System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30310, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30310 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30310 - **State**: PUBLISHED - **Published Date**: May 13, 2025 at 16:53 UTC - **Last Updated**: May 13, 2025 at 17:22 UTC - **Reserved Date**: March 20, 2025 at 17:36 UTC - **Assigned By**: adobe ### Vulnerability Description Dreamweaver Desktop versions 21.4 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-843: Security Weakness ### Affected Products **Adobe - Dreamweaver Desktop** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/dreamweaver/apsb25-35.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1052, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1052 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1052 - **State**: PUBLISHED - **Published Date**: March 21, 2013 at 17:00 UTC - **Last Updated**: August 06, 2024 at 14:49 UTC - **Reserved Date**: January 11, 2013 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description pam-xdg-support, as used in Ubuntu 12.10, does not properly handle the PATH environment variable, which allows local users to gain privileges via unspecified vectors related to sudo. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [58550](http://www.securityfocus.com/bid/58550) 2. [USN-1766-1](http://www.ubuntu.com/usn/USN-1766-1) 3. [ubuntu-cve20131052-priv-esc(82918)](https://exchange.xforce.ibmcloud.com/vulnerabilities/82918)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0561, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0561 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0561 - **State**: PUBLISHED - **Published Date**: January 08, 2019 at 21:00 UTC - **Last Updated**: August 04, 2024 at 17:51 UTC - **Reserved Date**: November 26, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An information disclosure vulnerability exists when Microsoft Word macro buttons are used improperly, aka "Microsoft Word Information Disclosure Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office, Word. ### Affected Products **Microsoft - Microsoft Word** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2013 RT Service Pack 1 (Status: affected) - 2013 Service Pack 1 (32-bit editions) (Status: affected) - 2013 Service Pack 1 (64-bit editions) (Status: affected) - 2016 (32-bit edition) (Status: affected) - 2016 (64-bit edition) (Status: affected) **Microsoft - Word** Affected versions: - Automation Services on Microsoft SharePoint Server 2010 Service Pack 2 (Status: affected) **Microsoft - Microsoft Office** Affected versions: - 2010 Service Pack 2 (32-bit editions) (Status: affected) - 2010 Service Pack 2 (64-bit editions) (Status: affected) - 2016 for Mac (Status: affected) - 2019 for 32-bit editions (Status: affected) - 2019 for 64-bit editions (Status: affected) - 2019 for Mac (Status: affected) - Web Apps Server 2010 Service Pack 2 (Status: affected) **Microsoft - Office** Affected versions: - 365 ProPlus for 32-bit Systems (Status: affected) - 365 ProPlus for 64-bit Systems (Status: affected) ### References 1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0561) 2. [106399](http://www.securityfocus.com/bid/106399)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5170, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5170 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5170 - **State**: PUBLISHED - **Published Date**: September 17, 2024 at 06:00 UTC - **Last Updated**: September 17, 2024 at 14:52 UTC - **Reserved Date**: May 21, 2024 at 12:32 UTC - **Assigned By**: WPScan ### Vulnerability Description The Logo Manager For Enamad WordPress plugin through 0.7.1 does not sanitise and escape in its widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Logo Manager For Enamad** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/37b5ed06-0633-49e0-b47d-8aa2f4510179/) ### Credits - Bob Matyas - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4132, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4132 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4132 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: July 31, 2012 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5401, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5401 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5401 - **State**: PUBLISHED - **Published Date**: October 08, 2018 at 15:00 UTC - **Last Updated**: September 17, 2024 at 03:37 UTC - **Reserved Date**: January 12, 2018 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7. ### Weakness Classification (CWE) - CWE-319: Security Weakness ### Affected Products **Auto-Maskin - DCU-210E** Affected versions: - 3.7 (Status: affected) **Auto-Maskin - RP-210E** Affected versions: - 3.7 (Status: affected) **Auto-Maskin - Marine Pro Observer Android App** Affected versions: - 0.1 (Status: unknown) ### References 1. [VU#176301](https://www.kb.cert.org/vuls/id/176301) 2. [](https://www.us-cert.gov/ics/advisories/icsa-20-051-04) ### Credits - Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-13188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-13188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-13188 - **State**: PUBLISHED - **Published Date**: September 05, 2019 at 17:32 UTC - **Last Updated**: August 04, 2024 at 23:41 UTC - **Reserved Date**: July 03, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description In Knowage through 6.1.1, an unauthenticated user can bypass access controls and access the entire application. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.contentsecurity.com.au/knowage-access-control-bypass)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28411, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28411 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28411 - **State**: PUBLISHED - **Published Date**: May 10, 2023 at 13:17 UTC - **Last Updated**: January 27, 2025 at 18:02 UTC - **Reserved Date**: March 22, 2023 at 03:00 UTC - **Assigned By**: intel ### Vulnerability Description Double free in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N` ### Weakness Classification (CWE) - CWE-415: Security Weakness ### Affected Products **n/a - Intel(R) Server Board BMC firmware** Affected versions: - before version 2.90 (Status: affected) ### References 1. [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-0973, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-0973 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-0973 - **State**: PUBLISHED - **Published Date**: August 23, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:12 UTC - **Reserved Date**: August 21, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and earlier may allow attackers to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_GETPALETTE ioctl. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5493](http://www.securityfocus.com/bid/5493) 2. [FreeBSD-SA-02:38](http://marc.info/?l=bugtraq&m=102976839728706&w=2) 3. [freebsd-negative-system-call-bo(9903)](http://www.iss.net/security_center/static/9903.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11026, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11026 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11026 - **State**: PUBLISHED - **Published Date**: April 30, 2020 at 22:15 UTC - **Last Updated**: August 04, 2024 at 11:21 UTC - **Reserved Date**: March 30, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). ### CVSS Metrics - **CVSS Base Score**: 8.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-707: Security Weakness ### Affected Products **WordPress - WordPress** Affected versions: - >= 5.4.0, < 5.4.1 (Status: affected) - >= 5.3.0, < 5.3.3 (Status: affected) - >= 5.2.0, < 5.2.6 (Status: affected) - >= 5.1.0, < 5.1.5 (Status: affected) - >= 5.0.0, < 5.0.9 (Status: affected) - >= 4.9.0, < 4.9.14 (Status: affected) - >= 4.8.0, < 4.8.13 (Status: affected) - >= 4.7.0, < 4.7.17 (Status: affected) - >= 4.6.0, < 4.6.18 (Status: affected) - >= 4.5.0, < 4.5.21 (Status: affected) - >= 4.4.0, < 4.4.22 (Status: affected) - >= 4.3.0, < 4.3.23 (Status: affected) - >= 4.2.0, < 4.2.27 (Status: affected) - >= 4.1.0, < 4.1.30 (Status: affected) - >= 4.0.0, < 4.0.30 (Status: affected) - >= 3.9.0, < 3.9.31 (Status: affected) - >= 3.8.0, < 3.8.33 (Status: affected) - >= 3.7.0, < 3.7.33 (Status: affected) ### References 1. [](https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates) 2. [](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-3gw2-4656-pfr2) 3. [DSA-4677](https://www.debian.org/security/2020/dsa-4677) 4. [[debian-lts-announce] 20200511 [SECURITY] [DLA 2208-1] wordpress security update](https://lists.debian.org/debian-lts-announce/2020/05/msg00011.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-53695, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-53695 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-53695 - **State**: PUBLISHED - **Published Date**: March 07, 2025 at 16:13 UTC - **Last Updated**: March 07, 2025 at 17:54 UTC - **Reserved Date**: November 22, 2024 at 06:21 UTC - **Assigned By**: qnap ### Vulnerability Description A buffer overflow vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to modify memory or crash processes. We have already fixed the vulnerability in the following version: HBS 3 Hybrid Backup Sync 25.1.4.952 and later ### Weakness Classification (CWE) - CWE-120: Security Weakness - CWE-121: Stack-based Buffer Overflow ### Affected Products **QNAP Systems Inc. - HBS 3 Hybrid Backup Sync** Affected versions: - 25.1.x (Status: affected) ### References 1. [](https://www.qnap.com/en/security-advisory/qsa-25-06) ### Credits - CataLpa of Hatlab, Dbappsecurity Co. Ltd.