System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12470
- **State**: PUBLISHED
- **Published Date**: April 29, 2020 at 19:58 UTC
- **Last Updated**: August 04, 2024 at 11:56 UTC
- **Reserved Date**: April 29, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MonoX through 5.1.40.5152 allows administrators to execute arbitrary code by modifying an ASPX template.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/belong2yourself/vulnerabilities/tree/master/MonoX%20CMS/Privilege%20Escalation%20via%20Template%20Modification) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6848
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 06:31 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 18, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. API requests can be used to inject, generate and download executable files to the client ("Reflected File Download"). Malicious platform specific (e.g. Microsoft Windows) batch file can be created via a trusted domain without authentication that, if executed by the user, may lead to local code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf)
2. [93460](http://www.securityfocus.com/bid/93460) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5154, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5154 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5154
- **State**: PUBLISHED
- **Published Date**: October 01, 2007 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 15:24 UTC
- **Reserved Date**: September 30, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Session fixation vulnerability in Aipo and Aipo ASP 3.0.1.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVN#70075625](http://jvn.jp/jp/JVN%2370075625/index.html)
2. [41380](http://osvdb.org/41380)
3. [aipo-aipoasp-session-hijacking(36850)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36850)
4. [27004](http://secunia.com/advisories/27004)
5. [25843](http://www.securityfocus.com/bid/25843) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5559
- **State**: PUBLISHED
- **Published Date**: December 03, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://drupal.org/node/1840992)
2. [](http://drupal.org/node/1841030)
3. [51259](http://secunia.com/advisories/51259)
4. [[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules](http://www.openwall.com/lists/oss-security/2012/11/20/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0034, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0034
- **State**: PUBLISHED
- **Published Date**: May 09, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: November 30, 2005 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060510 Microsoft MSDTC NdrAllocate Validation Vulnerability](http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0269.html)
2. [oval:org.mitre.oval:def:1222](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1222)
3. [oval:org.mitre.oval:def:1477](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1477)
4. [20060511 Microsoft MSDTC NdrAllocate Validation Vulnerability](http://www.securityfocus.com/archive/1/433677/100/0/threaded)
5. [17906](http://www.securityfocus.com/bid/17906)
6. [1016047](http://securitytracker.com/id?1016047)
7. [25335](http://www.osvdb.org/25335)
8. [20060509 [EEYEB20051011A] - Microsoft Distributed Transaction Coordinator Heap Overflow](http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0238.html)
9. [msdtc-network-message-dos(25559)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25559)
10. [20060509 [EEYEB20051011A] - Microsoft Distributed Transaction Coordinator Heap Overflow](http://www.securityfocus.com/archive/1/433430/100/0/threaded)
11. [](http://www.eeye.com/html/research/advisories/AD20060509a.html)
12. [oval:org.mitre.oval:def:1908](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1908)
13. [863](http://securityreason.com/securityalert/863)
14. [ADV-2006-1742](http://www.vupen.com/english/advisories/2006/1742)
15. [MS06-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018)
16. [20000](http://secunia.com/advisories/20000) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0439
- **State**: PUBLISHED
- **Published Date**: February 02, 2013 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 07, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA13-032A](http://www.us-cert.gov/cas/techalerts/TA13-032A.html)
2. [VU#858729](http://www.kb.cert.org/vuls/id/858729)
3. [HPSBMU02874](http://marc.info/?l=bugtraq&m=136733161405818&w=2)
4. [oval:org.mitre.oval:def:16705](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16705)
5. [](http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html)
6. [SSRT101184](http://marc.info/?l=bugtraq&m=136733161405818&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1915, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1915 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1915
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5837
- **State**: PUBLISHED
- **Published Date**: May 11, 2020 at 19:25 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Symantec Endpoint Protection, prior to 14.3, may not respect file permissions when writing to log files that are replaced by symbolic links, which can lead to a potential elevation of privilege.
### Affected Products
**n/a - Symantec Endpoint Protection**
Affected versions:
- Prior to 14.3 (Status: affected)
### References
1. [](https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1762) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4875
- **State**: PUBLISHED
- **Published Date**: April 14, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 17, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the IVYWE (1) Assist plugin before 1.1.2.test20160906, (2) dataBox plugin before 0.0.0.20160906, and (3) userBox plugin before 0.0.0.20160906 for Geeklog allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ivywe/geeklog-ivywe/commit/3cdb4ebca5746ff1e02b7e434d5722044d1d09d1)
2. [JVNDB-2016-000167](http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000167.html)
3. [JVN#46087986](http://jvn.jp/en/jp/JVN46087986/index.html)
4. [](https://github.com/ivywe/geeklog-ivywe/commit/fe20a1bccdfec96125ab3d8dbee6ccbd0767c0be)
5. [93123](http://www.securityfocus.com/bid/93123) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0957, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0957 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0957
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:04 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-12 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3446
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 10:43 UTC
- **Last Updated**: May 15, 2025 at 13:41 UTC
- **Reserved Date**: April 08, 2025 at 11:30 UTC
- **Assigned By**: Mattermost
### Vulnerability Description
Mattermost versions 10.6.x <= 10.6.1, 10.5.x <= 10.5.2, 10.4.x <= 10.4.4, 9.11.x <= 9.11.11 fail to check the correct permissions which allows authenticated users who only have permission to invite non-guest users to a team to add guest users to that team via the API to add a single user to a team.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Mattermost - Mattermost**
Affected versions:
- 10.6.0 (Status: affected)
- 10.5.0 (Status: affected)
- 10.4.0 (Status: affected)
- 9.11.0 (Status: affected)
- 10.7.0 (Status: unaffected)
- 10.6.2 (Status: unaffected)
- 10.5.3 (Status: unaffected)
- 10.4.5 (Status: unaffected)
- 9.11.12 (Status: unaffected)
### References
1. [](https://mattermost.com/security-updates)
### Credits
- 0x7oda7123 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6057
- **State**: PUBLISHED
- **Published Date**: November 14, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Lack of special casing of Android ashmem in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to bypass inter-process read only guarantees via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html)
2. [103297](http://www.securityfocus.com/bid/103297)
3. [RHSA-2018:0484](https://access.redhat.com/errata/RHSA-2018:0484)
4. [](https://crbug.com/789959)
5. [DSA-4182](https://www.debian.org/security/2018/dsa-4182) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-2009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-2009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2009
- **State**: PUBLISHED
- **Published Date**: April 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in agenda.php3 in phpMyAgenda 3.0 Final and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootagenda parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17670](http://www.securityfocus.com/bid/17670)
2. [24943](http://www.osvdb.org/24943)
