System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3338, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3338 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3338
- **State**: PUBLISHED
- **Published Date**: October 18, 2022 at 00:00 UTC
- **Last Updated**: May 13, 2025 at 14:46 UTC
- **Reserved Date**: September 27, 2022 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Trellix - Trellix ePolicy Orchestrator (ePO)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://kcm.trellix.com/corporate/index?page=content&id=SB10387) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27988
- **State**: PUBLISHED
- **Published Date**: May 30, 2023 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 16:26 UTC
- **Reserved Date**: March 09, 2023 at 00:00 UTC
- **Assigned By**: Zyxel
### Vulnerability Description
The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device remotely.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Zyxel - NAS326 firmware**
Affected versions:
- < V5.21(AAZF.13)C0 (Status: affected)
### References
1. [](https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-nas-products) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18450
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:08 UTC
- **Reserved Date**: October 17, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
apps\admin\controller\content\SingleController.php in PbootCMS before V1.3.0 build 2018-11-12 has SQL Injection, as demonstrated by the POST data to the admin.php/Single/mod/mcode/1/id/3 URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.pbootcms.com/changelog.html)
2. [](http://www.ttk7.cn/post-96.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10598, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10598 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10598
- **State**: PUBLISHED
- **Published Date**: October 31, 2024 at 21:31 UTC
- **Last Updated**: November 01, 2024 at 14:36 UTC
- **Reserved Date**: October 31, 2024 at 15:24 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in Tongda OA 11.2/11.3/11.4/11.5/11.6. This vulnerability affects unknown code of the file general/hr/setting/attendance/leave/data.php of the component Annual Leave Handler. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
### Affected Products
**Tongda - OA**
Affected versions:
- 11.2 (Status: affected)
- 11.3 (Status: affected)
- 11.4 (Status: affected)
- 11.5 (Status: affected)
- 11.6 (Status: affected)
### References
1. [VDB-282610 | Tongda OA Annual Leave data.php improper authorization](https://vuldb.com/?id.282610)
2. [VDB-282610 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282610)
3. [Submit #433495 | Beijing Tongda Xinke Technology Co., Ltd Tongda OA v11.2-v11.6 unauthorized access](https://vuldb.com/?submit.433495)
4. [](https://github.com/LvZCh/td/issues/1)
### Credits
- LVZC (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33693
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 18:01 UTC
- **Last Updated**: August 03, 2024 at 23:58 UTC
- **Reserved Date**: May 28, 2021 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**SAP SE - SAP Cloud Connector**
Affected versions:
- < 2.0 (Status: affected)
### References
1. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806)
2. [](https://launchpad.support.sap.com/#/notes/3058553) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1060
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [340](http://www.securityfocus.com/bid/340)
2. [19990217 Tetrix 1.13.16 is Vulnerable](http://marc.info/?l=bugtraq&m=91937090211855&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4265, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4265 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4265
- **State**: PUBLISHED
- **Published Date**: August 12, 2023 at 22:09 UTC
- **Last Updated**: February 13, 2025 at 17:09 UTC
- **Reserved Date**: August 08, 2023 at 21:13 UTC
- **Assigned By**: zephyr
### Vulnerability Description
Potential buffer overflow vulnerabilities in the following locations:
https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359
https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**zephyrproject-rtos - Zephyr**
Affected versions:
- * (Status: affected)
### References
1. [](https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh)
2. [](http://www.openwall.com/lists/oss-security/2023/11/07/1)
3. [](http://seclists.org/fulldisclosure/2023/Nov/1)
4. [](http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html)
### Credits
- raptor@0xdeadbeef.info |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27640
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 16:37 UTC
- **Reserved Date**: March 05, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows SQL Injection V-2024-012.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0347, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0347 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0347
- **State**: PUBLISHED
- **Published Date**: April 12, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 05, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Settings module in Websense Triton Unified Security Center 7.7.3 before Hotfix 31, Web Filter 7.7.3 before Hotfix 31, Web Security 7.7.3 before Hotfix 31, Web Security Gateway 7.7.3 before Hotfix 31, and Web Security Gateway Anywhere 7.7.3 before Hotfix 31 allows remote authenticated users to read cleartext passwords by replacing type="password" with type="text" in an INPUT element in the (1) Log Database or (2) User Directories component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#568252](http://www.kb.cert.org/vuls/id/568252)
2. [](https://www.websense.com/content/mywebsense-hotfixes.aspx?patchid=894&prodidx=20&osidx=0&intidx=0&versionidx=0) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1305, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1305 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1305
- **State**: PUBLISHED
- **Published Date**: July 25, 2022 at 13:39 UTC
- **Last Updated**: August 03, 2024 at 00:03 UTC
- **Reserved Date**: April 11, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://crbug.com/1285234)
2. [](https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_11.html)
3. [GLSA-202208-25](https://security.gentoo.org/glsa/202208-25) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-5227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-5227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5227
- **State**: PUBLISHED
- **Published Date**: October 18, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Landing Pages plugin before 1.9.2 for WordPress allows remote attackers to execute arbitrary code via the url parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/landing-pages/#developers)
2. [](https://wpvulndb.com/vulnerabilities/8200) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38684
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 15:25 UTC
- **Last Updated**: October 10, 2024 at 16:03 UTC
- **Reserved Date**: July 24, 2023 at 16:19 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**discourse - discourse**
Affected versions:
- >= 3.1.0.beta1, < 3.1.0.beta7 (Status: affected)
- < 3.0.6 (Status: affected)
### References
1. [https://github.com/discourse/discourse/security/advisories/GHSA-ff7g-xv79-hgmf](https://github.com/discourse/discourse/security/advisories/GHSA-ff7g-xv79-hgmf)
2. [https://github.com/discourse/discourse/commit/bfc3132bb22bd5b7e86f428746b89c4d3d7f5a70](https://github.com/discourse/discourse/commit/bfc3132bb22bd5b7e86f428746b89c4d3d7f5a70) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43400
- **State**: PUBLISHED
- **Published Date**: August 19, 2024 at 16:24 UTC
- **Last Updated**: August 22, 2024 at 14:00 UTC
- **Reserved Date**: August 12, 2024 at 18:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineer to trick a user to follow the URL. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-96: Security Weakness
### Affected Products
**xwiki - xwiki-platform**
Affected versions:
- >= 15.6-rc-1, < 15.10.2 (Status: affected)
- >= 15.0-rc-1, < 15.5.5 (Status: affected)
- < 14.10.21 (Status: affected)
- = 16.0.0-rc-1 (Status: affected)
### References
1. [https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-wcg9-pgqv-xm5v](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-wcg9-pgqv-xm5v)
2. [https://github.com/xwiki/xwiki-platform/commit/27eca8423fc1ad177518077a733076821268509c](https://github.com/xwiki/xwiki-platform/commit/27eca8423fc1ad177518077a733076821268509c)
3. [https://jira.xwiki.org/browse/XWIKI-21810](https://jira.xwiki.org/browse/XWIKI-21810) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47322
- **State**: PUBLISHED
- **Published Date**: February 06, 2023 at 05:27 UTC
- **Last Updated**: March 26, 2025 at 14:11 UTC
- **Reserved Date**: December 13, 2022 at 05:23 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1621031430231134210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28175
- **State**: PUBLISHED
- **Published Date**: April 06, 2021 at 05:01 UTC
- **Last Updated**: September 16, 2024 at 23:31 UTC
- **Reserved Date**: March 12, 2021 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
The Radius configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**ASUS - BMC firmware for Z10PR-D16**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for ASMB8-iKVM**
Affected versions:
- 1.14.51 (Status: affected)
**ASUS - BMC firmware for Z10PE-D16 WS**
Affected versions:
- 1.14.2 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-4543-98220-1.html)