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3462, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3462 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3462 - **State**: PUBLISHED - **Published Date**: August 03, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 18:30 UTC - **Reserved Date**: July 10, 2006 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20060801-01-P](ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P) 2. [APPLE-SA-2006-08-01](http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html) 3. [ADV-2007-3486](http://www.vupen.com/english/advisories/2007/3486) 4. [21501](http://secunia.com/advisories/21501) 5. [MDKSA-2006:136](http://www.mandriva.com/security/advisories?name=MDKSA-2006:136) 6. [21537](http://secunia.com/advisories/21537) 7. [21632](http://secunia.com/advisories/21632) 8. [GLSA-200608-07](http://www.gentoo.org/security/en/glsa/glsa-200608-07.xml) 9. [21338](http://secunia.com/advisories/21338) 10. [USN-330-1](http://www.ubuntu.com/usn/usn-330-1) 11. [](http://support.avaya.com/elmodocs2/security/ASA-2006-166.htm) 12. [27726](http://www.osvdb.org/27726) 13. [ADV-2006-3101](http://www.vupen.com/english/advisories/2006/3101) 14. [1016628](http://securitytracker.com/id?1016628) 15. [21253](http://secunia.com/advisories/21253) 16. [DSA-1137](http://www.debian.org/security/2006/dsa-1137) 17. [21370](http://secunia.com/advisories/21370) 18. [1016671](http://securitytracker.com/id?1016671) 19. [21598](http://secunia.com/advisories/21598) 20. [RHSA-2006:0648](http://www.redhat.com/support/errata/RHSA-2006-0648.html) 21. [MDKSA-2006:137](http://www.mandriva.com/security/advisories?name=MDKSA-2006:137) 22. [19289](http://www.securityfocus.com/bid/19289) 23. [27222](http://secunia.com/advisories/27222) 24. [ADV-2007-4034](http://www.vupen.com/english/advisories/2007/4034) 25. [TA06-214A](http://www.us-cert.gov/cas/techalerts/TA06-214A.html) 26. [SUSE-SA:2006:044](http://www.novell.com/linux/security/advisories/2006_44_libtiff.html) 27. [21290](http://secunia.com/advisories/21290) 28. [21274](http://secunia.com/advisories/21274) 29. [ADV-2006-3105](http://www.vupen.com/english/advisories/2006/3105) 30. [27181](http://secunia.com/advisories/27181) 31. [oval:org.mitre.oval:def:11301](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11301) 32. [RHSA-2006:0603](http://www.redhat.com/support/errata/RHSA-2006-0603.html) 33. [20060901-01-P](ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc) 34. [21304](http://secunia.com/advisories/21304) 35. [SSA:2006-230-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.536600) 36. [](http://docs.info.apple.com/article.html?artnum=304063) 37. [19282](http://www.securityfocus.com/bid/19282) 38. [](https://issues.rpath.com/browse/RPL-558) 39. [27832](http://secunia.com/advisories/27832) 40. [21346](http://secunia.com/advisories/21346) 41. [201331](http://sunsolve.sun.com/search/document.do?assetkey=1-66-201331-1) 42. [21319](http://secunia.com/advisories/21319) 43. [21392](http://secunia.com/advisories/21392) 44. [21334](http://secunia.com/advisories/21334) 45. [22036](http://secunia.com/advisories/22036) 46. [2006-0044](http://lwn.net/Alerts/194228/) 47. [103160](http://sunsolve.sun.com/search/document.do?assetkey=1-26-103160-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6502, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6502 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6502 - **State**: PUBLISHED - **Published Date**: December 20, 2007 at 20:00 UTC - **Last Updated**: August 07, 2024 at 16:11 UTC - **Reserved Date**: December 20, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote authenticated users to obtain sensitive information via (1) the AdminName and AdminLevel parameters to fp2000/NEWSRVR.asp, which discloses usernames; and (2) certain XML HTTP requests to hosting/css.asp using Microsoft.XMLHTTP or MSXML2.XMLHTTP objects, which trigger a response with the setup directory pathname in the HTML source; and (3) might allow remote attackers to obtain sensitive information via a request for /admin/forum/, which reveals the path in an error message when a forum is not found. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28973](http://secunia.com/advisories/28973) 2. [20071213 Hosting Controller - Multiple Security Bugs (Extremely Critical)](http://www.securityfocus.com/archive/1/485028/100/0/threaded) 3. [](http://hostingcontroller.com/english/logs/Post-Hotfix-3_3-sec-Patch-ReleaseNotes.html) 4. [3474](http://securityreason.com/securityalert/3474) 5. [hostingcontroller-newsrvr-info-disclosure(39039)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39039) 6. [4730](https://www.exploit-db.com/exploits/4730) 7. [26862](http://www.securityfocus.com/bid/26862) 8. [1019222](http://securitytracker.com/id?1019222) 9. [hostingcontroller-path-info-disclosure(39043)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39043)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23406, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23406 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23406 - **State**: PUBLISHED - **Published Date**: August 24, 2021 at 07:45 UTC - **Last Updated**: September 17, 2024 at 02:26 UTC - **Reserved Date**: January 08, 2021 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P` ### Affected Products **n/a - pac-resolver** Affected versions: - unspecified (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857) 2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506) 3. [](https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5) 4. [](https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e) 5. [](https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0) ### Credits - Tim Perry
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-6797, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-6797 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-6797 - **State**: PUBLISHED - **Published Date**: November 15, 2013 at 20:00 UTC - **Last Updated**: September 16, 2024 at 18:49 UTC - **Reserved Date**: November 15, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability in bluewrench-video-widget.php in the Blue Wrench Video Widget plugin before 2.0.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that embed arbitrary URLs via the bw_url parameter in the bw-videos page to wp-admin/admin.php, as demonstrated by embedding a URL to a JavaScript file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://wordpress.org/plugins/blue-wrench-videos-widget/changelog) 2. [98923](http://osvdb.org/98923) 3. [98922](http://osvdb.org/98922) 4. [](http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31361, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31361 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31361 - **State**: PUBLISHED - **Published Date**: June 22, 2022 at 17:16 UTC - **Last Updated**: August 03, 2024 at 07:19 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Docebo Community Edition v4.0.5 and below was discovered to contain a SQL injection vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.swascan.com/security-advisory-docebo-community-edition/) 2. [](https://blog.formalms.org/about/blog/20-life-after-docebo-the-forma-project-begins.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-40128, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-40128 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-40128 - **State**: PUBLISHED - **Published Date**: November 04, 2021 at 15:30 UTC - **Last Updated**: November 07, 2024 at 21:45 UTC - **Reserved Date**: August 25, 2021 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-183: Security Weakness ### Affected Products **Cisco - Cisco Webex Meetings** Affected versions: - n/a (Status: affected) ### References 1. [20211103 Cisco Webex Meetings Email Content Injection Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-52987, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-52987 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-52987 - **State**: PUBLISHED - **Published Date**: December 10, 2024 at 20:27 UTC - **Last Updated**: December 17, 2024 at 04:55 UTC - **Reserved Date**: November 18, 2024 at 17:46 UTC - **Assigned By**: adobe ### Vulnerability Description Animate versions 23.0.8, 24.0.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-191: Security Weakness ### Affected Products **Adobe - Animate** Affected versions: - 0 (Status: affected) ### References 1. [](https://helpx.adobe.com/security/products/animate/apsb24-96.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1661, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1661 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1661 - **State**: PUBLISHED - **Published Date**: May 05, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: May 05, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The leafnode server in leafnode 1.9.20 to 1.9.29 allows remote attackers to cause a denial of service (infinite loop) when leafnode requests a cross-posted article to one group whose name is a prefix of another group. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1005865](http://www.securitytracker.com/id?1005865) 2. [7801](http://secunia.com/advisories/7801) 3. [7870](http://secunia.com/advisories/7870) 4. [](http://leafnode.sourceforge.net/leafnode-SA-2002-01.txt) 5. [20021229 Leafnode security announcement SA:2002:01](http://marc.info/?l=bugtraq&m=104127108823436&w=2) 6. [20030102 GLSA: leafnode](http://marc.info/?l=bugtraq&m=104152295210075&w=2) 7. [leafnode-nntp-dos(10942)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10942) 8. [7799](http://secunia.com/advisories/7799) 9. [6490](http://www.securityfocus.com/bid/6490) 10. [MDKSA-2003:005](http://www.mandriva.com/security/advisories?name=MDKSA-2003:005)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0352, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0352 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0352 - **State**: PUBLISHED - **Published Date**: January 17, 2008 at 23:00 UTC - **Last Updated**: August 07, 2024 at 07:39 UTC - **Reserved Date**: January 17, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://bugzilla.kernel.org/show_bug.cgi?id=8450) 2. [4893](https://www.exploit-db.com/exploits/4893) 3. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2) 4. [linux-kernel-ipv6-jumbogram-dos(39643)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39643)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21490, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21490 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21490 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: October 04, 2024 at 16:16 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in GNU Binutils 2.34. It is a memory leak when process microblaze-dis.c. This one will consume memory on each insn disassembled. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=25249) 2. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907) 3. [](https://security.netapp.com/advisory/ntap-20230929-0007/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24368, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24368 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24368 - **State**: PUBLISHED - **Published Date**: August 19, 2020 at 14:25 UTC - **Last Updated**: August 04, 2024 at 15:12 UTC - **Reserved Date**: August 17, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Icinga/icingaweb2/blob/master/CHANGELOG.md) 2. [](https://github.com/Icinga/icingaweb2/issues/4226) 3. [](https://icinga.com/2020/08/19/icinga-web-security-release-v2-6-4-v2-7-4-and-v2-8-2/) 4. [DSA-4747](https://www.debian.org/security/2020/dsa-4747) 5. [[debian-lts-announce] 20200824 [SECURITY] [DLA 2343-1] icingaweb2 security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00040.html) 6. [openSUSE-SU-2020:1674](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html) 7. [GLSA-202208-05](https://security.gentoo.org/glsa/202208-05)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4594, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4594 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4594 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13123, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13123 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13123 - **State**: PUBLISHED - **Published Date**: July 03, 2018 at 22:00 UTC - **Last Updated**: August 05, 2024 at 08:52 UTC - **Reserved Date**: July 03, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description onefilecms.php in OneFileCMS through 2017-10-08 might allow attackers to read arbitrary files via the i and f parameters, as demonstrated by ?i=etc/&f=passwd&p=raw_view for the /etc/passwd file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/Self-Evident/OneFileCMS/issues/50)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-26355, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-26355 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-26355 - **State**: REJECTED - **Last Updated**: December 02, 2022 at 00:00 UTC - **Reserved Date**: October 01, 2020 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-49102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-49102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-49102 - **State**: PUBLISHED - **Published Date**: November 22, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 21:46 UTC - **Reserved Date**: November 21, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description NZBGet 21.1 allows authenticated remote code execution because the unarchive programs (7za and unrar) preserve executable file permissions. An attacker with the Control capability can execute a file by setting the value of SevenZipCommand or UnrarCmd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://nzbget.net/download) 2. [](https://sec.maride.cc/posts/nzbget/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-9609, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-9609 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-9609 - **State**: PUBLISHED - **Published Date**: February 19, 2020 at 19:47 UTC - **Last Updated**: August 06, 2024 at 13:47 UTC - **Reserved Date**: January 16, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Directory traversal vulnerability in webadmin/reporter/view_server_log.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to list directory contents via a .. (dot dot) in the log parameter in a stats action. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34432, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34432 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34432 - **State**: PUBLISHED - **Published Date**: July 10, 2023 at 20:05 UTC - **Last Updated**: October 01, 2024 at 16:24 UTC - **Reserved Date**: June 06, 2023 at 07:28 UTC - **Assigned By**: redhat ### Vulnerability Description A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure. ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-122: Heap-based Buffer Overflow ### Affected Products **n/a - sox** **Red Hat - Red Hat Enterprise Linux 6** **Red Hat - Red Hat Enterprise Linux 7** **Fedora - Fedora** **Fedora - Extra Packages for Enterprise Linux** ### References 1. [](https://access.redhat.com/security/cve/CVE-2023-34432) 2. [RHBZ#2212291](https://bugzilla.redhat.com/show_bug.cgi?id=2212291)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1000093, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1000093 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1000093 - **State**: PUBLISHED - **Published Date**: October 04, 2017 at 01:00 UTC - **Last Updated**: August 05, 2024 at 21:53 UTC - **Reserved Date**: July 13, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2017-07-10/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9091, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9091 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9091 - **State**: REJECTED - **Published Date**: November 23, 2021 at 19:58 UTC - **Last Updated**: November 23, 2021 at 19:58 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-42115, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-42115 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-42115 - **State**: PUBLISHED - **Published Date**: November 30, 2021 at 11:28 UTC - **Last Updated**: August 04, 2024 at 03:22 UTC - **Reserved Date**: October 08, 2021 at 00:00 UTC - **Assigned By**: NCSC.ch ### Vulnerability Description Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an unauthenticated remote attacker to escalate privileges from unauthenticated to authenticated user via stealing and injecting the session- independent and static cookie UID. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-1004: Security Weakness ### Affected Products **Business-DNA Solutions GmbH - TopEase** Affected versions: - unspecified (Status: affected) ### References 1. [](https://confluence.topease.ch/confluence/display/DOC/Release+Notes) ### Credits - SIX Group Services AG, Cyber Controls
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3251, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3251 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3251 - **State**: PUBLISHED - **Published Date**: January 27, 2017 at 22:01 UTC - **Last Updated**: October 09, 2024 at 19:44 UTC - **Reserved Date**: December 06, 2016 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.9 (Availability impacts). ### Affected Products **Oracle - MySQL Server** Affected versions: - 5.7.16 and earlier (Status: affected) ### References 1. [GLSA-201702-17](https://security.gentoo.org/glsa/201702-17) 2. [1037640](http://www.securitytracker.com/id/1037640) 3. [95482](http://www.securityfocus.com/bid/95482) 4. [RHSA-2017:2886](https://access.redhat.com/errata/RHSA-2017:2886) 5. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7373, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7373 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7373 - **State**: PUBLISHED - **Published Date**: October 30, 2020 at 16:50 UTC - **Last Updated**: August 04, 2024 at 09:25 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: rapid7 ### Vulnerability Description vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/) 2. [](https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4445227-vbulletin-5-6-0-5-6-1-5-6-2-security-patch) 3. [](https://seclists.org/fulldisclosure/2020/Aug/5) 4. [](https://github.com/rapid7/metasploit-framework/pull/13970)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6331, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6331 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6331 - **State**: PUBLISHED - **Published Date**: April 20, 2017 at 17:00 UTC - **Last Updated**: August 06, 2024 at 01:29 UTC - **Reserved Date**: July 26, 2016 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15](https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html) 2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1369613) 3. [](https://phabricator.wikimedia.org/T115333)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-1010171, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-1010171 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-1010171 - **State**: PUBLISHED - **Published Date**: July 23, 2019 at 13:43 UTC - **Last Updated**: August 05, 2024 at 03:07 UTC - **Reserved Date**: March 20, 2019 at 00:00 UTC - **Assigned By**: dwf ### Vulnerability Description Jsish 2.4.83 2.0483 is affected by: Nullpointer dereference. The impact is: denial