3. [20060515 tyree[at]users.sourceforge.net](http://www.securityfocus.com/archive/1/433995/100/0/threaded)
4. [787](http://securityreason.com/securityalert/787)
5. [ADV-2006-1509](http://www.vupen.com/english/advisories/2006/1509)
6. [phpmyagenda-rootagenda-file-include(26062)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26062)
7. [1015984](http://securitytracker.com/id?1015984)
8. [](http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt)
9. [](http://osvdb.org/ref/29/2914x-phpmyagenda.txt)
10. [19748](http://secunia.com/advisories/19748)
11. [20060424 [MajorSecurity] phpMyAgenda 3.0 Final - Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/431862/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6526
- **State**: PUBLISHED
- **Published Date**: July 05, 2024 at 13:31 UTC
- **Last Updated**: August 01, 2024 at 21:41 UTC
- **Reserved Date**: July 05, 2024 at 05:43 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in CodeIgniter Ecommerce-CodeIgniter-Bootstrap up to 1998845073cf433bc6c250b0354461fbd84d0e03. This affects an unknown part. The manipulation of the argument search_title/catName/sub/name/categorie leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 1b3da45308bb6c3f55247d0e99620b600bd85277. It is recommended to apply a patch to fix this issue. The identifier VDB-270369 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CodeIgniter - Ecommerce-CodeIgniter-Bootstrap**
Affected versions:
- 1998845073cf433bc6c250b0354461fbd84d0e03 (Status: affected)
### References
1. [VDB-270369 | CodeIgniter Ecommerce-CodeIgniter-Bootstrap cross site scripting](https://vuldb.com/?id.270369)
2. [VDB-270369 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.270369)
3. [Submit #368472 | CodeIgniter Foundation Codeigniter 3.1.13 Cross Site Scripting](https://vuldb.com/?submit.368472)
4. [](https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263)
5. [](https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263#issuecomment-2199387443)
6. [](https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/1b3da45308bb6c3f55247d0e99620b600bd85277)
### Credits
- Juan Carlos Martinez
- evilcode52 (VulDB User)
- evilcode52 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2404
- **State**: PUBLISHED
- **Published Date**: April 17, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 15:36 UTC
- **Reserved Date**: March 05, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect integrity via unknown vectors related to Portal, a different vulnerability than CVE-2013-3818.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html)
2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27795
- **State**: PUBLISHED
- **Published Date**: December 06, 2023 at 01:16 UTC
- **Last Updated**: August 03, 2024 at 21:33 UTC
- **Reserved Date**: February 26, 2021 at 20:18 UTC
- **Assigned By**: brocade
### Vulnerability Description
Brocade Fabric OS (FOS) hardware
platforms running any version of Brocade Fabric OS software, which
supports the license string format; contain cryptographic
issues that could allow for the installation of forged or fraudulent
license keys. This would allow attackers or a malicious party to forge a
counterfeit license key that the Brocade Fabric OS platform would
authenticate and activate as if it were a legitimate license key.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**Brocade - Brocade Switches**
Affected versions:
- All Version (Status: affected)
### References
1. [](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/21289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2691
- **State**: PUBLISHED
- **Published Date**: May 16, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 15, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugs.mysql.com/bug.php?id=27515)
2. [27823](http://secunia.com/advisories/27823)
3. [](http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html)
4. [RHSA-2007:0894](http://www.redhat.com/support/errata/RHSA-2007-0894.html)
5. [26073](http://secunia.com/advisories/26073)
6. [31681](http://www.securityfocus.com/bid/31681)
7. [1018069](http://www.securitytracker.com/id?1018069)
8. [31226](http://secunia.com/advisories/31226)
9. [[announce] 20070712 MySQL Community Server 5.0.45 has been released!](http://lists.mysql.com/announce/470)
10. [ADV-2007-1804](http://www.vupen.com/english/advisories/2007/1804)
11. [RHSA-2008:0768](http://www.redhat.com/support/errata/RHSA-2008-0768.html)
12. [mysql-renametable-weak-security(34347)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34347)
13. [25946](http://secunia.com/advisories/25946)
14. [20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server](http://www.securityfocus.com/archive/1/473874/100/0/threaded)
15. [24016](http://www.securityfocus.com/bid/24016)
16. [25301](http://secunia.com/advisories/25301)
17. [DSA-1413](http://www.debian.org/security/2007/dsa-1413)
18. [34766](http://osvdb.org/34766)
19. [](https://issues.rpath.com/browse/RPL-1536)
20. [32222](http://secunia.com/advisories/32222)
21. [USN-528-1](https://usn.ubuntu.com/528-1/)
22. [MDKSA-2007:139](http://www.mandriva.com/security/advisories?name=MDKSA-2007:139)
23. [30351](http://secunia.com/advisories/30351)
24. [27155](http://secunia.com/advisories/27155)
25. [26430](http://secunia.com/advisories/26430)
26. [ADV-2008-2780](http://www.vupen.com/english/advisories/2008/2780)
27. [28838](http://secunia.com/advisories/28838)
28. [SUSE-SR:2008:003](http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html)
29. [RHSA-2008:0364](http://www.redhat.com/support/errata/RHSA-2008-0364.html)
30. [APPLE-SA-2008-10-09](http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html)
31. [](http://support.apple.com/kb/HT3216)
32. [oval:org.mitre.oval:def:9559](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15226
- **State**: PUBLISHED
- **Published Date**: October 09, 2019 at 15:25 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n^2) performance characteristics. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/envoyproxy/envoy/commits/master)
2. [](https://github.com/envoyproxy/envoy/commit/afc39bea36fd436e54262f150c009e8d72db5014)
3. [](https://github.com/envoyproxy/envoy/issues/8520) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38899
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 16:45 UTC
- **Last Updated**: September 16, 2024 at 20:07 UTC
- **Reserved Date**: August 16, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cloud Pak for Data 2.5 could allow a local user with special privileges to obtain highly sensitive information. IBM X-Force ID: 209575.
### Affected Products
**IBM - Cloud Pak for Data**
Affected versions:
- 2.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6490435)
2. [ibm-cp4d-cve202138899-info-disc (209575)](https://exchange.xforce.ibmcloud.com/vulnerabilities/209575) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-46646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-46646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-46646
- **State**: PUBLISHED
- **Published Date**: April 26, 2025 at 00:00 UTC
- **Last Updated**: April 29, 2025 at 15:23 UTC
- **Reserved Date**: April 26, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Artifex Ghostscript before 10.05.0, decode_utf8 in base/gp_utf8.c mishandles overlong UTF-8 encoding. NOTE: this issue exists because of an incomplete fix for CVE-2024-46954.
### CVSS Metrics
- **CVSS Base Score**: 4.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-24: Security Weakness
### Affected Products
**Artifex - Ghostscript**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://bugs.ghostscript.com/show_bug.cgi?id=708311)
2. [](https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0061, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0061 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0061
- **State**: PUBLISHED
- **Published Date**: April 13, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: January 11, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:4593](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4593)
2. [oval:org.mitre.oval:def:3994](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3994)
3. [oval:org.mitre.oval:def:1761](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1761)
4. [MS05-018](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018)
5. [oval:org.mitre.oval:def:1656](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1656) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10409
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, and SD 835, TOCTOU vulnerability may occur while composing the RPMB request using HLOS controlled buffers.