2. [](https://www.asus.com/content/ASUS-Product-Security-Advisory/)
3. [](https://www.asus.com/tw/support/callus/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26952
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 14:17 UTC
- **Last Updated**: February 25, 2025 at 17:14 UTC
- **Reserved Date**: February 17, 2025 at 11:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Business Card Block allows Stored XSS. This issue affects Business Card Block: from n/a through 1.0.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bPlugins - Business Card Block**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/business-card-block/vulnerability/wordpress-business-card-block-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Logan Cote (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2549, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2549 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2549
- **State**: PUBLISHED
- **Published Date**: August 12, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:30 UTC
- **Reserved Date**: August 12, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2005:054](http://www.novell.com/linux/security/advisories/2005_54_evolution.html)
2. [14532](http://www.securityfocus.com/bid/14532)
3. [RHSA-2005:267](http://www.redhat.com/support/errata/RHSA-2005-267.html)
4. [19380](http://secunia.com/advisories/19380)
5. [DSA-1016](http://www.debian.org/security/2006/dsa-1016)
6. [FEDORA-2005-743](http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html)
7. [MDKSA-2005:141](http://www.mandriva.com/security/advisories?name=MDKSA-2005:141)
8. [16394](http://secunia.com/advisories/16394)
9. [oval:org.mitre.oval:def:9553](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553)
10. [](http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html)
11. [20050810 Evolution multiple remote format string bugs](http://www.securityfocus.com/archive/1/407789)
12. [20050810 Evolution multiple remote format string bugs](http://marc.info/?l=full-disclosure&m=112368237712032&w=2)
13. [USN-166-1](https://usn.ubuntu.com/166-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32981
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 19:45 UTC
- **Last Updated**: April 16, 2025 at 17:56 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
AVEVA System Platform versions 2017 through 2020 R2 P01 uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**AVEVA - AVEVA System Platform**
Affected versions:
- 2017 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-05)
2. [](https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2021-002.pdf)
### Credits
- Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2144, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2144
- **State**: PUBLISHED
- **Published Date**: June 03, 2010 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 03, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in signinform.php in Zeeways eBay Clone Auction Script allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.org/1005-exploits/zeeways-xss.txt)
2. [12805](http://www.exploit-db.com/exploits/12805)
3. [ADV-2010-1289](http://www.vupen.com/english/advisories/2010/1289)
4. [65006](http://osvdb.org/65006)
5. [40452](http://www.securityfocus.com/bid/40452)
6. [39987](http://secunia.com/advisories/39987) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23162
- **State**: PUBLISHED
- **Published Date**: February 10, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 10:28 UTC
- **Reserved Date**: January 11, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Art Gallery Management System Project v1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at product.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip)
2. [](https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/)
3. [](https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23162/CVE-2023-23162.txt)
4. [](http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39996
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:24 UTC
- **Last Updated**: December 13, 2024 at 20:36 UTC
- **Reserved Date**: August 08, 2023 at 11:24 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Accordion and Accordion Slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accordion and Accordion Slider: from n/a through 1.2.4.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**WP OnlineSupport, Essential Plugin - Accordion and Accordion Slider**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/accordion-and-accordion-slider/vulnerability/wordpress-accordion-and-accordion-slider-plugin-1-2-4-broken-access-control?_s_id=cve)
### Credits
- Cat (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9830
- **State**: PUBLISHED
- **Published Date**: June 27, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 17:18 UTC
- **Reserved Date**: June 23, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.radicallyopensecurity.com/CVE-2017-9830.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-18568, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-18568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-18568
- **State**: PUBLISHED
- **Published Date**: February 02, 2021 at 13:22 UTC
- **Last Updated**: August 04, 2024 at 14:00 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16960
- **State**: PUBLISHED
- **Published Date**: November 27, 2017 at 10:00 UTC
- **Last Updated**: August 05, 2024 at 20:43 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/interface command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/interface.lua in uhttpd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/TplinkInterfaceAuthenticatedRCE.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0574
- **State**: PUBLISHED
- **Published Date**: February 27, 2005 at 05:00 UTC
- **Last Updated**: September 17, 2024 at 00:05 UTC
- **Reserved Date**: February 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in CIS WebServer 3.5.13 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050225 CIS WebServer Directory Traversal Bug](http://www.securityfocus.com/archive/1/391560)
2. [12662](http://www.securityfocus.com/bid/12662) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0179, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0179
- **State**: PUBLISHED
- **Published Date**: April 05, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 00:37 UTC
- **Reserved Date**: January 06, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2011:003](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00002.html)
2. [MDVSA-2010:251](http://www.mandriva.com/security/advisories?name=MDVSA-2010:251)
3. [](http://support.avaya.com/css/P8/documents/100124650)
4. [firefox-firebug-code-execution(57394)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57394)
5. [39397](http://secunia.com/advisories/39397)
6. [39308](http://secunia.com/advisories/39308)
7. [42818](http://secunia.com/advisories/42818)
8. [oval:org.mitre.oval:def:6971](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6971)
9. [ADV-2010-0781](http://www.vupen.com/english/advisories/2010/0781)
10. [USN-921-1](http://ubuntu.com/usn/usn-921-1)
11. [39124](http://www.securityfocus.com/bid/39124)
12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=504021)
13. [SUSE-SR:2010:013](http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html)
14. [ADV-2010-0764](http://www.vupen.com/english/advisories/2010/0764)
15. [ADV-2011-0030](http://www.vupen.com/english/advisories/2011/0030)
16. [MDVSA-2010:070](http://www.mandriva.com/security/advisories?name=MDVSA-2010:070)
17. [oval:org.mitre.oval:def:9446](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9446)
18. [](http://www.mozilla.org/security/announce/2010/mfsa2010-21.html)
19. [39243](http://secunia.com/advisories/39243)
20. [ADV-2010-0748](http://www.vupen.com/english/advisories/2010/0748)
21. [ADV-2010-0849](http://www.vupen.com/english/advisories/2010/0849)
22. [1023783](http://securitytracker.com/id?1023783)
23. [DSA-2027](http://www.debian.org/security/2010/dsa-2027)
24. [3924](http://secunia.com/advisories/3924)
25. [RHSA-2010:0332](http://www.redhat.com/support/errata/RHSA-2010-0332.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-5019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-5019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5019
- **State**: PUBLISHED
- **Published Date**: January 05, 2012 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 00:23 UTC
- **Reserved Date**: December 27, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in setup/index.php in Textpattern CMS 4.4.1, when the product is incompletely installed, allows remote attackers to inject arbitrary web script or HTML via the ddb parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51254](http://www.securityfocus.com/bid/51254)
2. [20120103 TWSL2012-001: Cross-Site Scripting Vulnerability in Textpattern Content Management System](http://archives.neohapsis.com/archives/bugtraq/2012-01/0018.html)
3. [textpattern-ddb-xss(72102)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72102) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22113
- **State**: PUBLISHED
- **Published Date**: January 22, 2024 at 04:17 UTC
- **Last Updated**: August 01, 2024 at 22:35 UTC
- **Reserved Date**: January 05, 2024 at 06:39 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Open redirect vulnerability in Access analysis CGI An-Analyzer released in 2023 December 31 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct phishing attacks via a specially crafted URL.