of service. The component is: function jsi_DumpFunctions (jsiEval.c:567). The attack vector is: executing crafted javascript code. The fixed version is: 2.4.84. ### Affected Products **Jsish - Jsi** Affected versions: - 2.4.83 (Status: affected) - 2.0483 [fixed: 2.4.84] (Status: affected) ### References 1. [](https://jsish.org/fossil/jsi/tktview/a3026a7c06e0f41af461aa0bc2f7a7e886209390)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-2213, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-2213 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-2213 - **State**: PUBLISHED - **Published Date**: April 22, 2021 at 21:53 UTC - **Last Updated**: September 26, 2024 at 15:14 UTC - **Reserved Date**: December 09, 2020 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - 8.0.22 and prior (Status: affected) ### References 1. [](https://www.oracle.com/security-alerts/cpuapr2021.html) 2. [](https://security.netapp.com/advisory/ntap-20210513-0002/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-4359, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-4359 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-4359 - **State**: PUBLISHED - **Published Date**: June 15, 2015 at 14:00 UTC - **Last Updated**: August 06, 2024 at 06:11 UTC - **Reserved Date**: June 05, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in the Registration codes module before 6.x-1.6, 6.x-2.x before 6.x-2.8, and 7.x-1.x before 7.x-1.2 for Drupal allow remote authenticated users with permission to create or edit taxonomy terms or nodes to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.drupal.org/node/2465177) 2. [[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)](http://www.openwall.com/lists/oss-security/2015/04/25/6) 3. [](https://www.drupal.org/node/2465179) 4. [](https://www.drupal.org/node/2465181) 5. [72961](http://www.securityfocus.com/bid/72961) 6. [](https://www.drupal.org/node/2445955)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14731, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14731 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14731 - **State**: PUBLISHED - **Published Date**: September 25, 2017 at 21:00 UTC - **Last Updated**: August 05, 2024 at 19:34 UTC - **Reserved Date**: September 25, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html) 2. [](https://github.com/libofx/libofx/issues/10) 3. [GLSA-201908-26](https://security.gentoo.org/glsa/201908-26)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25772, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25772 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25772 - **State**: PUBLISHED - **Published Date**: June 20, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 04:49 UTC - **Reserved Date**: February 22, 2022 at 00:00 UTC - **Assigned By**: Mautic ### Vulnerability Description A cross-site scripting (XSS) vulnerability in the web tracking component of Mautic before 4.3.0 allows remote attackers to inject executable javascript ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Mautic - Mautic** Affected versions: - unspecified (Status: affected) ### References 1. [](https://github.com/mautic/mautic/security/advisories/GHSA-pjpc-87mp-4332) 2. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html) ### Credits - Reported by Mattias Michaux, Dropsolid - Fixed by Mattias Michaux, Dropsolid
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-37015, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-37015 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-37015 - **State**: PUBLISHED - **Published Date**: November 23, 2021 at 15:22 UTC - **Last Updated**: August 04, 2024 at 01:09 UTC - **Reserved Date**: July 20, 2021 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) ### References 1. [](https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-100034, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-100034 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-100034 - **State**: PUBLISHED - **Published Date**: January 13, 2015 at 15:00 UTC - **Last Updated**: August 06, 2024 at 14:10 UTC - **Reserved Date**: January 13, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the frontend interface in LicensePal ArcticDesk before 1.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [arcticdesk-interface-xss(91792)](https://exchange.xforce.ibmcloud.com/vulnerabilities/91792) 2. [](http://www.arcticdesk.com/support/announcements/arcticdesk-v1-2-5-maintenance-release-18.html) 3. [57299](http://secunia.com/advisories/57299)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-27887, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-27887 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-27887 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 22:16 UTC - **Last Updated**: February 13, 2025 at 17:47 UTC - **Reserved Date**: February 26, 2024 at 15:32 UTC - **Assigned By**: apple ### Vulnerability Description A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data. ### Affected Products **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT214084) 2. [](https://support.apple.com/kb/HT214084)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-35028, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-35028 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-35028 - **State**: PUBLISHED - **Published Date**: September 29, 2021 at 10:35 UTC - **Last Updated**: August 04, 2024 at 00:33 UTC - **Reserved Date**: June 17, 2021 at 00:00 UTC - **Assigned By**: Zyxel ### Vulnerability Description A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands. ### CVSS Metrics - **CVSS Base Score**: 7.3/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Zyxel - ZyWALL VPN2S Firmware** Affected versions: - 1.12(ABLN.0)C0 (Status: affected) ### References 1. [](https://www.zyxel.com/support/Zyxel_security_advisory_for_directory_traversal_and_command_injection_vulnerabilities_of_VPN2S_Firewall.shtml)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-40543, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-40543 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-40543 - **State**: PUBLISHED - **Published Date**: July 12, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:33 UTC - **Reserved Date**: July 05, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://gitee.com/sanluan/PublicCMS/issues/IAAITR)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-38843, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-38843 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-38843 - **State**: PUBLISHED - **Published Date**: September 16, 2022 at 13:26 UTC - **Last Updated**: August 03, 2024 at 11:02 UTC - **Reserved Date**: August 29, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description EspoCRM version 7.1.8 is vulnerable to Unrestricted File Upload allowing attackers to upload malicious file with any extension to the server. Attacker may execute these malicious files to run unintended code on the server to compromise the server. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-unrestricted-file-upload-7860b15d12bc)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-8086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-8086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-8086 - **State**: PUBLISHED - **Published Date**: January 28, 2020 at 16:15 UTC - **Last Updated**: August 04, 2024 at 09:48 UTC - **Reserved Date**: January 27, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The mod_auth_ldap and mod_auth_ldap2 Community Modules through 2020-01-27 for Prosody incompletely verify the XMPP address passed to the is_admin() function. This grants remote entities admin-only functionality if their username matches the username of a local admin. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://hg.prosody.im/prosody-modules/log/tip/mod_auth_ldap/mod_auth_ldap.lua) 2. [](https://hg.prosody.im/prosody-modules/log/tip/mod_auth_ldap2/mod_auth_ldap2.lua) 3. [](https://prosody.im/security/advisory_20200128/) 4. [DSA-4612](https://www.debian.org/security/2020/dsa-4612) 5. [20200203 [SECURITY] [DSA 4612-1] prosody-modules security update](https://seclists.org/bugtraq/2020/Feb/5)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-6364, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-6364 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-6364 - **State**: PUBLISHED - **Published Date**: November 14, 2015 at 02:00 UTC - **Last Updated**: August 06, 2024 at 07:22 UTC - **Reserved Date**: August 17, 2015 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Cisco Content Delivery System Manager Software 3.2 on Videoscape Distribution Suite Service Manager allows remote attackers to obtain sensitive information via crafted URLs in REST API requests, aka Bug ID CSCuv86960. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20151113 Cisco Videoscape Distribution Suite Service Manager Information Disclosure Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151112-vds) 2. [1034159](http://www.securitytracker.com/id/1034159)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2246, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2246 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2246 - **State**: REJECTED - **Published Date**: June 28, 2022 at 19:00 UTC - **Last Updated**: June 28, 2022 at 21:20 UTC - **Reserved Date**: June 28, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3204, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3204 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3204 - **State**: PUBLISHED - **Published Date**: May 06, 2014 at 14:00 UTC - **Last Updated**: August 06, 2024 at 10:35 UTC - **Reserved Date**: May 03, 2014 at 00:00 UTC - **Assigned By**: canonical ### Vulnerability Description Unity before 7.2.1, as used in Ubuntu 14.04, does not properly handle keyboard shortcuts, which allows physically proximate attackers to bypass the lock screen and execute arbitrary commands, as demonstrated by right-clicking on the indicator bar and then pressing the ALT and F2 keys. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20140429 Re: Ubuntu 14.04: security problem in the lock screen](http://www.openwall.com/lists/oss-security/2014/04/29/2) 2. [67117](http://www.securityfocus.com/bid/67117) 3. [[oss-security] 20140503 Re: Ubuntu 14.04: security problem in the lock screen](http://www.openwall.com/lists/oss-security/2014/05/03/1) 4. [](https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1313885) 5. [USN-2184-1](http://ubuntu.com/usn/usn-2184-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24703, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24703 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24703 - **State**: PUBLISHED - **Published Date**: January 24, 2025 at 17:25 UTC - **Last Updated**: January 24, 2025 at 18:38 UTC - **Reserved Date**: January 23, 2025 at 14:52 UTC - **Assigned By**: Patchstack ### Vulnerability Description Server-Side Request Forgery (SSRF) vulnerability in DLX Plugins Comment Edit Core – Simple Comment Editing allows Server Side Request Forgery. This issue affects Comment Edit Core – Simple Comment Editing: from n/a through 3.0.33. ### CVSS Metrics - **CVSS Base Score**: 4.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **DLX Plugins - Comment Edit Core – Simple Comment Editing** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/simple-comment-editing/vulnerability/wordpress-comment-edit-core-simple-comment-editing-plugin-3-0-33-server-side-request-forgery-ssrf-vulnerability?_s_id=cve) ### Credits - Marek Mikita (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20021, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20021 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20021 - **State**: PUBLISHED - **Published Date**: April 05, 2023 at 00:00 UTC - **Last Updated**: October 28, 2024 at 16:31 UTC - **Reserved Date**: October 27, 2022 at 00:00 UTC - **Assigned By**: cisco ### Vulnerability Description Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root. ### CVSS Metrics - **CVSS Base Score**: 6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-78: OS Command Injection ### Affected Products **Cisco - Cisco Identity Services Engine Software ** Affected versions: - n/a (Status: affected) ### References 1. [20230201 Cisco Identity Services Engine Privilege Escalation Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-os-injection-pxhKsDM)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26795, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26795 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26795 - **State**: PUBLISHED - **Published Date**: April 04, 2024 at 08:20 UTC - **Last Updated**: May 04, 2025 at 08:56 UTC - **Reserved Date**: February 19, 2024 at 14:20 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: riscv: Sparse-Memory/vmemmap out-of-bounds fix Offset vmemmap so that the first page of vmemmap will be mapped to the first page of physical memory in order to ensure that vmemmap’s bounds will be respected during pfn_to_page()/page_to_pfn() operations. The conversion macros will produce correct SV39/48/57 addresses for every possible/valid DRAM_BASE inside the physical memory limits. v2:Address Alex's comments ### Affected Products **Linux - Linux** Affected versions: - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) - d95f1a542c3df396137afa217ef9bd39cb8931ca (Status: affected) **Linux - Linux** Affected versions: - 5.4 (Status: affected) - 0 (Status: unaffected) - 5.10.212 (Status: unaffected) - 5.15.151 (Status: unaffected) - 6.1.81 (Status: unaffected) - 6.6.21 (Status: unaffected) - 6.7.9 (Status: unaffected) - 6.8 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd) 2. [](https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef) 3. [](https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af) 4. [](https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e) 5. [](https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe) 6. [](https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1292, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1292 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1292 - **State**: PUBLISHED - **Published Date**: December 22, 2004 at 05:00 UTC - **Last Updated**: August 08, 2024 at 00:46 UTC - **Reserved Date**: December 20, 2004 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in the parse_emelody function in parse_emelody.c for ringtonetools 2.22 allows remote attackers to execute arbitrary code via a crafted eMelody file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-200503-18](http://www.gentoo.org/security/en/glsa/glsa-200503-18.xml) 2. [ringtonetools-parseemelody-bo(18557)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18557) 3. [](http://tigger.uic.edu/~jlongs2/holes/ringtonetools.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19585, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19585 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19585 - **State**: PUBLISHED - **Published Date**: January 06, 2020 at 19:24 UTC - **Last Updated**: August 05, 2024 at 02:16 UTC - **Reserved Date**: December 04, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://raw.githubusercontent.com/v1k1ngfr/exploits/master/rconfig_lpe.sh?token=) 2. [](https://github.com/v1k1ngfr/exploits-rconfig/blob/master/rconfig_lpe.sh) 3. [](http://packetstormsecurity.com/files/156950/rConfig-3.9.4-searchField-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41599, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41599 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41599 - **State**: PUBLISHED - **Published Date**: December 20, 2022 at 00:00 UTC - **Last Updated**: April 16, 2025 at 18:22 UTC - **Reserved Date**: September 27, 2022 at 00:00 UTC - **Assigned By**: huawei ### Vulnerability Description The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. ### Affected Products **Huawei - HarmonyOS** Affected versions: - 2.0 (Status: affected) - 2.1 (Status: affected) - 3.0.0 (Status: affected) **Huawei - EMUI** Affected versions: - 12.0.1 (Status: affected) - 12.0.0 (Status: affected) - 11.0.1 (Status: affected) ### References 1. [](https://consumer.huawei.com/en/support/bulletin/2022/12/) 2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-44261, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-44261 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-44261 - **State**: PUBLISHED - **Published Date**: February 10, 2023 at 00:00 UTC - **Last Updated**: March 24, 2025 at 18:09 UTC - **Reserved Date**: October 30, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Avery Dennison Monarch Printer M9855 is vulnerable to Cross Site Scripting (XSS). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/IthacaLabs/AveryDennison/tree/main/AveryDennison_MonarchM9855_XSS) 2. [](https://github.com/IthacaLabs/AveryDennison/blob/main/AveryDennison_MonarchM9855_XSS/AveryDennison_MonarchM9855_XSS_CVE-2022-44261.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-39899, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-39899 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-39899 - **State**: PUBLISHED - **Published Date**: July 09, 2024 at 18:57 UTC - **Last Updated**: August 02, 2024 at 04:33 UTC - **Reserved Date**: July 02, 2024 at 19:37 UTC - **Assigned By**: GitHub_M ### Vulnerability Description PrivateBin is an online pastebin where the server has zero knowledge of pasted data. In v1.5, PrivateBin introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy. This vulnerability is fixed in 1.7.4. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-305: Security Weakness - CWE-791: Cross-site Scripting (XSS) ### Affected Products **PrivateBin - PrivateBin** Affected versions: - >= 1.5.0, < 1.7.4 (Status: affected) ### References 1. [https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-mqqj-fx8h-437j](https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-mqqj-fx8h-437j) 2. [https://github.com/PrivateBin/PrivateBin/pull/1370](https://github.com/PrivateBin/PrivateBin/pull/1370) 3. [https://github.com/PrivateBin/PrivateBin/commit/0c4e810e6728f67d678458838d8430dfba4fcca4](https://github.com/PrivateBin/PrivateBin/commit/0c4e810e6728f67d678458838d8430dfba4fcca4)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-4167, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-4167 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-4167 - **State**: PUBLISHED - **Published Date**: December 27, 2011 at 02:00 UTC - **Last Updated**: September 16, 2024 at 18:43 UTC - **Reserved Date**: October 21, 2011 at 00:00 UTC - **Assigned By**: hp ### Vulnerability Description Stack-based buffer overflow in MPAUploader.dll in HP Managed Printing Administration before 2.6.4 allows remote attackers to execute arbitrary code via a long filename parameter in an uploadfile action to Default.asp. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [HPSBPI02732](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03128469) 2. [SSRT100435](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03128469) 3. [](http://www.zerodayinitiative.com/advisories/ZDI-11-353/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-11062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-11062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-11062 - **State**: PUBLISHED - **Published Date**: June 19, 2020 at 19:21 UTC - **Last Updated**: August 06, 2024 at 03:47 UTC - **Reserved Date**: June 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Mattermost Server before 3.5.1. E-mail address verification can be bypassed. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://mattermost.com/security-updates/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1007, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1007 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1007 - **State**: PUBLISHED - **Published Date**: March 19, 2010 at 18:35 UTC - **Last Updated**: September 16, 2024 at 16:18 UTC - **Reserved Date**: March 19, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the Power Extension Manager (ch_lightem) extension 1.0.34 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/) 2. [38811](http://www.securityfocus.com/bid/38811)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-0926, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-0926 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-0926 - **State**: PUBLISHED - **Published Date**: February 02, 2002 at 05:00 UTC - **Last Updated**: August 08, 2024 at 04:37 UTC - **Reserved Date**: January 31, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full) 2. [20011128 JRun SSI Request Body Parsing](http://marc.info/?l=bugtraq&m=100697797325013&w=2) 3. [3589](http://www.securityfocus.com/bid/3589) 4. [allaire-jrun-view-source(7622)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7622)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-15823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-15823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-15823 - **State**: PUBLISHED - **Published Date**: March 30, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 03:23 UTC - **Reserved Date**: October 24, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In spectral_create_samp_msg() in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-10-11, some values from firmware are not properly validated potentially leading to a buffer overflow. ### Affected Products **Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=49c1ce19c8a4689c33e6e8f17ab77d77fae6ff93) 2. [](https://source.android.com/security/bulletin/pixel/2018-02-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-21050, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-21050 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-21050 - **State**: PUBLISHED - **Published Date**: April 16, 2024 at 21:26 UTC - **Last Updated**: March 28, 2025 at 20:00 UTC - **Reserved Date**: December 07, 2023 at 22:28 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 4.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2024.html) 2. [](https://security.netapp.com/advisory/ntap-20240426-0012/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3437, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3437 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3437 - **State**: PUBLISHED - **Published Date**: November 02, 2005 at 11:00 UTC - **Last Updated**: August 07, 2024 at 23:10 UTC - **Reserved Date**: November 02, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in the PL/SQL component in Oracle Database Server 9i up to 10.1.0.4 has unknown impact and attack vectors, aka Oracle Vuln# DB01. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2005-090497.html) 2. [TA05-292A](http://www.us-cert.gov/cas/techalerts/TA05-292A.html) 3. [15134](http://www.securityfocus.com/bid/15134) 4. [VU#210524](http://www.kb.cert.org/vuls/id/210524) 5. [17250](http://secunia.com/advisories/17250)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8151, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8151 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8151 - **State**: PUBLISHED - **Published Date**: November 05, 2019 at 23:37 UTC - **Last Updated**: August 04, 2024 at 21:10 UTC - **Reserved Date**: February 12, 2019 at 00:00 UTC - **Assigned By**: adobe ### Vulnerability Description A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to manipulate shippment settings can execute arbitrary code through server-side request forgery due to unsafe handling of a carrier gateway. ### Affected Products **Adobe Systems Incorporated - Magento 2** Affected versions: - Magento 2.2 prior to 2.2.10 (Status: affected) - Magento 2.3 prior to 2.3.3 or 2.3.2-p1 (Status: affected) ### References 1. [](https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-24860, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-24860 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-24860 - **State**: PUBLISHED - **Published Date**: April 19, 2022 at 23:25 UTC - **Last Updated**: April 22, 2025 at 18:15 UTC - **Reserved Date**: February 10, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Use of Hard-coded Cryptographic Key vulnerability. An attacker can use hard coding to generate login credentials of any user and log in to the service background located at different IP addresses. ### CVSS Metrics - **CVSS Base Score**: 7.4/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-321: Security Weakness ### Affected Products **vran-dev - databasir** Affected versions: - > 1.0.1 (Status: affected) ### References 1. [](https://github.com/vran-dev/databasir/security/advisories/GHSA-9prp-5jc9-jpgg) 2. [](https://github.com/vran-dev/databasir/blob/master/core/src/main/java/com/databasir/core/infrastructure/jwt/JwtTokens.java) 3. [](https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png) 4. [](https://user-images.githubusercontent.com/75008428/163742566-a69c91e8-db20-4058-8967-1cfe86facc6d.png) 5. [](https://user-images.githubusercontent.com/75008428/163742596-5c13153a-be8f-4ce3-9681-bc68b5f7e9c5.png)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-23597, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-23597 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-23597 - **State**: PUBLISHED - **Published Date**: May 01, 2024 at 13:00 UTC - **Last Updated**: August 01, 2024 at 23:06 UTC - **Reserved Date**: March 05, 2024 at 04:05 UTC - **Assigned By**: jpcert ### Vulnerability Description Cross-site request forgery (CSRF) vulnerability exists in TvRock 0.9t8a. If a logged-in user of TVRock accesses a specially crafted page, unintended operations may be performed. Note that the developer was unreachable, therefore, users should consider stop using TvRock 0.9t8a. ### Affected Products **TvRock - TvRock** Affected versions: - 0.9t8a (Status: affected) ### References 1. [](https://jvn.jp/en/jp/JVN24683352/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-25223, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-25223 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-25223 - **State**: PUBLISHED - **Published Date**: March 07, 2023 at 00:00 UTC - **Last Updated**: March 05, 2025 at 15:38 UTC - **Reserved Date**: February 06, 2023 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/crmeb/crmeb_java/issues/9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-44853, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-44853 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-44853 - **State**: PUBLISHED - **Published Date**: December 06, 2024 at 00:00 UTC - **Last Updated**: December 11, 2024 at 20:22 UTC - **Reserved Date**: August 21, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl(). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/ros-navigation/navigation2/issues/4547) 2. [](https://github.com/ros-navigation/navigation2/pull/4548) 3. [](https://github.com/GoesM/ROS-CVE-CNVDs)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-4205, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-4205 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-4205 - **State**: PUBLISHED - **Published Date**: November 05, 2010 at 22:00 UTC - **Last Updated**: August 07, 2024 at 03:34 UTC - **Reserved Date**: November 05, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google Chrome before 7.0.517.44 does not properly handle the data types of event objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html) 2. [oval:org.mitre.oval:def:11537](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11537) 3. [42109](http://secunia.com/advisories/42109) 4. [](http://code.google.com/p/chromium/issues/detail?id=60769) 5. [](http://code.google.com/p/chromium/issues/detail?id=60327) 6. [](http://code.google.com/p/chromium/issues/detail?id=61255)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-4608, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-4608 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-4608 - **State**: PUBLISHED - **Published Date**: January 04, 2006 at 00:00 UTC - **Last Updated**: August 07, 2024 at 23:53 UTC - **Reserved Date**: January 03, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in index.php in BugPort 1.147 allows remote attackers to execute arbitrary SQL commands via the (1) devWherePair[0], (2) orderBy, and (3) where parameters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [bugport-index-sql-injection(23919)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23919) 2. [16121](http://www.securityfocus.com/bid/16121) 3. [ADV-2006-0009](http://www.vupen.com/english/advisories/2006/0009) 4. [18282](http://secunia.com/advisories/18282) 5. [](http://pridels0.blogspot.com/2005/12/bugport-multiple-vuln.html) 6. [22142](http://www.osvdb.org/22142)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1768, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1768 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1768 - **State**: PUBLISHED - **Published Date**: March 10, 2005 at 05:00 UTC - **Last Updated**: August 08, 2024 at 01:00 UTC - **Reserved Date**: March 10, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#697598](http://www.kb.cert.org/vuls/id/697598) 2. [](ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm) 