### Affected Products
**Qualcomm, Inc. - Snapdragon Automobile, Snapdragon Mobile**
Affected versions:
- SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22406, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22406 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22406
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 22:30 UTC
- **Last Updated**: June 02, 2025 at 15:06 UTC
- **Reserved Date**: January 10, 2024 at 15:09 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Shopware is an open headless commerce platform. The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. This issue has been addressed and users are advised to update to Shopware 6.5.7.4. For older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
### CVSS Metrics
- **CVSS Base Score**: 9.3/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**shopware - shopware**
Affected versions:
- < 6.5.7.4 (Status: affected)
### References
1. [https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9](https://github.com/shopware/shopware/security/advisories/GHSA-qmp9-2xwj-m6m9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47637
- **State**: PUBLISHED
- **Published Date**: September 12, 2023 at 00:00 UTC
- **Last Updated**: September 26, 2024 at 15:17 UTC
- **Reserved Date**: December 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The installer in XAMPP through 8.1.12 allows local users to write to the C:\xampp directory. Common use cases execute files under C:\xampp with administrative privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://shinnai.altervista.org/exploits/DVRT-2023-0001_CVE-2022-47637.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4820, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4820 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4820
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4907.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
2. [1033881](http://www.securitytracker.com/id/1033881) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0902, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0902 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0902
- **State**: PUBLISHED
- **Published Date**: July 21, 2022 at 15:34 UTC
- **Last Updated**: September 17, 2024 at 02:00 UTC
- **Reserved Date**: March 09, 2022 at 00:00 UTC
- **Assigned By**: ABB
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
- CWE-77: Security Weakness
### Affected Products
**ABB - RMC-100 (Standard)**
Affected versions:
- unspecified (Status: affected)
**ABB - RMC-100-LITE**
Affected versions:
- unspecified (Status: affected)
**ABB - XIO**
Affected versions:
- unspecified (Status: affected)
**ABB - XFCG5**
Affected versions:
- unspecified (Status: affected)
**ABB - XRCG5**
Affected versions:
- unspecified (Status: affected)
**ABB - uFLOG5**
Affected versions:
- unspecified (Status: affected)
**ABB - UDC**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A0927&LanguageCode=en&DocumentPartId=&Action=Launch&_ga)
### Credits
- ABB thanks Vera Mens at Claroty Research for helping to identify the vulnerabilities and protecting our customers. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28460
- **State**: PUBLISHED
- **Published Date**: April 13, 2021 at 19:33 UTC
- **Last Updated**: August 03, 2024 at 21:40 UTC
- **Reserved Date**: March 15, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Sphere Unsigned Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Sphere**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28460) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5862, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5862
- **State**: PUBLISHED
- **Published Date**: October 31, 2023 at 00:00 UTC
- **Last Updated**: September 05, 2024 at 17:54 UTC
- **Reserved Date**: October 31, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Missing Authorization in GitHub repository hamza417/inure prior to Build95.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**hamza417 - hamza417/inure**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d)
2. [](https://github.com/hamza417/inure/commit/52b8c0bae36f129a5be05e377d7391afc3629df6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2451, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2451 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2451
- **State**: PUBLISHED
- **Published Date**: June 29, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 24, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple format string vulnerabilities in the DCC functionality in KVIrc 3.4 and 4.0 have unspecified impact and remote attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2010-10522](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043601.html)
2. [[KVIrc] 20100517 Proposal for a stable release of kvirc4](http://lists.omnikron.net/pipermail/kvirc/2010-May/000867.html)
3. [40746](http://www.securityfocus.com/bid/40746)
4. [ADV-2010-1602](http://www.vupen.com/english/advisories/2010/1602)
5. [FEDORA-2010-10529](http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043629.html)
6. [DSA-2065](http://www.debian.org/security/2010/dsa-2065)
7. [40349](http://secunia.com/advisories/40349)
8. [SUSE-SR:2010:014](http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html)
9. [32410](http://secunia.com/advisories/32410) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23477, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23477
- **State**: PUBLISHED
- **Published Date**: February 03, 2023 at 17:24 UTC
- **Last Updated**: March 25, 2025 at 19:46 UTC
- **Reserved Date**: January 12, 2023 at 16:24 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 8.5 and 9.0 traditional could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects. IBM X-Force ID: 245513.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**IBM - WebSphere Application Server**
Affected versions:
- 8.5, 9.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6891111)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/245513) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20014, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20014 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20014
- **State**: PUBLISHED
- **Published Date**: March 28, 2022 at 20:45 UTC
- **Last Updated**: August 05, 2024 at 21:45 UTC
- **Reserved Date**: January 28, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in WEKA INTEREST Security Scanner up to 1.8. Affected by this issue is some unknown functionality of the component Webspider. The manipulation with an unknown input leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### CVSS Metrics
- **CVSS Base Score**: 2.8/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**WEKA - INTEREST Security Scanner**
Affected versions:
- 1.0 (Status: affected)
- 1.1 (Status: affected)
- 1.2 (Status: affected)
- 1.3 (Status: affected)
- 1.4 (Status: affected)
- 1.5 (Status: affected)
- 1.6 (Status: affected)
- 1.7 (Status: affected)
- 1.8 (Status: affected)
### References
1. [](https://vuldb.com/?id.101969)
2. [](http://www.computec.ch/news.php?item.117)
3. [](https://vuldb.com/?id.101972)
### Credits
- Marc Ruef |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18145
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-40159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-40159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40159
- **State**: REJECTED
- **Published Date**: July 18, 2024 at 16:19 UTC
- **Last Updated**: April 09, 2025 at 20:26 UTC
- **Reserved Date**: August 21, 2023 at 22:09 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4770
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 13:32 UTC
- **Last Updated**: August 02, 2024 at 07:37 UTC
- **Reserved Date**: September 05, 2023 at 11:46 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
An uncontrolled search path element vulnerability has been found on 4D and 4D server Windows executables applications, affecting version 19 R8 100218. This vulnerability consists in a DLL hijacking by replacing x64 shfolder.dll in the installation path, causing an arbitrary code execution.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-427: Security Weakness
### Affected Products
**4D - 4D.exe**
Affected versions:
- 19 R8 100218 (Status: affected)
**4D - 4D Server.exe**
Affected versions:
- 19 R8 100218 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-element-vulnerability-4d-and-4d-windows-server)
### Credits
- Alexander Huamán Jaimes (@zanganox) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27355, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27355 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27355
- **State**: PUBLISHED
- **Published Date**: February 24, 2025 at 14:49 UTC
- **Last Updated**: February 24, 2025 at 15:55 UTC
- **Reserved Date**: February 21, 2025 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Nicolas GRILLET Woocommerce – Loi Hamon allows Stored XSS. This issue affects Woocommerce – Loi Hamon: from n/a through 1.1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Nicolas GRILLET - Woocommerce – Loi Hamon**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/loi-hamon/vulnerability/wordpress-woocommerce-loi-hamon-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1575
- **State**: PUBLISHED
- **Published Date**: April 21, 2005 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: April 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#41408](http://www.kb.cert.org/vuls/id/41408)
2. [VU#24839](http://www.kb.cert.org/vuls/id/24839)
3. [MS99-037](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037)
4. [VU#26924](http://www.kb.cert.org/vuls/id/26924)
5. [VU#9162](http://www.kb.cert.org/vuls/id/9162)
6. [wang-kodak-activex-control(7097)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7097)
7. [19990924 Several ActiveX Buffer Overruns](http://www.securityfocus.com/archive/1/28719)
8. [VU#23412](http://www.kb.cert.org/vuls/id/23412) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0652, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0652 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0652
- **State**: PUBLISHED
- **Published Date**: January 08, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Mappings page in Cisco Context Directory Agent (CDA) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuj45358.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64703](http://www.securityfocus.com/bid/64703)