### Affected Products
**ANGLERSNET Co,.Ltd. - Access analysis CGI An-Analyzer**
Affected versions:
- released in 2023 December 31 and earlier (Status: affected)
### References
1. [](https://www.anglers-net.com/anlog/update/)
2. [](https://jvn.jp/en/jp/JVN73587943/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23603
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:29 UTC
- **Last Updated**: January 22, 2025 at 19:50 UTC
- **Reserved Date**: January 16, 2025 at 11:27 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Group category creator allows Reflected XSS. This issue affects Group category creator: from n/a through 1.3.0.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - Group category creator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/group-category-creator/vulnerability/wordpress-group-category-creator-plugin-1-3-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- thiennv (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9886
- **State**: PUBLISHED
- **Published Date**: July 11, 2019 at 18:21 UTC
- **Last Updated**: September 16, 2024 at 16:53 UTC
- **Reserved Date**: March 19, 2019 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
Any URLs with download_attachment.php under templates or home folders can allow arbitrary files downloaded without login in BroadLearning eClass before version ip.2.5.10.2.1.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
- CWE-284: Security Weakness
### Affected Products
**BroadLearning - eclass**
Affected versions:
- ip (Status: affected)
### References
1. [](https://tvn.twcert.org.tw/taiwanvn/TVN-201906004)
2. [](http://surl.twcert.org.tw/aTxze)
3. [](https://zeroday.hitcon.org/vulnerability/ZD-2019-00423)
### Credits
- Mr. Kaede Rukawa |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4304
- **State**: PUBLISHED
- **Published Date**: June 18, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 18, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in browse.php in SQL Buddy 1.3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [68017](http://www.securityfocus.com/bid/68017)
2. [](https://www.netsparker.com/critical-xss-vulnerability-in-sql-buddy)
3. [59002](http://secunia.com/advisories/59002) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1264
- **State**: PUBLISHED
- **Published Date**: May 20, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 21, 2015 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:0969](http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html)
2. [](http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html)
3. [GLSA-201506-04](https://security.gentoo.org/glsa/201506-04)
4. [openSUSE-SU-2015:1877](http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html)
5. [1032375](http://www.securitytracker.com/id/1032375)
6. [DSA-3267](http://www.debian.org/security/2015/dsa-3267)
7. [74723](http://www.securityfocus.com/bid/74723)
8. [](https://code.google.com/p/chromium/issues/detail?id=481015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11223, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11223 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11223
- **State**: PUBLISHED
- **Published Date**: December 26, 2024 at 06:00 UTC
- **Last Updated**: December 30, 2024 at 17:15 UTC
- **Reserved Date**: November 14, 2024 at 18:31 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPForms WordPress plugin before 1.9.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - WPForms**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/82989909-9745-4c9a-abc7-c1adf8c2b047/)
### Credits
- Dmitrii Ignatyev
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47443
- **State**: PUBLISHED
- **Published Date**: November 12, 2024 at 18:20 UTC
- **Last Updated**: November 16, 2024 at 04:55 UTC
- **Reserved Date**: September 24, 2024 at 17:40 UTC
- **Assigned By**: adobe
### Vulnerability Description
After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Adobe - After Effects**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/after_effects/apsb24-85.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20987
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:41 UTC
- **Last Updated**: June 02, 2025 at 15:07 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**Oracle Corporation - BI Publisher (formerly XML Publisher)**
Affected versions:
- 12.2.1.4.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9601
- **State**: PUBLISHED
- **Published Date**: April 23, 2018 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:59 UTC
- **Reserved Date**: November 23, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**unspecified - ghostscript**
Affected versions:
- ghostscript 0.14 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601)
2. [97095](http://www.securityfocus.com/bid/97095)
3. [](http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092)
4. [GLSA-201706-24](https://security.gentoo.org/glsa/201706-24)
5. [DSA-3817](https://www.debian.org/security/2017/dsa-3817)
6. [](https://bugs.ghostscript.com/show_bug.cgi?id=697457) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2483
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 21:04 UTC
- **Last Updated**: January 16, 2025 at 22:03 UTC
- **Reserved Date**: July 19, 2022 at 21:41 UTC
- **Assigned By**: icscert
### Vulnerability Description
The bootloader in the Nokia ASIK AirScale system module (versions 474021A.101 and 474021A.102) loads public keys for firmware verification signature. If an attacker modifies the flash contents to corrupt the keys, secure boot could be permanently disabled on a given device.