3. [13489](http://secunia.com/advisories/13489) 4. [symantec-brightmail-spamhunter-dos(18530)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18530) 5. [12459](http://www.osvdb.org/12459)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-41063, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-41063 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-41063 - **State**: PUBLISHED - **Published Date**: November 09, 2022 at 00:00 UTC - **Last Updated**: January 02, 2025 at 21:31 UTC - **Reserved Date**: September 19, 2022 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft Excel Remote Code Execution Vulnerability ### CVSS Metrics - **CVSS Base Score**: 7.8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C` ### Affected Products **Microsoft - Microsoft Office 2019** Affected versions: - 19.0.0 (Status: affected) **Microsoft - Microsoft Office Online Server** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft 365 Apps for Enterprise** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Office LTSC 2021** Affected versions: - 16.0.1 (Status: affected) **Microsoft - Microsoft Excel 2016** Affected versions: - 16.0.0.0 (Status: affected) **Microsoft - Microsoft Excel 2013 Service Pack 1** Affected versions: - 15.0.0.0 (Status: affected) **Microsoft - Microsoft Office Web Apps Server 2013 Service Pack 1** Affected versions: - 15.0.1 (Status: affected) ### References 1. [Microsoft Excel Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41063)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-45822, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-45822 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-45822 - **State**: PUBLISHED - **Published Date**: October 19, 2023 at 20:53 UTC - **Last Updated**: September 12, 2024 at 17:45 UTC - **Reserved Date**: October 13, 2023 at 12:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **artifacthub - hub** Affected versions: - < 1.16.0 (Status: affected) ### References 1. [https://github.com/artifacthub/hub/security/advisories/GHSA-9pc8-m4vp-ggvf](https://github.com/artifacthub/hub/security/advisories/GHSA-9pc8-m4vp-ggvf) 2. [https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0](https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0) 3. [https://www.openpolicyagent.org/](https://www.openpolicyagent.org/) 4. [https://www.openpolicyagent.org/docs/latest/#rego](https://www.openpolicyagent.org/docs/latest/#rego)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2011-3358, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2011-3358 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2011-3358 - **State**: PUBLISHED - **Published Date**: September 21, 2011 at 16:00 UTC - **Last Updated**: August 06, 2024 at 23:29 UTC - **Reserved Date**: August 30, 2011 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8392](http://securityreason.com/securityalert/8392) 2. [DSA-2308](http://www.debian.org/security/2011/dsa-2308) 3. [[oss-security] 20110904 CVE requests: <mantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)](http://www.openwall.com/lists/oss-security/2011/09/04/1) 4. [GLSA-201211-01](http://security.gentoo.org/glsa/glsa-201211-01.xml) 5. [mantisbt-bugreportpage-xss(69589)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69589) 6. [](https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_mantisbt.html) 7. [45961](http://secunia.com/advisories/45961) 8. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297) 9. [](https://bugzilla.redhat.com/show_bug.cgi?id=735514) 10. [49448](http://www.securityfocus.com/bid/49448) 11. [51199](http://secunia.com/advisories/51199) 12. [[oss-security] 20110909 Re: CVE requests: <mantisbt-1.2.8 multiple vulnerabilities (1xLFI+XSS, 2xXSS)](http://www.openwall.com/lists/oss-security/2011/09/09/9) 13. [[debian-security-tracker] 20110908 Security Fix for mantis stable 1.1.8](http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html) 14. [FEDORA-2011-12369](http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html) 15. [](https://github.com/mantisbt/mantisbt/commit/0a636b37d3425aea7b781e7f25eaeb164ac54a3d) 16. [20110905 Multiple vulnerabilities in MantisBT](http://www.securityfocus.com/archive/1/519547/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-8742, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-8742 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-8742 - **State**: PUBLISHED - **Published Date**: September 13, 2024 at 06:47 UTC - **Last Updated**: September 13, 2024 at 13:43 UTC - **Reserved Date**: September 11, 2024 at 21:39 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Filterable Gallery widget in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wpdevteam - Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/76c292dc-e9da-4256-82df-58ac5def4771?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/tags/6.0.3/includes/Elements/Filterable_Gallery.php#L566) 3. [](https://plugins.trac.wordpress.org/changeset/3148624/) 4. [](https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers) ### Credits - D.Sim
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-1893, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-1893 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-1893 - **State**: PUBLISHED - **Published Date**: May 31, 2022 at 21:50 UTC - **Last Updated**: August 03, 2024 at 00:17 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: @huntrdev ### Vulnerability Description Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository polonel/trudesk prior to 1.2.3. ### CVSS Metrics - **CVSS Base Score**: 4.6/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-212: Security Weakness ### Affected Products **polonel - polonel/trudesk** Affected versions: - unspecified (Status: affected) ### References 1. [](https://huntr.dev/bounties/a1cfe61b-5248-4a73-9a80-0b764edc9b26) 2. [](https://github.com/polonel/trudesk/commit/ae904d37eaa38bffebfbfe8e949c0385c63e3263)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-8233, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-8233 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-8233 - **State**: PUBLISHED - **Published Date**: June 14, 2018 at 12:00 UTC - **Last Updated**: August 05, 2024 at 06:46 UTC - **Reserved Date**: March 14, 2018 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers. ### Affected Products **Microsoft - Windows 10** Affected versions: - Version 1803 for 32-bit Systems (Status: affected) - Version 1803 for x64-based Systems (Status: affected) **Microsoft - Windows 10 Servers** Affected versions: - version 1803 (Server Core Installation) (Status: affected) ### References 1. [1041093](http://www.securitytracker.com/id/1041093) 2. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8233) 3. [104383](http://www.securityfocus.com/bid/104383)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35579, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35579 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35579 - **State**: PUBLISHED - **Published Date**: December 20, 2020 at 06:31 UTC - **Last Updated**: August 04, 2024 at 17:09 UTC - **Reserved Date**: December 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description tindy2013 subconverter 0.6.4 has a /sub?target=%TARGET%&url=%URL%&config=%CONFIG% API endpoint that accepts an arbitrary %URL% value and launches a GET request for it, but does not consider that the external request target may indirectly redirect back to this original /sub endpoint. Thus, a request loop and a denial of service may occur. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/tindy2013/subconverter/issues/284)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-11533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-11533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-11533 - **State**: PUBLISHED - **Published Date**: July 23, 2017 at 03:00 UTC - **Last Updated**: August 05, 2024 at 18:12 UTC - **Reserved Date**: July 22, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [USN-3681-1](https://usn.ubuntu.com/3681-1/) 2. [](https://github.com/ImageMagick/ImageMagick/issues/562) 3. [DSA-4019](https://www.debian.org/security/2017/dsa-4019) 4. [DSA-4204](https://www.debian.org/security/2018/dsa-4204)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-0119, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-0119 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-0119 - **State**: PUBLISHED - **Published Date**: September 12, 2023 at 15:14 UTC - **Last Updated**: August 02, 2024 at 05:02 UTC - **Reserved Date**: January 09, 2023 at 13:23 UTC - **Assigned By**: redhat ### Vulnerability Description A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Unknown** Affected versions: - 3.4.2 (Status: unaffected) - 3.5.1.16 (Status: unaffected) - 3.5.2 (Status: unaffected) - 3.6.0 (Status: unaffected) **Red Hat - Red Hat Satellite 6.13 for RHEL 8** Affected versions: - 0:3.5.1.17-1.el8sat (Status: unaffected) **Red Hat - Red Hat Satellite 6.13 for RHEL 8** Affected versions: - 0:3.5.1.17-1.el8sat (Status: unaffected) **Red Hat - Red Hat Satellite 6.14 for RHEL 8** Affected versions: - 0:3.7.0.9-1.el8sat (Status: unaffected) **Red Hat - Red Hat Satellite 6.14 for RHEL 8** Affected versions: - 0:3.7.0.9-1.el8sat (Status: unaffected) ### References 1. [RHSA-2023:3387](https://access.redhat.com/errata/RHSA-2023:3387) 2. [RHSA-2023:6818](https://access.redhat.com/errata/RHSA-2023:6818) 3. [](https://access.redhat.com/security/cve/CVE-2023-0119) 4. [RHBZ#2159104](https://bugzilla.redhat.com/show_bug.cgi?id=2159104) 5. [](https://projects.theforeman.org/issues/35977) ### Credits - Red Hat would like to thank Dinko Dimitrov (Onsec.io) for reporting this issue.