2. [101803](http://osvdb.org/101803)
3. [20140107 Cisco Context Directory Agent Mappings Page Cross-Site Scripting Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0652)
4. [56365](http://secunia.com/advisories/56365)
5. [cisco-cda-cve20140652-xss(90167)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90167)
6. [](http://tools.cisco.com/security/center/viewAlert.x?alertId=32365)
7. [1029572](http://www.securitytracker.com/id/1029572) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1610
- **State**: PUBLISHED
- **Published Date**: June 20, 2022 at 10:25 UTC
- **Last Updated**: August 03, 2024 at 00:10 UTC
- **Reserved Date**: May 06, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Seamless Donations WordPress plugin before 5.1.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Seamless Donations: A Platform for Global Fundraising and Rebuilding using Stripe and PayPal**
Affected versions:
- 5.1.9 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93)
### Credits
- Daniel Ruf |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5732
- **State**: PUBLISHED
- **Published Date**: November 09, 2015 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 06:59 UTC
- **Reserved Date**: August 04, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the form function in the WP_Nav_Menu_Widget class in wp-includes/default-widgets.php in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via a widget title.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/)
2. [76160](http://www.securityfocus.com/bid/76160)
3. [](https://wpvulndb.com/vulnerabilities/8131)
4. [[oss-security] 20150804 Re: CVE request: WordPress 4.2.3 and earlier multiple vulnerabilities](http://openwall.com/lists/oss-security/2015/08/04/7)
5. [1033178](http://www.securitytracker.com/id/1033178)
6. [](https://core.trac.wordpress.org/changeset/33529)
7. [DSA-3332](http://www.debian.org/security/2015/dsa-3332)
8. [](https://codex.wordpress.org/Version_4.2.4)
9. [DSA-3383](http://www.debian.org/security/2015/dsa-3383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38391
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 23:07 UTC
- **Last Updated**: September 06, 2024 at 15:41 UTC
- **Reserved Date**: July 17, 2023 at 15:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themesgrove Onepage Builder allows SQL Injection.This issue affects Onepage Builder: from n/a through 2.4.1.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Themesgrove - Onepage Builder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/tx-onepager/wordpress-onepage-builder-easiest-landing-page-builder-for-wordpress-plugin-2-4-1-sql-injection?_s_id=cve)
### Credits
- minhtuanact (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-24319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-24319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24319
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA web server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**n/a - ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)**
Affected versions:
- ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions) (Status: affected)
### References
1. [](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05)
2. [](https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0018/MNDT-2022-0018.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1088
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 15:37 UTC
- **Last Updated**: February 19, 2025 at 20:21 UTC
- **Reserved Date**: February 28, 2023 at 13:18 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
### Weakness Classification (CWE)
- CWE-352 Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - WP Plugin Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a956f1cd-fce4-4235-b1af-4b7675a60ca2)
### Credits
- WPScan
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26324
- **State**: PUBLISHED
- **Published Date**: November 22, 2024 at 15:34 UTC
- **Last Updated**: November 26, 2024 at 14:20 UTC
- **Reserved Date**: February 28, 2022 at 21:48 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Possible XSS in iManager URL for access Component has been discovered in
OpenText™ iManager 3.2.6.0000.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**OpenText - iManager**
Affected versions:
- 3.0.0 (Status: affected)
### References
1. [](https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch1_releasenotes/imanager326_patch1_releasenotes.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8237
- **State**: PUBLISHED
- **Published Date**: June 13, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 16:27 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists while loading a firmware image.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-06-01)
2. [1038623](http://www.securitytracker.com/id/1038623) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-41128, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-41128 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41128
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 18:04 UTC
- **Last Updated**: October 17, 2024 at 17:11 UTC
- **Reserved Date**: July 15, 2024 at 15:53 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Action Pack is a framework for handling and responding to web requests. Starting in version 3.1.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to version 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may use Ruby 3.2 as a workaround. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**rails - rails**
Affected versions:
- >= 3.1.0, < 6.1.7.9 (Status: affected)
- >= 7.0.0, < 7.0.8.5 (Status: affected)
- >= 7.1.0, < 7.1.4.1 (Status: affected)
- >= 7.2.0, < 7.2.1.1 (Status: affected)
### References
1. [https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj](https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj)
2. [https://github.com/rails/rails/commit/27121e80f6dbb260f5a9f0452cd8411cb681f075](https://github.com/rails/rails/commit/27121e80f6dbb260f5a9f0452cd8411cb681f075)
3. [https://github.com/rails/rails/commit/b0fe99fa854ec8ff4498e75779b458392d1560ef](https://github.com/rails/rails/commit/b0fe99fa854ec8ff4498e75779b458392d1560ef)
4. [https://github.com/rails/rails/commit/b1241f468d1b32235f438c2e2203386e6efd3891](https://github.com/rails/rails/commit/b1241f468d1b32235f438c2e2203386e6efd3891)
5. [https://github.com/rails/rails/commit/fb493bebae1a9b83e494fe7edbf01f6167d606fd](https://github.com/rails/rails/commit/fb493bebae1a9b83e494fe7edbf01f6167d606fd)
6. [https://access.redhat.com/security/cve/cve-2024-41128](https://access.redhat.com/security/cve/cve-2024-41128)
7. [https://bugzilla.redhat.com/show_bug.cgi?id=2319036](https://bugzilla.redhat.com/show_bug.cgi?id=2319036) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17367
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 23:05 UTC
- **Last Updated**: November 05, 2020 at 23:05 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4412
- **State**: REJECTED
- **Last Updated**: August 30, 2024 at 20:11 UTC
- **Reserved Date**: December 11, 2022 at 16:24 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0530
- **State**: PUBLISHED
- **Published Date**: April 17, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Buffer overflow in an unspecified function in nsr_render_log in EMC NetWorker before 8.0.4.3, 8.1.x before 8.1.2.6, and 8.2.x before 8.2.1.2 allows local users to gain privileges via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20150415 ESA-2015-069: EMC NetWorker Buffer Overflow Vulnerability](http://seclists.org/bugtraq/2015/Apr/103)
2. [1032147](http://www.securitytracker.com/id/1032147) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1572, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1572 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1572
- **State**: PUBLISHED
- **Published Date**: March 22, 2023 at 12:00 UTC
- **Last Updated**: February 25, 2025 at 20:59 UTC
- **Reserved Date**: March 22, 2023 at 11:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
### CVSS Metrics
- **CVSS Base Score**: 2/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - DataGear**
Affected versions:
- 1.11.0 (Status: affected)
- 1.11.1 (Status: affected)
### References
1. [](https://vuldb.com/?id.223564)
2. [](https://vuldb.com/?ctiid.223564)
3. [](https://github.com/yangyanglo/ForCVE/edit/main/2023-0x03.md)
4. [](https://github.com/yangyanglo/ForCVE/blob/main/2023-0x03.md)
5. [](https://github.com/datageartech/datagear/releases/tag/v1.12.0)
### Credits
- yangyanglo (VulDB User)
- yangyanglo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22157
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 18:00 UTC
- **Last Updated**: May 21, 2025 at 03:55 UTC
- **Reserved Date**: January 01, 2025 at 00:01 UTC
- **Assigned By**: atlassian
### Vulnerability Description
This High severity PrivEsc (Privilege Escalation) vulnerability was introduced in versions:
9.12.0, 10.3.0, 10.4.0, and 10.5.0 of Jira Core Data Center and Server
5.12.0, 10.3.0, 10.4.0, and 10.5.0 of Jira Service Management Data Center and Server
This PrivEsc (Privilege Escalation) vulnerability, with a CVSS Score of 7.2, allows an attacker to perform actions as a higher-privileged user.
Atlassian recommends that Jira Core Data Center and Server and Jira Service Management Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Jira Core Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.20
Jira Service Management Data Center and Server 5.12: Upgrade to a release greater than or equal to 5.12.20
Jira Core Data Center 10.3: Upgrade to a release greater than or equal to 10.3.5
Jira Service Management Data Center 10.3: Upgrade to a release greater than or equal to 10.3.5
Jira Core Data Center 10.4: Upgrade to a release greater than or equal to 10.6.0
Jira Service Management Data Center 10.4: Upgrade to a release greater than or equal to 10.6.0
Jira Core Data Center 10.5: Upgrade to a release greater than or equal to 10.5.1
Jira Service Management Data Center 10.5: Upgrade to a release greater than or equal to 10.5.1
See the release notes. You can download the latest version of Jira Core Data Center and Jira Service Management Data Center from the download center.
This vulnerability was reported via our Atlassian (Internal) program.