### CVSS Metrics
- **CVSS Base Score**: 8.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1282: Security Weakness
### Affected Products
**Nokia - ASIK AirScale **
Affected versions:
- 474021A.101 (Status: affected)
- 474021A.102 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-02)
### Credits
- Joel Cretan
- Red Balloon Security |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22672, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22672 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22672
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 17:42 UTC
- **Last Updated**: August 03, 2024 at 03:21 UTC
- **Reserved Date**: January 05, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.4 and iPadOS 15.4, Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213182)
2. [](https://support.apple.com/en-us/HT213183)
3. [](https://support.apple.com/en-us/HT213184)
4. [](https://support.apple.com/en-us/HT213185) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6339
- **State**: PUBLISHED
- **Published Date**: November 11, 2014 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 8 and 9 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1031185](http://www.securitytracker.com/id/1031185)
2. [MS14-065](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065)
3. [70948](http://www.securityfocus.com/bid/70948) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3259
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 05:39 UTC
- **Reserved Date**: April 10, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xenbits.xen.org/xsa/advisory-137.html)
2. [DSA-3414](http://www.debian.org/security/2015/dsa-3414)
3. [SUSE-SU-2015:1299](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html)
4. [GLSA-201604-03](https://security.gentoo.org/glsa/201604-03)
5. [SUSE-SU-2015:1302](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html)
6. [75573](http://www.securityfocus.com/bid/75573)
7. [1032973](http://www.securitytracker.com/id/1032973) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23960
- **State**: PUBLISHED
- **Published Date**: March 12, 2022 at 23:57 UTC
- **Last Updated**: August 03, 2024 at 03:59 UTC
- **Reserved Date**: January 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability)
2. [](https://developer.arm.com/support/arm-security-updates)
3. [[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues](http://www.openwall.com/lists/oss-security/2022/03/18/2)
4. [[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update](https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html)
5. [DSA-5173](https://www.debian.org/security/2022/dsa-5173) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8913
- **State**: PUBLISHED
- **Published Date**: February 01, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 25, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
### Affected Products
**IBM Corporation - Kenexa LMS on Cloud**
Affected versions:
- 13.0 (Status: affected)
- 13.1 (Status: affected)
- 13.2 (Status: affected)
- 13.2.2 (Status: affected)
- 13.2.3 (Status: affected)
- 13.2.4 (Status: affected)
- 14.0.0 (Status: affected)
- 14.1.0 (Status: affected)
- 14.2.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21993982)
2. [94304](http://www.securityfocus.com/bid/94304) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39194, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39194 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39194
- **State**: PUBLISHED
- **Published Date**: September 02, 2022 at 04:45 UTC
- **Last Updated**: August 03, 2024 at 12:00 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://phabricator.wikimedia.org/T313205) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9951, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9951 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9951
- **State**: PUBLISHED
- **Published Date**: October 16, 2020 at 16:53 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT211843)
2. [](https://support.apple.com/kb/HT211850)
3. [](https://support.apple.com/kb/HT211844)
4. [](https://support.apple.com/HT211845)
5. [](https://support.apple.com/kb/HT211952)
6. [20201115 APPLE-SA-2020-11-13-5 Additional information for APPLE-SA-2020-09-16-3 Safari 14.0](http://seclists.org/fulldisclosure/2020/Nov/18)
7. [20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0](http://seclists.org/fulldisclosure/2020/Nov/19)
8. [20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0](http://seclists.org/fulldisclosure/2020/Nov/20)
9. [20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0](http://seclists.org/fulldisclosure/2020/Nov/22)
10. [[oss-security] 20201123 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0008](http://www.openwall.com/lists/oss-security/2020/11/23/3)
11. [DSA-4797](https://www.debian.org/security/2020/dsa-4797)
12. [](https://support.apple.com/kb/HT211935)
13. [GLSA-202012-10](https://security.gentoo.org/glsa/202012-10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4537
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 28, 2005 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1457
- **State**: PUBLISHED
- **Published Date**: February 13, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Virtual Private Network (VPN) capability in Novell Bordermanager 3.8 allows remote attackers to cause a denial of service (ABEND in IKE.NLM) via a malformed IKE packet, as sent by the Striker ISAKMP Protocol Test Suite.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [12067](http://secunia.com/advisories/12067/)
2. [novell-bordermanger-ikenlm-dos(16697)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16697)
3. [VU#432097](http://www.kb.cert.org/vuls/id/432097)
4. [10727](http://www.securityfocus.com/bid/10727)
5. [](http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093576.htm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-28977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-28977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28977
- **State**: PUBLISHED
- **Published Date**: November 30, 2020 at 13:19 UTC
- **Last Updated**: August 04, 2024 at 16:48 UTC
- **Reserved Date**: November 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/get.php?subdomain=SSRF.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CantoDAM/Canto-Wordpress-Plugin)
2. [](https://www.canto.com/integrations/wordpress/)
3. [](https://wordpress.org/plugins/canto/#developers)
4. [](https://gist.github.com/p4nk4jv/87aebd999ce4b28063943480e95fd9e0)
5. [](http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26150
- **State**: PUBLISHED
- **Published Date**: February 23, 2024 at 15:46 UTC
- **Last Updated**: August 01, 2024 at 23:59 UTC
- **Reserved Date**: February 14, 2024 at 17:40 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
`@backstage/backend-common` is a common functionality library for backends for Backstage, an open platform for building developer portals. In `@backstage/backend-common` prior to versions 0.21.1, 0.20.2, and 0.19.10, paths checks with the `resolveSafeChildPath` utility were not exhaustive enough, leading to risk of path traversal vulnerabilities if symlinks can be injected by attackers. This issue is patched in `@backstage/backend-common` versions 0.21.1, 0.20.2, and 0.19.10.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**backstage - backstage**
Affected versions:
- = 0.21.0 (Status: affected)
- < 0.19.10 (Status: affected)
- >= 0.20.0, < 0.20.2 (Status: affected)
### References
1. [https://github.com/backstage/backstage/security/advisories/GHSA-2fc9-xpp8-2g9h](https://github.com/backstage/backstage/security/advisories/GHSA-2fc9-xpp8-2g9h)
2. [https://github.com/backstage/backstage/commit/1ad2b1b61ebb430051f7d804b0cc7ebfe7922b6f](https://github.com/backstage/backstage/commit/1ad2b1b61ebb430051f7d804b0cc7ebfe7922b6f)
3. [https://github.com/backstage/backstage/commit/78f892b3a84d63de2ba167928f171154c447b717](https://github.com/backstage/backstage/commit/78f892b3a84d63de2ba167928f171154c447b717)
4. [https://github.com/backstage/backstage/commit/edf65d7d31e027599c2415f597d085ee84807871](https://github.com/backstage/backstage/commit/edf65d7d31e027599c2415f597d085ee84807871) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19340
- **State**: PUBLISHED
- **Published Date**: December 19, 2019 at 20:16 UTC
- **Last Updated**: August 05, 2024 at 02:16 UTC
- **Reserved Date**: November 27, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with '-e rabbitmq_enable_manager=true' exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.
