last Updated**: January 13, 2025 at 16:54 UTC
- **Reserved Date**: April 05, 2023 at 18:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WCFM Membership plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.9.10 due to missing nonce checks on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of actions such as modifying membership details, changing renewal information, controlling membership approvals, and more, via a forged request granted they can trick a site's administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Affected Products
**wclovers - WCFM Membership – WooCommerce Memberships for Multivendor Marketplace**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/3758db41-a3c5-436a-bb9a-5886f10d1519?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2605020%40wc-multivendor-membership&new=2605020%40wc-multivendor-membership&sfp_email=&sfph_mail=)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2632641%40wc-multivendor-membership&new=2632641%40wc-multivendor-membership&sfp_email=&sfph_mail=)
### Credits
- Chloe Chamberland |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5903
- **State**: PUBLISHED
- **Published Date**: September 15, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 12:03 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Mobile@Work (aka com.mobileiron) application 6.0.0.1.12R for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#823529](http://www.kb.cert.org/vuls/id/823529)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1821
- **State**: PUBLISHED
- **Published Date**: April 04, 2023 at 21:39 UTC
- **Last Updated**: February 13, 2025 at 16:39 UTC
- **Reserved Date**: April 03, 2023 at 20:48 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
### Affected Products
**Google - Chrome**
Affected versions:
- 112.0.5615.49 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1413618)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/)
4. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/)
5. [](https://www.debian.org/security/2023/dsa-5386)
6. [](https://security.gentoo.org/glsa/202309-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8168
- **State**: PUBLISHED
- **Published Date**: August 26, 2024 at 15:00 UTC
- **Last Updated**: August 26, 2024 at 17:22 UTC
- **Reserved Date**: August 26, 2024 at 07:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Online Bus Reservation Site**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-275767 | code-projects Online Bus Reservation Site login.php sql injection](https://vuldb.com/?id.275767)
2. [VDB-275767 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.275767)
3. [Submit #397715 | code-projects Online Bus Reservation Site Using PHP With Source Cod 1.0 SQL Injection](https://vuldb.com/?submit.397715)
4. [](https://github.com/t4rrega/cve/issues/2)
5. [](https://code-projects.org/)
### Credits
- t4rrega (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8419, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8419
- **State**: PUBLISHED
- **Published Date**: September 13, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446.
### Affected Products
**Microsoft - Windows 7**
Affected versions:
- 32-bit Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows RT 8.1**
Affected versions:
- Windows RT 8.1 (Status: affected)
**Microsoft - Windows Server 2008**
Affected versions:
- 32-bit Systems Service Pack 2 (Status: affected)
- 32-bit Systems Service Pack 2 (Server Core installation) (Status: affected)
- Itanium-Based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Status: affected)
- x64-based Systems Service Pack 2 (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 32-bit systems (Status: affected)
- x64-based systems (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- (Server Core installation) (Status: affected)
**Microsoft - Windows Server 2008 R2**
Affected versions:
- Itanium-Based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Status: affected)
- x64-based Systems Service Pack 1 (Server Core installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- 32-bit Systems (Status: affected)
- Version 1607 for 32-bit Systems (Status: affected)
- Version 1607 for x64-based Systems (Status: affected)
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
- x64-based Systems (Status: affected)
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
### References
1. [105238](http://www.securityfocus.com/bid/105238)
2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8419)
3. [1041635](http://www.securitytracker.com/id/1041635) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27434
- **State**: PUBLISHED
- **Published Date**: November 12, 2023 at 23:14 UTC
- **Last Updated**: August 02, 2024 at 14:49 UTC
- **Reserved Date**: March 01, 2023 at 14:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in WPGrim Classic Editor and Classic Widgets plugin <= 1.2.5 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**WPGrim - Classic Editor and Classic Widgets**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/classic-editor-and-classic-widgets/wordpress-classic-editor-and-classic-widgets-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21380
- **State**: PUBLISHED
- **Published Date**: February 13, 2024 at 18:02 UTC
- **Last Updated**: May 03, 2025 at 01:37 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Microsoft - Microsoft Dynamics 365 Business Central 2022 Release Wave 2**
Affected versions:
- 21.0.0 (Status: affected)
**Microsoft - Microsoft Dynamics 365 Business Central 2023 Release Wave 1**
Affected versions:
- 22.0.0 (Status: affected)
**Microsoft - Microsoft Dynamics 365 Business Central 2023 Release Wave 2**
Affected versions:
- 23.0.0 (Status: affected)
### References
1. [Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21380) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10824, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10824 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10824
- **State**: PUBLISHED
- **Published Date**: November 07, 2024 at 21:15 UTC
- **Last Updated**: November 08, 2024 at 15:48 UTC
- **Reserved Date**: November 04, 2024 at 21:25 UTC
- **Assigned By**: GitHub_P
### Vulnerability Description
An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed unauthorized internal users to access sensitive secret scanning alert data intended only for business owners. This issue could be exploited only by organization members with a personal access token (PAT) and required that secret scanning be enabled on user-owned repositories. This vulnerability affected GitHub Enterprise Server versions after 3.13.0 but prior to 3.14.0 and was fixed in version 3.13.2.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**GitHub - Enterprise Server**
Affected versions:
- 3.13.0 (Status: affected)
### References
1. [](https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-42605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-42605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-42605
- **State**: PUBLISHED
- **Published Date**: April 23, 2025 at 10:51 UTC
- **Last Updated**: April 23, 2025 at 14:26 UTC
- **Reserved Date**: April 16, 2025 at 12:00 UTC
- **Assigned By**: CERT-In
### Vulnerability Description
This vulnerability exists in Meon Bidding Solutions due to improper authorization controls on certain API endpoints for the initiation, modification, or cancellation operations. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body to gain unauthorized access to other user accounts.
Successful exploitation of this vulnerability could allow remote attacker to perform authorized manipulation of data associated with other user accounts.
### Weakness Classification (CWE)
- CWE-639: Security Weakness
### Affected Products
**Meon - Bidding Solutions**
Affected versions:
- 1.2 (Status: affected)
### References
1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0082)
### Credits
- This vulnerability is reported by Mohit Gadiya. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25409
- **State**: PUBLISHED
- **Published Date**: April 11, 2023 at 00:00 UTC
- **Last Updated**: February 11, 2025 at 16:41 UTC
- **Reserved Date**: February 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have access to other users outlets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-12819, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-12819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12819
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 11:11 UTC
- **Last Updated**: January 09, 2025 at 14:43 UTC
- **Reserved Date**: December 19, 2024 at 20:29 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Searchie plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sio_embed_media' shortcode in all versions up to, and including, 1.17.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**searchie - Searchie**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/8abed8c7-0c3f-4054-a116-82ce47d605de?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/searchie/trunk/SIO/Shortcodes/WidgetsEmbed.php)
3. [](https://wordpress.org/plugins/searchie/)
### Credits
- zakaria |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.