### Affected Products
**Atlassian - Jira Core Data Center**
Affected versions:
- 10.5.0 (Status: affected)
- 10.4.0 to 10.4.1 (Status: affected)
- 10.3.0 to 10.3.4 (Status: affected)
- 9.12.0 to 9.12.19 (Status: affected)
- 10.6.0 (Status: unaffected)
- 10.5.1 (Status: unaffected)
- 10.3.5 to 10.3.6 (Status: unaffected)
- 9.12.22 to 9.12.23 (Status: unaffected)
**Atlassian - Jira Core Server**
Affected versions:
- 9.12.0 to 9.12.19 (Status: affected)
- 9.12.22 to 9.12.23 (Status: unaffected)
**Atlassian - Jira Service Management Data Center**
Affected versions:
- 10.5.0 (Status: affected)
- 10.4.0 to 10.4.1 (Status: affected)
- 10.3.0 to 10.3.4 (Status: affected)
- 5.12.0 to 5.12.19 (Status: affected)
- 10.6.0 (Status: unaffected)
- 10.5.1 (Status: unaffected)
- 10.3.5 to 10.3.6 (Status: unaffected)
- 5.12.22 to 5.12.23 (Status: unaffected)
**Atlassian - Jira Service Management Server**
Affected versions:
- 5.12.0 to 5.12.19 (Status: affected)
- 5.12.22 to 5.12.23 (Status: unaffected)
### References
1. [](https://confluence.atlassian.com/pages/viewpage.action?pageId=1561365992)
2. [](https://jira.atlassian.com/browse/JRASERVER-78766)
3. [](https://jira.atlassian.com/browse/JSDSERVER-16206)
### Credits
- Internal (Atlassian) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5450
- **State**: PUBLISHED
- **Published Date**: March 19, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 11:48 UTC
- **Reserved Date**: August 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zarafa Collaboration Platform 4.1 uses world-readable permissions for /etc/zarafa/license, which allows local users to obtain sensitive information by reading license files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2014-9754](http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137158.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1133439)
3. [FEDORA-2014-9768](http://lists.fedoraproject.org/pipermail/package-announce/2014-September/137232.html)
4. [[oss-security] 20140825 Re: CVE request: Multiple incorrect default permissions in Zarafa](http://www.openwall.com/lists/oss-security/2014/08/25/1)
5. [69370](http://www.securityfocus.com/bid/69370)
6. [zarafa-license-info-disc(95454)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10158, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10158 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10158
- **State**: PUBLISHED
- **Published Date**: October 19, 2017 at 17:00 UTC
- **Last Updated**: October 04, 2024 at 16:58 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Core). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PT PeopleTools**
Affected versions:
- 8.54 (Status: affected)
- 8.55 (Status: affected)
- 8.56 (Status: affected)
### References
1. [101469](http://www.securityfocus.com/bid/101469)
2. [1039598](http://www.securitytracker.com/id/1039598)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36184
- **State**: PUBLISHED
- **Published Date**: November 02, 2021 at 18:51 UTC
- **Last Updated**: October 25, 2024 at 13:43 UTC
- **Reserved Date**: July 06, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A improper neutralization of Special Elements used in an SQL Command ('SQL Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C`
### Affected Products
**Fortinet - Fortinet FortiWLM**
Affected versions:
- FortiWLM 8.6.1, 8.6.0, 8.5.2, 8.5.1, 8.5.0, 8.4.2, 8.4.1, 8.4.0, 8.3.2, 8.3.1, 8.3.0, 8.2.2 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-21-107) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3821
- **State**: PUBLISHED
- **Published Date**: September 24, 2011 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 03:38 UTC
- **Reserved Date**: September 23, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xajax 0.6 beta1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by xajax_core/plugin_layer/xajaxScriptPlugin.inc.php and certain other files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/xajax)
2. [[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability](http://www.openwall.com/lists/oss-security/2011/06/27/6)
3. [](http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27967
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 15:38 UTC
- **Reserved Date**: March 08, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in Xcode 14.3. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
### Affected Products
**Apple - Xcode**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10577
- **State**: PUBLISHED
- **Published Date**: November 13, 2024 at 02:02 UTC
- **Last Updated**: November 13, 2024 at 14:42 UTC
- **Reserved Date**: October 31, 2024 at 12:08 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The 胖鼠采集(Fat Rat Collect) 微信知乎简书腾讯新闻列表分页采集, 还有自动采集、自动发布、自动标签、等多项功能。开源插件 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to missing escaping on a URL in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**fbtopcn - 胖鼠采集(Fat Rat Collect) 微信知乎简书腾讯新闻列表分页采集, 还有自动采集、自动发布、自动标签、等多项功能。开源插件**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/664d265b-7b35-4c61-b48b-d051b7fb5ebd?source=cve)
2. [](https://wordpress.org/plugins/fat-rat-collect/)
### Credits
- Peter Thaleikis |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8155, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8155 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8155
- **State**: REJECTED
- **Published Date**: March 01, 2021 at 23:08 UTC
- **Last Updated**: March 01, 2021 at 23:08 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9117, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9117
- **State**: PUBLISHED
- **Published Date**: December 01, 2020 at 00:02 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
HUAWEI nova 4 versions earlier than 10.0.0.165(C01E34R2P4) and SydneyM-AL00 versions earlier than 10.0.0.165(C00E66R1P5) have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected products. Due to insufficient validation of packet, which may be exploited to cause the information leakage or arbitrary code execution.
### Affected Products
**n/a - HUAWEI nova 4;SydneyM-AL00**
Affected versions:
- Versions earlier than 10.0.0.165(C01E34R2P4) (Status: affected)
- Versions earlier than 10.0.0.165(C00E66R1P5) (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201125-01-outofboundread-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-31641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-31641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-31641
- **State**: PUBLISHED
- **Published Date**: June 01, 2021 at 14:11 UTC
- **Last Updated**: August 03, 2024 at 23:03 UTC
- **Reserved Date**: April 23, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An unauthenticated XSS vulnerability exists in several IoT devices from CHIYU Technology, including BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, BF-MINI-W, and SEMAC due to a lack of sanitization when the HTTP 404 message is generated.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641)
2. [](https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/#.YLY_lXmSlPY)
3. [](https://www.chiyu-tech.com/msg/message-Firmware-update-87.html)
4. [](http://packetstormsecurity.com/files/162887/CHIYU-IoT-Cross-Site-Scripting.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23126
- **State**: PUBLISHED
- **Published Date**: January 24, 2022 at 18:07 UTC
- **Last Updated**: August 03, 2024 at 03:36 UTC
- **Reserved Date**: January 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/adriankumpf/teslamate/commit/fff6915e7364f83b3030f980d5743299c4e5260d)
2. [](https://twitter.com/teslascope/status/1481252837174624258)
3. [](https://github.com/adriankumpf/teslamate/compare/v1.25.0...v1.25.1)
4. [](https://github.com/adriankumpf/teslamate/releases/tag/v1.25.1)
5. [](https://medium.com/%40david_colombo/how-i-got-access-to-25-teslas-around-the-world-by-accident-and-curiosity-8b9ef040a028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12165, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12165 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12165
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 18:28 UTC
- **Reserved Date**: August 01, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.
### Weakness Classification (CWE)
- CWE-444: Security Weakness
### Affected Products
**Red Hat - undertow**
Affected versions:
- 1.4.17 (Status: affected)
- 1.3.31 (Status: affected)
- 2.0.0 (Status: affected)
### References
1. [RHSA-2018:1322](https://access.redhat.com/errata/RHSA-2018:1322)
2. [RHSA-2018:0002](https://access.redhat.com/errata/RHSA-2018:0002)
3. [RHSA-2017:3458](https://access.redhat.com/errata/RHSA-2017:3458)
4. [RHSA-2018:0004](https://access.redhat.com/errata/RHSA-2018:0004)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165)
6. [RHSA-2017:3455](https://access.redhat.com/errata/RHSA-2017:3455)
7. [RHSA-2017:3456](https://access.redhat.com/errata/RHSA-2017:3456)
8. [RHSA-2018:0003](https://access.redhat.com/errata/RHSA-2018:0003)
9. [RHSA-2018:0005](https://access.redhat.com/errata/RHSA-2018:0005)
10. [RHSA-2017:3454](https://access.redhat.com/errata/RHSA-2017:3454) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47366
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 19:02 UTC
- **Reserved Date**: November 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The leakage of channel access token in craft_members Line 13.6.1 allows remote attackers to send malicious notifications to victims.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/syz913/CVE-reports/blob/main/craft_members.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26916
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 15:59 UTC
- **Last Updated**: May 04, 2025 at 08:59 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Revert "drm/amd: flush any delayed gfxoff on suspend entry"
commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring
callbacks") caused GFXOFF control to be used more heavily and the
codepath that was removed from commit 0dee72639533 ("drm/amd: flush any
delayed gfxoff on suspend entry") now can be exercised at suspend again.