### Weakness Classification (CWE)
- CWE-1188: Security Weakness
### Affected Products
**Red Hat - Tower**
Affected versions:
- ansible_tower versions 3.6.x before 3.6.2 (Status: affected)
- ansible_tower versions 3.5.x before 3.5.4 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19340) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12923
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OLEStream::WriteVT_LPSTR in olestrm.cpp in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted fpx image.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-olestreamwritevt_lpstr-olestrm-cpp/)
2. [[oss-security] 20170817 libfpx: NULL pointer dereference in OLEStream:riteVT_LPSTR (olestrm.cpp)](http://www.openwall.com/lists/oss-security/2017/08/17/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3067
- **State**: PUBLISHED
- **Published Date**: April 05, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 09, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Policy via vectors related to replacement of IFRAME elements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html)
2. [1026892](http://www.securitytracker.com/id?1026892)
3. [oval:org.mitre.oval:def:15342](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15342)
4. [APPLE-SA-2012-09-19-1](http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html)
5. [](http://support.apple.com/kb/HT5503)
6. [52913](http://www.securityfocus.com/bid/52913)
7. [48749](http://secunia.com/advisories/48749)
8. [](http://code.google.com/p/chromium/issues/detail?id=117583)
9. [48732](http://secunia.com/advisories/48732)
10. [APPLE-SA-2012-07-25-1](http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html)
11. [GLSA-201204-03](http://security.gentoo.org/glsa/glsa-201204-03.xml)
12. [81037](http://osvdb.org/81037)
13. [chrome-if-security-bypass(74627)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74627)
14. [](http://support.apple.com/kb/HT5400) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43361
- **State**: PUBLISHED
- **Published Date**: November 01, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 14:26 UTC
- **Reserved Date**: October 17, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component pop_chart.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/slims/slims9_bulian/issues/162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8794
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:31 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 13.2 and iPadOS 13.2, macOS Catalina 10.15.1, tvOS 13.2, watchOS 6.1. An application may be able to read restricted memory.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210724)
2. [](https://support.apple.com/HT210721)
3. [](https://support.apple.com/HT210722)
4. [](https://support.apple.com/HT210723) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22911
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 18:29 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formiNICbasicREP function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xyqer1/RE11S_1.11-formiNICbasicREP-StackOverflow)
2. [](https://gist.github.com/xyqer1/6145c00a51093baad7ab5b8293a06e80) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46499
- **State**: PUBLISHED
- **Published Date**: March 07, 2024 at 00:00 UTC
- **Last Updated**: August 14, 2024 at 18:55 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_admin_view_single_patient.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ASR511-OO7/CVE-2022-46499/blob/main/CVE-31) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21695
- **State**: REJECTED
- **Last Updated**: January 01, 2025 at 00:01 UTC
- **Reserved Date**: January 01, 2024 at 00:05 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27121
- **State**: PUBLISHED
- **Published Date**: October 04, 2023 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 15:03 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pleasantpasswords.com/download)
2. [](https://www.nuget.org/packages/CronExpressionDescriptor/2.9.0)
3. [](https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36261
- **State**: PUBLISHED
- **Published Date**: August 23, 2022 at 12:46 UTC
- **Last Updated**: August 03, 2024 at 10:00 UTC
- **Reserved Date**: July 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An arbitrary file deletion vulnerability was discovered in taocms 3.0.2, that allows attacker to delete file in server when request url admin.php?action=file&ctrl=del&path=/../../../test.txt
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/chasingboy/cms-pentest/blob/main/taocms-arbitrary-file-deletion-vulnerability.md)
2. [](https://github.com/chasingboy/cms-pentest/blob/main/taocms-arbitrary-file-deletion-vulnerability.md?by=xboy%28topsec%29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1697
- **State**: PUBLISHED
- **Published Date**: June 26, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 13, 2013 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [60784](http://www.securityfocus.com/bid/60784)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=858101)
3. [USN-1890-1](http://www.ubuntu.com/usn/USN-1890-1)
4. [RHSA-2013:0982](http://rhn.redhat.com/errata/RHSA-2013-0982.html)
5. [SUSE-SU-2013:1153](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html)
6. [SUSE-SU-2013:1152](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html)
7. [RHSA-2013:0981](http://rhn.redhat.com/errata/RHSA-2013-0981.html)
8. [oval:org.mitre.oval:def:17243](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17243)
9. [USN-1891-1](http://www.ubuntu.com/usn/USN-1891-1)
10. [openSUSE-SU-2013:1141](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html)
11. [](http://www.mozilla.org/security/announce/2013/mfsa2013-59.html)
12. [DSA-2716](http://www.debian.org/security/2013/dsa-2716)
13. [openSUSE-SU-2013:1142](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html)
14. [openSUSE-SU-2013:1140](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html)
15. [DSA-2720](http://www.debian.org/security/2013/dsa-2720)
16. [openSUSE-SU-2013:1143](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24506
- **State**: PUBLISHED
- **Published Date**: August 23, 2021 at 11:09 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Slider Hero with Animation, Video Background & Intro Maker WordPress plugin before 8.2.7 does not sanitise or escape the id attribute of its hero-button shortcode before using it in a SQL statement, allowing users with a role as low as Contributor to perform SQL injection.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Slider Hero with Animation, Video Background & Intro Maker**
Affected versions:
- 8.2.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/52c8755c-46b9-4383-8c8d-8816f03456b0)
### Credits
- apple502j |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8946
- **State**: PUBLISHED
- **Published Date**: July 22, 2016 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: July 14, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160714 Re: CVE Requests: Information exposure caused by ecryptfs-setup-swap failures](http://www.openwall.com/lists/oss-security/2016/07/14/3)
2. [[oss-security] 20160713 CVE Requests: Information exposure caused by ecryptfs-setup-swap failures](http://www.openwall.com/lists/oss-security/2016/07/13/2)
3. [](https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857)
4. [](https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282)
5. [USN-3032-1](http://www.ubuntu.com/usn/USN-3032-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1402
- **State**: PUBLISHED