Users report that by using GNOME to suspend the lockscreen trigger will
cause SDMA traffic and the system can deadlock.
This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
### Affected Products
**Linux - Linux**
Affected versions:
- f94942885e8416ce9de84d8fae93684002682b5d (Status: affected)
- 78b2ba39beef21c8baebb1868569c2026ad76de0 (Status: affected)
- 3aae4ef4d799fb3d0381157640fdb251008cf0ae (Status: affected)
- ab4750332dbe535243def5dcebc24ca00c1f98ac (Status: affected)
- ab4750332dbe535243def5dcebc24ca00c1f98ac (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 5.15.149 (Status: unaffected)
- 6.1.79 (Status: unaffected)
- 6.6.18 (Status: unaffected)
- 6.7.6 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/65158edb0a3a8df23197d52cd24287e39eaf95d6)
2. [](https://git.kernel.org/stable/c/ff70e6ff6fc2413caf33410af7462d1f584d927e)
3. [](https://git.kernel.org/stable/c/caa2565a2e13899be31f7b1e069e6465d3e2adb0)
4. [](https://git.kernel.org/stable/c/d855ceb6a5fde668c5431156bc60fae0cc52b764)
5. [](https://git.kernel.org/stable/c/916361685319098f696b798ef1560f69ed96e934) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24980
- **State**: PUBLISHED
- **Published Date**: February 07, 2025 at 19:56 UTC
- **Last Updated**: February 07, 2025 at 21:13 UTC
- **Reserved Date**: January 29, 2025 at 15:18 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
pimcore/admin-ui-classic-bundle provides a Backend UI for Pimcore. In affected versions an error message discloses existing accounts and leads to user enumeration on the target via "Forgot password" function. No generic error message has been implemented. This issue has been addressed in version 1.7.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### Weakness Classification (CWE)
- CWE-204: Improper Input Validation
### Affected Products
**pimcore - admin-ui-classic-bundle**
Affected versions:
- < 1.7.4 (Status: affected)
### References
1. [https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-vr5f-php7-rg24](https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-vr5f-php7-rg24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30953
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212975)
2. [](https://support.apple.com/en-us/HT212976)
3. [](https://support.apple.com/en-us/HT212978)
4. [](https://support.apple.com/en-us/HT212980)
5. [](https://support.apple.com/en-us/HT212982)
6. [[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001](http://www.openwall.com/lists/oss-security/2022/01/21/2)
7. [FEDORA-2022-25a98f5d55](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/)
8. [DSA-5061](https://www.debian.org/security/2022/dsa-5061)
9. [DSA-5060](https://www.debian.org/security/2022/dsa-5060)
10. [FEDORA-2022-f7366e60cb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0196, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0196 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0196
- **State**: PUBLISHED
- **Published Date**: April 14, 2010 at 15:44 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 06, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:7064](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7064)
2. [ADV-2010-0873](http://www.vupen.com/english/advisories/2010/0873)
3. [TA10-103C](http://www.us-cert.gov/cas/techalerts/TA10-103C.html)
4. [39329](http://www.securityfocus.com/bid/39329)
5. [](http://www.adobe.com/support/security/bulletins/apsb10-09.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24648
- **State**: PUBLISHED
- **Published Date**: February 13, 2023 at 00:00 UTC
- **Last Updated**: March 21, 2025 at 18:04 UTC
- **Reserved Date**: January 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Zstore v6.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/zippy/zstore-6.6.0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0303
- **State**: PUBLISHED
- **Published Date**: March 18, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: March 17, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OWLS 1.0 allows remote attackers to retrieve arbitrary files via absolute pathnames in (1) the file parameter in /glossaries/index.php, (2) the filename parameter in /readings/index.php, or (3) the filename parameter in /multiplechoice/resultsignore.php, as demonstrated using /etc/passwd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040218 ZH2004-08SA (security advisory): OWLS 1.0 Remote arbitrary files](http://marc.info/?l=bugtraq&m=107712123305706&w=2)
2. [owls-file-retrieval(15249)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15249)
3. [](http://www.zone-h.org/en/advisories/read/id=3973/)
4. [9689](http://www.securityfocus.com/bid/9689) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27604
- **State**: PUBLISHED
- **Published Date**: April 02, 2024 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 21:18 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Alldata V0.4.6 is vulnerable to Command execution vulnerability. System commands can be deserialized.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/Raybye/b88847e9e9a94a1b1028dbdb7e38c12b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40408, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40408
- **State**: PUBLISHED
- **Published Date**: September 29, 2022 at 13:33 UTC
- **Last Updated**: May 20, 2025 at 18:13 UTC
- **Reserved Date**: September 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FeehiCMS v2.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted payload injected into the Comment box under the Single Page module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/liufee/feehicms/issues/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-18414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-18414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18414
- **State**: PUBLISHED
- **Published Date**: October 24, 2019 at 17:20 UTC
- **Last Updated**: August 05, 2024 at 01:54 UTC
- **Reserved Date**: October 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sourcecodester Restaurant Management System 1.0 is affected by an admin/staff-exec.php Cross Site Request Forgery vulnerability due to a lack of CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code or adding a staff entry via a crafted HTML page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sevenlayers.com/index.php/263-restaurant-management-system-csrf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25639
- **State**: PUBLISHED
- **Published Date**: July 08, 2024 at 14:24 UTC
- **Last Updated**: August 01, 2024 at 23:44 UTC
- **Reserved Date**: February 08, 2024 at 22:26 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Khoj is an application that creates personal AI agents. The Khoj Obsidian, Desktop and Web clients inadequately sanitize the AI model's response and user inputs. This can trigger Cross Site Scripting (XSS) via Prompt Injection from untrusted documents either indexed by the user on Khoj or read by Khoj from the internet when the user invokes the /online command. This vulnerability is fixed in 1.13.0.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
### Affected Products
**khoj-ai - khoj**
Affected versions:
- < 1.13.0 (Status: affected)
### References
1. [https://github.com/khoj-ai/khoj/security/advisories/GHSA-h2q2-vch3-72qm](https://github.com/khoj-ai/khoj/security/advisories/GHSA-h2q2-vch3-72qm)
2. [https://github.com/khoj-ai/khoj/commit/1dfd6d7391862d3564db7f4875216880b73cb6cc](https://github.com/khoj-ai/khoj/commit/1dfd6d7391862d3564db7f4875216880b73cb6cc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2733
- **State**: PUBLISHED
- **Published Date**: August 18, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 13, 2011 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC RSA Adaptive Authentication On-Premise (AAOP) 6.0.2.1 SP1 Patch 2, SP1 Patch 3, SP2, SP2 Patch 1, and SP3 does not prevent reuse of authentication information during a session, which allows remote authenticated users to bypass intended access restrictions via vectors related to knowledge of the originally used authentication information and unspecified other session information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [49574](http://www.securityfocus.com/bid/49574)
2. [20110816 ESA-2011-027: RSA, The Security Division of EMC, releases Security Patch for Adaptive Authentication (On-Premise)](http://www.securityfocus.com/archive/1/519346/100/0/threaded)
3. [8344](http://securityreason.com/securityalert/8344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42435, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42435
- **State**: PUBLISHED
- **Published Date**: January 03, 2023 at 23:16 UTC
- **Last Updated**: April 10, 2025 at 14:36 UTC
- **Reserved Date**: October 06, 2022 at 15:51 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Business Automation Workflow 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, and 22.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 238054.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**IBM - Business Automation Workflow**
Affected versions:
- 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6852217)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/238054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39979, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39979 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39979
- **State**: PUBLISHED
- **Published Date**: September 02, 2023 at 12:05 UTC
- **Last Updated**: September 30, 2024 at 20:18 UTC
- **Reserved Date**: August 08, 2023 at 07:09 UTC
- **Assigned By**: Moxa
### Vulnerability Description
There is a vulnerability in MXsecurity versions prior to 1.0.1 that can be exploited to bypass authentication. A remote attacker might access the system if the web service authenticator has insufficient random values.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-334: Security Weakness
### Affected Products
**Moxa - MXsecurity Series**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9329
- **State**: PUBLISHED
- **Published Date**: September 30, 2024 at 07:11 UTC
- **Last Updated**: October 07, 2024 at 15:59 UTC
- **Reserved Date**: September 29, 2024 at 16:38 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
### Weakness Classification (CWE)
- CWE-233: Security Weakness
### Affected Products
**Eclipse Foundation - Glassfish**
Affected versions:
- 5.1.0 (Status: affected)
### References
1. [](https://github.com/eclipse-ee4j/glassfish/pull/25106)
2. [](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/232)
### Credits
- Marco Ventura (redteam https://www.gruppotim.it/it/footer/red-team.html)
- Claudia Bartolini (redteam https://www.gruppotim.it/it/footer/red-team.html)
- Andrea Carlo Maria Dattola (redteam https://www.gruppotim.it/it/footer/red-team.html)
- Debora Esposito (redteam https://www.gruppotim.it/it/footer/red-team.html)
- Massimiliano Brolli (redteam https://www.gruppotim.it/it/footer/red-team.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14865, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14865
- **State**: PUBLISHED
- **Published Date**: July 03, 2019 at 18:40 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: August 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/odoo/odoo/issues/32501) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1181
- **State**: PUBLISHED
- **Published Date**: February 11, 2025 at 08:00 UTC
- **Last Updated**: April 25, 2025 at 23:02 UTC
- **Reserved Date**: February 10, 2025 at 11:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**GNU - Binutils**
Affected versions:
- 2.43 (Status: affected)
### References
1. [VDB-295084 | GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption](https://vuldb.com/?id.295084)
2. [VDB-295084 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.295084)
3. [Submit #495402 | GNU ld 2.43 illegal read access with --gc-sections --no-print-gc-sections -w](https://vuldb.com/?submit.495402)
4. [](https://sourceware.org/bugzilla/show_bug.cgi?id=32643)
5. [](https://sourceware.org/bugzilla/attachment.cgi?id=15918)
6. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24)
7. [](https://www.gnu.org/)
### Credits
- wenjusun (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4590
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12019
- **State**: REJECTED
- **Published Date**: June 01, 2020 at 14:55 UTC
- **Last Updated**: June 01, 2020 at 14:55 UTC
- **Reserved Date**: May 13, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25252
- **State**: PUBLISHED
- **Published Date**: March 03, 2021 at 15:43 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 15, 2021 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
### Affected Products
**Trend Micro - Trend Micro Virus Scan API (VSAPI) Engine
**
Affected versions:
- 12.0 (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/000285675) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5236, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5236
- **State**: PUBLISHED
- **Published Date**: October 11, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 10, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in search.php in 4images 1.7.x allows remote authenticated users to execute arbitrary SQL commands via the search_user parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20394](http://www.securityfocus.com/bid/20394)
2. [](http://w4ck1ng.com/board/showthread.php?t=1037)
3. [20061008 SQL injection - 4images](http://www.securityfocus.com/archive/1/448022/100/0/threaded)
4. [4images-search-sql-injection(29389)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29389)
5. [1017074](http://securitytracker.com/id?1017074)
6. [22349](http://secunia.com/advisories/22349)
7. [1711](http://securityreason.com/securityalert/1711)
8. [2487](https://www.exploit-db.com/exploits/2487)
9. [ADV-2006-3974](http://www.vupen.com/english/advisories/2006/3974) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1719
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 09:33 UTC
- **Last Updated**: August 01, 2024 at 18:48 UTC
- **Reserved Date**: February 21, 2024 at 17:48 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Easy PayPal & Stripe Buy Now Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.3 and in Contact Form 7 – PayPal & Stripe Add-on all versions up to, and including 2.1. This is due to missing or incorrect nonce validation on the 'wpecpp_stripe_connect_completion' function. This makes it possible for unauthenticated attackers to modify the plugins settings and chance the stripe connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**scottpaterson - Contact Form 7 – PayPal & Stripe Add-on**
Affected versions:
- * (Status: affected)
**scottpaterson - Easy PayPal & Stripe Buy Now Button**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/a5276227-9bd4-4ad8-a6b7-ac7d05e8b056?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040962%40wp-ecommerce-paypal&new=3040962%40wp-ecommerce-paypal&sfp_email=&sfph_mail=)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040958%40contact-form-7-paypal-add-on&new=3040958%40contact-form-7-paypal-add-on&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4308, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4308
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 18:25 UTC
- **Last Updated**: September 17, 2024 at 00:40 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Emptoris Sourcing 10.1.0 through 10.1.3, IBM Contract Management 10.1.0 through 10.1.3, and IBM Emptoris Spend Analysis 10.1.0 through 10.1.3 could allow an authenticated user to obtain sensitive information from error messages IBM X-Force ID: 161034.
### Affected Products
**IBM - Emptoris Sourcing**
Affected versions:
- 10.1.0 (Status: affected)
- 10.1.3 (Status: affected)
**IBM - Contract Management**
Affected versions:
- 10.1.0 (Status: affected)
- 10.1.3 (Status: affected)
**IBM - Emptoris Spend Analysis**
Affected versions:
- 10.1.0 (Status: affected)
- 10.1.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/docview.wss?uid=ibm10880221)
2. [ibm-emptoris-cve20194308-info-disc (161034)](https://exchange.xforce.ibmcloud.com/vulnerabilities/161034) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0356, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0356
- **State**: PUBLISHED
- **Published Date**: January 19, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 18, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Common Controls Replacement Project (CCRP) FolderTreeview (FTV) ActiveX control (ccrpftv6.ocx) allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via a long CCRP.RootFolder property value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22092](http://www.securityfocus.com/bid/22092)
2. [3142](https://www.exploit-db.com/exploits/3142)
3. [ie-ccrp-dos(31549)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31549) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4679, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4679 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4679
- **State**: PUBLISHED
- **Published Date**: May 16, 2025 at 08:36 UTC
- **Last Updated**: May 17, 2025 at 10:04 UTC
- **Reserved Date**: May 14, 2025 at 08:49 UTC
- **Assigned By**: synology
### Vulnerability Description
A vulnerability in Synology Active Backup for Microsoft 365 allows remote authenticated attackers to obtain sensitive information via unspecified vectors.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Synology - Active Backup for Microsoft 365**
Affected versions:
- N/A (Status: affected)
### References
1. [Synology-SA-25:06 Active Backup for Microsoft 365](https://www.synology.com/en-global/security/advisory/Synology_SA_25_06)
### Credits
- Leonid Hartmann of modzero |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1268
- **State**: PUBLISHED
- **Published Date**: June 06, 2018 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 04:25 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not validate app GUID structure in requests. A remote authenticated malicious user knowing the GUID of an app may construct malicious requests to read from or write to the logs of that app.