- **Published Date**: March 10, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:50 UTC
- **Reserved Date**: March 10, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Rediff Toolbar 2.0 ActiveX control in redifftoolbar.dll allows remote attackers to cause a denial of service via unspecified manipulations, possibly involving improper initialization or blank arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://downloads.securityfocus.com/vulnerabilities/exploits/21924.html)
2. [36899](http://osvdb.org/36899)
3. [21924](http://www.securityfocus.com/bid/21924) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4562
- **State**: PUBLISHED
- **Published Date**: September 06, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: September 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The proxy DNS service in Symantec Gateway Security (SGS) allows remote attackers to make arbitrary DNS queries to third-party DNS servers, while hiding the source IP address of the attacker. NOTE: another researcher has stated that the default configuration does not proxy DNS queries received on the external interface
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060823 Symantec Gateway Security DNS exploit](http://www.securityfocus.com/archive/1/444114/100/100/threaded)
2. [20060823 AW: Symantec Gateway Security DNS exploit](http://www.securityfocus.com/archive/1/444134/100/100/threaded)
3. [20060824 Re: Symantec Gateway Security DNS exploit](http://www.securityfocus.com/archive/1/444330/100/0/threaded)
4. [20060823 RE: Symantec Gateway Security DNS exploit](http://www.securityfocus.com/archive/1/444135/100/100/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54795
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 00:00 UTC
- **Last Updated**: January 21, 2025 at 18:49 UTC
- **Reserved Date**: December 06, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MarioTesoro/CVE-2024-54795) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16126, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16126 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16126
- **State**: PUBLISHED
- **Published Date**: November 11, 2020 at 04:10 UTC
- **Last Updated**: September 16, 2024 at 17:15 UTC
- **Reserved Date**: July 29, 2020 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Freedesktop - accountsservice**
Affected versions:
- 0.6.35-0ubuntu7.3 (Status: affected)
- 0.6.40-2ubuntu11 (Status: affected)
- 0.6.45-1ubuntu1 (Status: affected)
- 0.6.55-0ubuntu (Status: affected)
- 0.6.55-0ubuntu13 (Status: affected)
### References
1. [](https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS)
### Credits
- Kevin Backhouse |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14088, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14088 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14088
- **State**: PUBLISHED
- **Published Date**: February 07, 2020 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Possible use after free issue while CRM is accessing the link pointer from device private data due to lack of resource protection in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, MDM9206, MDM9207C, MDM9607, QCS605, SDM429W, SDX24, SM8150, SXR1130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, MDM9206, MDM9207C, MDM9607, QCS605, SDM429W, SDX24, SM8150, SXR1130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-199/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3032
- **State**: PUBLISHED
- **Published Date**: September 18, 2012 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 03:22 UTC
- **Reserved Date**: May 30, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://en.securitylab.ru/lab/PT-2012-44)
2. [](http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf)
3. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2070, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2070 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2070
- **State**: PUBLISHED
- **Published Date**: March 01, 2024 at 16:00 UTC
- **Last Updated**: August 22, 2024 at 18:21 UTC
- **Reserved Date**: March 01, 2024 at 07:26 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in SourceCodester FAQ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-faq.php. The manipulation of the argument question/answer leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255385 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - FAQ Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-255385 | SourceCodester FAQ Management System add-faq.php cross site scripting](https://vuldb.com/?id.255385)
2. [VDB-255385 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.255385)
3. [](https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20XSS%20on%20add-faq.php.md)
### Credits
- reiginald (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6152, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6152 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6152
- **State**: REJECTED
- **Published Date**: April 10, 2015 at 19:00 UTC
- **Last Updated**: April 10, 2015 at 19:57 UTC
- **Reserved Date**: October 16, 2013 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7788, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7788 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7788
- **State**: PUBLISHED
- **Published Date**: September 17, 2024 at 14:28 UTC
- **Last Updated**: October 12, 2024 at 13:05 UTC
- **Reserved Date**: August 14, 2024 at 11:41 UTC
- **Assigned By**: Document Fdn.
### Vulnerability Description
Improper Digital Signature Invalidation vulnerability in Zip Repair Mode of The Document Foundation LibreOffice allows Signature forgery vulnerability in LibreOfficeThis issue affects LibreOffice: from 24.2 before < 24.2.5.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**The Document Foundation - LibreOffice**
Affected versions:
- 24.2 (Status: affected)
### References
1. [](https://www.libreoffice.org/about-us/security/advisories/CVE-2024-7788)
### Credits
- Thanks to Thanks to Yufan You for finding and reporting this issue
- Thanks to Michael Stahl of allotropia for providing a fix |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53050
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 17:19 UTC
- **Last Updated**: May 04, 2025 at 09:51 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/hdcp: Add encoder check in hdcp2_get_capability
Add encoder check in intel_hdcp2_get_capability to avoid
null pointer error.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11.7 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5b89dcf23575eb5bb95ce8d672cbc2232c2eb096)
2. [](https://git.kernel.org/stable/c/d34f4f058edf1235c103ca9c921dc54820d14d40) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2399
- **State**: PUBLISHED
- **Published Date**: January 16, 2019 at 19:00 UTC
- **Last Updated**: October 02, 2024 at 16:24 UTC
- **Reserved Date**: December 14, 2018 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) component of Oracle Communications Applications (subcomponent: Security). The supported version that is affected is prior to 8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
### Affected Products
**Oracle Corporation - Communications Diameter Signaling Router (DSR)**
Affected versions:
- unspecified (Status: affected)
### References
1. [106580](http://www.securityfocus.com/bid/106580)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11770
- **State**: PUBLISHED
- **Published Date**: June 14, 2019 at 13:53 UTC
- **Last Updated**: August 04, 2024 at 23:03 UTC
- **Reserved Date**: May 06, 2019 at 00:00 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.