### Affected Products
**Cloud Foundry - Loggregator**
Affected versions:
- 89.x (Status: affected)
- 96.x (Status: affected)
- 99.x (Status: affected)
- 101.x (Status: affected)
- 102.x (Status: affected)
### References
1. [](https://www.cloudfoundry.org/blog/cve-2018-1268) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20439, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20439
- **State**: PUBLISHED
- **Published Date**: December 25, 2018 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 02:46 UTC
- **Reserved Date**: December 25, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Technicolor DPC3928SL D3928SL-PSIP-13-A010-c3420r55105-170214a devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://misteralfa-hack.blogspot.com/2018/12/technicolor-passwords-wireless-via-snmp.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3724
- **State**: PUBLISHED
- **Published Date**: May 02, 2024 at 16:52 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 12, 2024 at 17:37 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Stack Group, Photo Stack, & Horizontal Timeline widgets in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**thehappymonster - Happy Addons for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/826483d7-948d-46c4-890c-71001b03847c?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/photo-stack/widget.php)
3. [](https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/image-stack-group/widget.php)
4. [](https://plugins.trac.wordpress.org/changeset/3072960/happy-elementor-addons/trunk/widgets/horizontal-timeline/widget.php)
### Credits
- Matthew Rollings |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-51748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-51748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51748
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:48 UTC
- **Reserved Date**: December 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ScaleFusion 10.5.2 does not properly limit users to the Edge application because Ctrl-O and Ctrl-S can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59)
2. [](https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6)
3. [](https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6335, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6335
- **State**: PUBLISHED
- **Published Date**: October 11, 2019 at 17:34 UTC
- **Last Updated**: August 04, 2024 at 20:16 UTC
- **Reserved Date**: January 15, 2019 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
A potential security vulnerability has been identified with Samsung Laser Printers. This vulnerability could potentially be exploited to create a denial of service.
### Affected Products
**Samsung - Laser Printers**
Affected versions:
- CLP680DW_V4.00.02.33 (Status: affected)
- TBD (Status: affected)
- V3.82.01.20 (Status: affected)
### References
1. [](https://support.hp.com/hr-en/document/c06461713) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3255
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:30 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Fluid Core). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - PeopleSoft Enterprise PT PeopleTools**
Affected versions:
- 8.55 (Status: affected)
- 8.56 (Status: affected)
- 8.57 (Status: affected)
### References
1. [1041891](http://www.securitytracker.com/id/1041891)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
3. [105609](http://www.securityfocus.com/bid/105609) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35508
- **State**: PUBLISHED
- **Published Date**: December 04, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 15:21 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) are vulnerable to SSRF when proxying HTTP requests between pve(pmg)proxy and pve(pmg)daemon. An attacker with an unprivileged account can craft an HTTP request to achieve SSRF and file disclosure of any files on the server. Also, in Proxmox Mail Gateway, privilege escalation to the root@pam account is possible if the backup feature has ever been used, because backup files such as pmg-backup_YYYY_MM_DD_*.tgz have 0644 permissions and contain an authkey value. This is fixed in pve-http-server 4.1-3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://git.proxmox.com/?p=pve-http-server.git%3Ba=commitdiff%3Bh=580d540ea907ba15f64379c5bb69ecf1a49a875f)
2. [](https://git.proxmox.com/?p=pve-http-server.git%3Ba=commitdiff%3Bh=e9df8a6e76b2a18f89295a5d92a62177bbf0f762)
3. [](https://git.proxmox.com/?p=pve-http-server.git%3Ba=commitdiff%3Bh=c2bd69c7b5e9c775f96021cf8ae53da3dbd9029d)
4. [](https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16858, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16858
- **State**: PUBLISHED
- **Published Date**: March 25, 2019 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.
### Weakness Classification (CWE)
- CWE-356: Security Weakness
### Affected Products
**[UNKNOWN] - libreoffice**
Affected versions:
- 6.0.7 (Status: affected)
- 6.1.3 (Status: affected)
### References
1. [](https://www.libreoffice.org/about-us/security/advisories/cve-2018-16858/)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16858)
3. [](http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html)
4. [](http://www.rapid7.com/db/modules/exploit/multi/fileformat/libreoffice_macro_exec)
5. [46727](https://www.exploit-db.com/exploits/46727/)
6. [RHSA-2019:2130](https://access.redhat.com/errata/RHSA-2019:2130)
7. [20190815 [SECURITY] [DSA 4501-1] libreoffice security update](https://seclists.org/bugtraq/2019/Aug/28)
8. [openSUSE-SU-2019:1929](http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29580
- **State**: PUBLISHED
- **Published Date**: April 12, 2023 at 00:00 UTC
- **Last Updated**: February 08, 2025 at 02:29 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yasm/yasm/issues/215)
2. [](https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-10024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-10024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10024
- **State**: PUBLISHED
- **Published Date**: March 24, 2019 at 23:11 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for y Bresenham parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1527, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1527
- **State**: PUBLISHED
- **Published Date**: August 17, 2020 at 19:13 UTC
- **Last Updated**: August 04, 2024 at 06:39 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Custom Protocol Engine improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Custom Protocol Engine handles memory.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1527) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39271
- **State**: PUBLISHED
- **Published Date**: August 30, 2021 at 04:58 UTC
- **Last Updated**: August 04, 2024 at 02:06 UTC
- **Reserved Date**: August 18, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.bscw.de/en/company/)
2. [](https://seclists.org/fulldisclosure/2021/Aug/24)
3. [](http://packetstormsecurity.com/files/163989/BSCW-Server-Remote-Code-Execution.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5405, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5405 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5405
- **State**: PUBLISHED
- **Published Date**: June 11, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 14:55 UTC
- **Reserved Date**: January 13, 2017 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [96693](http://www.securityfocus.com/bid/96693)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1336699)
3. [RHSA-2017:0459](http://rhn.redhat.com/errata/RHSA-2017-0459.html)
4. [](https://www.mozilla.org/security/advisories/mfsa2017-09/)
5. [DSA-3832](https://www.debian.org/security/2017/dsa-3832)
6. [](https://www.mozilla.org/security/advisories/mfsa2017-07/)
7. [](https://www.mozilla.org/security/advisories/mfsa2017-05/)
8. [1037966](http://www.securitytracker.com/id/1037966)
9. [GLSA-201705-06](https://security.gentoo.org/glsa/201705-06)
10. [RHSA-2017:0461](http://rhn.redhat.com/errata/RHSA-2017-0461.html)
11. [DSA-3805](https://www.debian.org/security/2017/dsa-3805)
12. [](https://www.mozilla.org/security/advisories/mfsa2017-06/)
13. [RHSA-2017:0498](http://rhn.redhat.com/errata/RHSA-2017-0498.html)
14. [GLSA-201705-07](https://security.gentoo.org/glsa/201705-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-4447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-4447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-4447
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 06:43 UTC
- **Last Updated**: October 16, 2024 at 19:36 UTC
- **Reserved Date**: October 15, 2024 at 18:28 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Essential Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to and including 4.6.4 due to a lack of restrictions on who can add a registration form and a custom registration role to an Elementor created page. This makes it possible for attackers with access to the Elementor page builder to create a new registration form that defaults to the user role being set to administrator and subsequently register as an administrative user.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**wpdevteam - Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/be098ee9-b749-4908-85e8-e717d019609a?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2526471%40essential-addons-for-elementor-lite&new=2526471%40essential-addons-for-elementor-lite&sfp_email=&sfph_mail=)
### Credits
- Chloe Chamberland |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.