### Weakness Classification (CWE)
- CWE-829: Security Weakness
### Affected Products
**The Eclipse Foundation - Eclipse Buildship**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734)
2. [](https://github.com/eclipse/buildship/issues/855) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1231
- **State**: PUBLISHED
- **Published Date**: January 12, 2016 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:48 UTC
- **Reserved Date**: December 27, 2015 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Directory traversal vulnerability in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) in an unspecified path.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2016-e289f41b76](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175868.html)
2. [](https://prosody.im/issues/issue/520)
3. [FEDORA-2016-38e48069f8](http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175829.html)
4. [DSA-3439](http://www.debian.org/security/2016/dsa-3439)
5. [](http://blog.prosody.im/prosody-0-9-9-security-release/)
6. [](https://prosody.im/security/advisory_20160108-1/)
7. [[oss-security] 20160108 CVE-2016-1231, CVE-2016-1232: Prosody XMPP server multiple vulnerabilities](http://www.openwall.com/lists/oss-security/2016/01/08/5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0273, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0273 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0273
- **State**: PUBLISHED
- **Published Date**: September 18, 2020 at 15:03 UTC
- **Last Updated**: August 04, 2024 at 05:55 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In hwservicemanager, there is a possible out of bounds write due to freeing a wild pointer. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155646800
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/android-11) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4351, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4351 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4351
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-38525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-38525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-38525
- **State**: PUBLISHED
- **Published Date**: August 11, 2021 at 00:01 UTC
- **Last Updated**: August 04, 2024 at 01:44 UTC
- **Reserved Date**: August 10, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:H/S:U/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45015
- **State**: PUBLISHED
- **Published Date**: December 14, 2021 at 13:36 UTC
- **Last Updated**: August 04, 2024 at 04:32 UTC
- **Reserved Date**: December 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
taocms 3.0.2 is vulnerable to arbitrary file deletion via taocms\include\Model\file.php from line 60 to line 72.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/taogogo/taocms/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35286, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35286 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35286
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 00:00 UTC
- **Last Updated**: December 10, 2024 at 04:55 UTC
- **Reserved Date**: May 15, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33532, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33532 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33532
- **State**: PUBLISHED
- **Published Date**: June 06, 2023 at 00:00 UTC
- **Last Updated**: January 08, 2025 at 15:30 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a command injection vulnerability in the Netgear R6250 router with Firmware Version 1.0.4.48. If an attacker gains web management privileges, they can inject commands into the post request parameters, thereby gaining shell privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://netgear.com)
2. [](https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33532/Netgear_R6250_RCE.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0597
- **State**: PUBLISHED
- **Published Date**: February 26, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 05, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29251](http://secunia.com/advisories/29251)
2. [29189](http://secunia.com/advisories/29189)
3. [SUSE-SA:2008:012](http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html)
4. [RHSA-2008:0153](http://www.redhat.com/support/errata/RHSA-2008-0153.html)
5. [](http://wiki.rpath.com/Advisories:rPSA-2008-0091)
6. [](http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0091)
7. [oval:org.mitre.oval:def:9492](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9492)
8. [MDVSA-2008:050](http://www.mandriva.com/security/advisories?name=MDVSA-2008:050)
9. [27988](http://www.securityfocus.com/bid/27988)
10. [20080229 rPSA-2008-0091-1 cups](http://www.securityfocus.com/archive/1/488966/100/0/threaded)
11. [](http://support.avaya.com/elmodocs2/security/ASA-2008-084.htm)
12. [29087](http://secunia.com/advisories/29087)
13. [cups-ippbrowse-useafterfree-dos(40845)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40845)
14. [](http://support.avaya.com/elmodocs2/security/ASA-2008-098.htm)
15. [RHSA-2008:0161](http://www.redhat.com/support/errata/RHSA-2008-0161.html)
16. [](https://issues.rpath.com/browse/RPL-2283)
17. [1019497](http://www.securitytracker.com/id?1019497) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0985
- **State**: PUBLISHED
- **Published Date**: June 05, 2013 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 03:34 UTC
- **Reserved Date**: January 10, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Disk Management in Apple Mac OS X before 10.8.4 does not properly authenticate attempts to disable FileVault, which allows local users to cause a denial of service (loss of encryption functionality) via an unspecified command line.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5784)
2. [APPLE-SA-2013-06-04-1](http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14023, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14023
- **State**: PUBLISHED
- **Published Date**: August 20, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 09:21 UTC
- **Reserved Date**: July 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open Whisper Signal (aka Signal-Desktop) before 1.15.0-beta.10 allows information leakage.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://n0sign4l.blogspot.com/2018/08/advisory-id-n0sign4l-002-risk-level-4-5.html?m=1)
2. [](https://www.youtube.com/watch?v=oSJscEei5SE&app=desktop) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3494, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3494 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3494
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:14 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Retail Teller). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2 and 12.0.3. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - FLEXCUBE Universal Banking**
Affected versions:
- 11.3.0 (Status: affected)
- 11.4.0 (Status: affected)
- 12.0.1 (Status: affected)
- 12.0.2 (Status: affected)
- 12.0.3 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
2. [1038304](http://www.securitytracker.com/id/1038304)
3. [97843](http://www.securityfocus.com/bid/97843) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2332
- **State**: PUBLISHED
- **Published Date**: July 05, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: July 05, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMS Chainuk 1.2 and earlier allows remote attackers to obtain sensitive information via (1) a crafted id parameter to index.php or (2) a nonexistent folder name in the id parameter to admin/admin_delete.php, which reveals the installation path in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [55671](http://osvdb.org/55671)
2. [9069](http://www.exploit-db.com/exploits/9069)
3. [55670](http://osvdb.org/55670) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7252
- **State**: PUBLISHED
- **Published Date**: January 19, 2010 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 11:56 UTC
- **Reserved Date**: January 12, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libraries/File.class.php in phpMyAdmin 2.11.x before 2.11.10 uses predictable filenames for temporary files, which has unknown impact and attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [38211](http://secunia.com/advisories/38211)
2. [](http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=11528)
3. [39503](http://secunia.com/advisories/39503)
4. [SUSE-SR:2010:001](http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html)
5. [ADV-2010-0910](http://www.vupen.com/english/advisories/2010/0910)
6. [](http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11528&r2=11527&pathrev=11528)
7. [DSA-2034](http://www.debian.org/security/2010/dsa-2034)
8. [](http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php)
9. [37826](http://www.securityfocus.com/bid/37826) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-55887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-55887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-55887
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 16:08 UTC
- **Last Updated**: December 13, 2024 at 17:06 UTC
- **Reserved Date**: December 12, 2024 at 15:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Ucum-java is a FHIR Java library providing UCUM Services. In versions prior to 1.0.9, XML parsing performed by the UcumEssenceService is vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This impacts use cases where ucum is being used to within a host where external clients can submit XML. Release 1.0.9 of Ucum-java fixes this vulnerability. As a workaround, ensure that the source xml for instantiating UcumEssenceService is trusted.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**FHIR - Ucum-java**
Affected versions:
- < 1.0.9 (Status: affected)
### References
1. [https://github.com/FHIR/Ucum-java/security/advisories/GHSA-w9j7-phm3-f97j](https://github.com/FHIR/Ucum-java/security/advisories/GHSA-w9j7-phm3-f97j) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32543
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 08:26 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 09:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Minoji MJ Update History allows Reflected XSS.This issue affects MJ Update History: from n/a through 1.0.4.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Minoji - MJ Update History**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/mj-update-history/wordpress-mj-update-history-plugin-1-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Dimas Maulana (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47028
- **State**: PUBLISHED
- **Published Date**: February 28, 2024 at 08:13 UTC
- **Last Updated**: May 04, 2025 at 07:02 UTC
- **Reserved Date**: February 27, 2024 at 18:42 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mt76: mt7915: fix txrate reporting
Properly check rate_info to fix unexpected reporting.
[ 1215.161863] Call trace:
[ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211]
[ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211]
[ 1215.175624] ieee80211_tx_status_ext+0x508/0x838 [mac80211]
[ 1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e]
[ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e]
[ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e]
[ 1215.196582] mt76_dma_cleanup+0x7b0/0x11d0 [mt76]
[ 1215.201276] __napi_poll+0x38/0xf8
[ 1215.204668] napi_workfn+0x40/0x80
[ 1215.208062] process_one_work+0x1fc/0x390
[ 1215.212062] worker_thread+0x48/0x4d0
[ 1215.215715] kthread+0x120/0x128
[ 1215.218935] ret_from_fork+0x10/0x1c
### Affected Products
**Linux - Linux**
Affected versions:
- e57b7901469fc0b021930b83a8094baaf3d81b09 (Status: affected)
- e57b7901469fc0b021930b83a8094baaf3d81b09 (Status: affected)
- e57b7901469fc0b021930b83a8094baaf3d81b09 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.8 (Status: affected)
- 0 (Status: unaffected)
- 5.11.21 (Status: unaffected)
- 5.12.4 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da)
2. [](https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e)
3. [](https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6811
- **State**: PUBLISHED
- **Published Date**: March 06, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 06:10 UTC
- **Reserved Date**: February 07, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Citrix NetScaler ADC 10.5, 11.0, 11.1, and 12.0, and NetScaler Gateway 10.5, 11.0, 11.1, and 12.0 allow remote attackers to inject arbitrary web script or HTML via the Citrix NetScaler interface.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.citrix.com/article/CTX232161)
2. [1040440](http://www.securitytracker.com/id/1040440) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-3971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-3971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-3971
- **State**: PUBLISHED
- **Published Date**: July 17, 2019 at 20:35 UTC
- **Last Updated**: August 04, 2024 at 19:26 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: tenable
### Vulnerability Description
Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to a local Denial of Service affecting CmdVirth.exe via its LPC port "cmdvrtLPCServerPort". A low privileged local process can connect to this port and send an LPC_DATAGRAM, which triggers an Access Violation due to hardcoded NULLs used for Source parameter in a memcpy operation that is called for this handler. This results in CmdVirth.exe and its child svchost.exe instances to terminate.
### Affected Products
**n/a - Comodo Antivirus**
Affected versions:
- Versions 12.0.0.6810 and below (Status: affected)
### References
1. [](https://www.tenable.com/security/research/tra-2019-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5071
- **State**: REJECTED
- **Published Date**: January 05, 2021 at 18:54 UTC
- **Last Updated**: January 05, 2021 at 18:54 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1153
- **State**: PUBLISHED
- **Published Date**: March 27, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 13:25 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM TRIRIGA Report Manager 3.2 through 3.5 contains a vulnerability that could allow an authenticated user to execute actions that they do not have access to. IBM Reference #: 1999563.
### Affected Products
**IBM Corporation - TRIRIGA Application Platform**
Affected versions:
- 3.2 (Status: affected)
- 3.2.1 (Status: affected)
- 3.1 (Status: affected)
- 3.0 (Status: affected)
- 3.3 (Status: affected)
- 3.3.1 (Status: affected)
- 3.3.2 (Status: affected)
- 3.4 (Status: affected)
- 3.4.1 (Status: affected)
- 3.4.2 (Status: affected)
- 3.5 (Status: affected)
- 3.5.1 (Status: affected)
- 3.5.2 (Status: affected)
### References
1. [97066](http://www.securityfocus.com/bid/97066)
2. [](http://www.ibm.com/support/docview.wss?uid=swg21999563) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0111
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:04 UTC
- **Last Updated**: May 05, 2025 at 17:01 UTC
- **Reserved Date**: October 22, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html)
2. [](https://security.netapp.com/advisory/ntap-20220210-0007/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24057, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24057 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24057
- **State**: PUBLISHED
- **Published Date**: August 21, 2020 at 14:31 UTC
- **Last Updated**: August 04, 2024 at 15:05 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The management website of the Verint S5120FD Verint_FW_0_42 unit features a CGI endpoint ('ipfilter.cgi') that allows the user to manage network filtering on the unit. This endpoint is vulnerable to a command injection. An authenticated attacker can leverage this issue to execute arbitrary commands as 'root'.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ioactive.com/verint-ptz-cameras-multiple-vulnerabilities/)
2. [](https://ioac.tv/2Nbc40h) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5795, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5795 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5795
- **State**: PUBLISHED
- **Published Date**: December 31, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 11:04 UTC
- **Reserved Date**: December 30, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the eluna Page Comments (eluna_pagecomments) extension 1.1.2 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [elunapagecomments-unspecified-xss(46467)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46467)
2. [32228](http://www.securityfocus.com/bid/32228)
3. [32638](http://secunia.com/advisories/32638)
4. [](http://typo3.org/teams/security/security-bulletins/typo3-20081110-2/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-0789, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-0789 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0789
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 15:48 UTC
- **Last Updated**: August 04, 2024 at 06:11 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A denial of service vulnerability exists when the Visual Studio Extension Installer Service improperly handles hard links, aka 'Visual Studio Extension Installer Service Denial of Service Vulnerability'.
### Affected Products
**Microsoft - Microsoft Visual Studio 2019**
Affected versions:
- 16.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36730, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36730 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36730
- **State**: PUBLISHED
- **Published Date**: October 10, 2023 at 17:07 UTC
- **Last Updated**: April 14, 2025 at 22:45 UTC
- **Reserved Date**: June 26, 2023 at 13:29 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Microsoft SQL Server 2019 (GDR)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (GDR)**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Windows**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on Linux**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 17 for SQL Server on MacOS**
Affected versions:
- 17.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Windows**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on Linux**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft ODBC Driver 18 for SQL Server on MacOS**
Affected versions:
- 18.0.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2022 (CU 8)**
Affected versions:
- 15.0.0 (Status: affected)
**Microsoft - Microsoft SQL Server 2019 (CU 22)**
Affected versions:
- 15.0.0 (Status: affected)
### References
1. [Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36730) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30084, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30084
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 16:59 UTC
- **Last Updated**: June 05, 2025 at 01:08 UTC
- **Reserved Date**: March 22, 2024 at 23:12 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.6003.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Kernel-Mode Driver Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30084) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20985
- **State**: PUBLISHED
- **Published Date**: August 22, 2019 at 13:34 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: August 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wp-payeezy-pay plugin before 2.98 for WordPress has local file inclusion in pay.php, donate.php, donate-rec, and pay-rec.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wp-payeezy-pay/#developers) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.