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-42084, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-42084 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-42084 - **State**: PUBLISHED - **Published Date**: July 29, 2024 at 16:26 UTC - **Last Updated**: May 04, 2025 at 09:22 UTC - **Reserved Date**: July 29, 2024 at 15:50 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: ftruncate: pass a signed offset The old ftruncate() syscall, using the 32-bit off_t misses a sign extension when called in compat mode on 64-bit architectures. As a result, passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB. Changing the type of the compat syscall to the signed compat_off_t changes the behavior so it instead returns -EINVAL. The native entry point, the truncate() syscall and the corresponding loff_t based variants are all correct already and do not suffer from this mistake. ### Affected Products **Linux - Linux** Affected versions: - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) - 3f6d078d4accfff8b114f968259a060bfdc7c682 (Status: affected) **Linux - Linux** Affected versions: - 3.9 (Status: affected) - 0 (Status: unaffected) - 4.19.317 (Status: unaffected) - 5.4.279 (Status: unaffected) - 5.10.221 (Status: unaffected) - 5.15.162 (Status: unaffected) - 6.1.97 (Status: unaffected) - 6.6.37 (Status: unaffected) - 6.9.8 (Status: unaffected) - 6.10 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/c329760749b5419769e57cb2be80955d2805f9c9) 2. [](https://git.kernel.org/stable/c/f531d4bc6c5588d713359e42ed65e46816d841d8) 3. [](https://git.kernel.org/stable/c/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a) 4. [](https://git.kernel.org/stable/c/dbb226d81cd02cee140139c2369791e6f61f2007) 5. [](https://git.kernel.org/stable/c/5ae6af68410bdad6181ec82104bb9985a7a6a0fa) 6. [](https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a) 7. [](https://git.kernel.org/stable/c/930a4c369f74da26816eaaa71b5888d29b759c27) 8. [](https://git.kernel.org/stable/c/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0781, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0781 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0781 - **State**: PUBLISHED - **Published Date**: May 23, 2022 at 07:15 UTC - **Last Updated**: August 02, 2024 at 23:40 UTC - **Reserved Date**: February 28, 2022 at 00:00 UTC - **Assigned By**: WPScan ### Vulnerability Description The Nirweb support WordPress plugin before 2.8.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **Unknown - Nirweb support** Affected versions: - 2.8.2 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161) ### Credits - cydave
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-9850, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-9850 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-9850 - **State**: PUBLISHED - **Published Date**: November 16, 2024 at 03:20 UTC - **Last Updated**: November 16, 2024 at 15:09 UTC - **Reserved Date**: October 11, 2024 at 00:20 UTC - **Assigned By**: Wordfence ### Vulnerability Description The SVG Case Study plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **augustinfotech - SVG Case Study** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d7fe128e-02b7-4838-8575-db09d33d2340?source=cve) 2. [](https://wordpress.org/plugins/case-study/#developers) ### Credits - Francesco Carlucci
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20570, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20570 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20570 - **State**: PUBLISHED - **Published Date**: December 16, 2022 at 00:00 UTC - **Last Updated**: April 21, 2025 at 12:57 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description Product: AndroidVersions: Android kernelAndroid ID: A-230660904References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-45741, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-45741 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-45741 - **State**: PUBLISHED - **Published Date**: October 14, 2024 at 17:03 UTC - **Last Updated**: February 28, 2025 at 11:04 UTC - **Reserved Date**: September 05, 2024 at 21:35 UTC - **Assigned By**: Splunk ### Vulnerability Description In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user. ### CVSS Metrics - **CVSS Base Score**: 5.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N` ### Affected Products **Splunk - Splunk Enterprise** Affected versions: - 9.2 (Status: affected) - 9.1 (Status: affected) **Splunk - Splunk Cloud Platform** Affected versions: - 9.2.2403 (Status: affected) - 9.1.2312 (Status: affected) ### References 1. [](https://advisory.splunk.com/advisories/SVD-2024-1011) 2. [](https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/) ### Credits - Danylo Dmytriiev (DDV_UA)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-13121, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-13121 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-13121 - **State**: PUBLISHED - **Published Date**: February 13, 2025 at 06:00 UTC - **Last Updated**: February 19, 2025 at 21:33 UTC - **Reserved Date**: January 01, 2025 at 15:36 UTC - **Assigned By**: WPScan ### Vulnerability Description The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/59ee8fe5-4820-4d52-b17a-7044631c40c1/) ### Credits - Dmitrii Ignatyev - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-45889, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-45889 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-45889 - **State**: PUBLISHED - **Published Date**: December 25, 2022 at 00:00 UTC - **Last Updated**: April 14, 2025 at 17:49 UTC - **Reserved Date**: November 25, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38271 - **State**: PUBLISHED - **Published Date**: June 26, 2024 at 15:19 UTC - **Last Updated**: August 02, 2024 at 04:04 UTC - **Reserved Date**: June 12, 2024 at 09:23 UTC - **Assigned By**: Google ### Vulnerability Description There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above ### Weakness Classification (CWE) - CWE-404: Security Weakness ### Affected Products **Google - Nearby** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/google/nearby/pull/2433) 2. [](https://github.com/google/nearby/pull/2435) 3. [](https://github.com/google/nearby/pull/2589) 4. [](https://github.com/google/nearby/pull/2402) ### Credits - Or Yair and Shmuel Cohen with SafeBreach
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-6006, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-6006 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-6006 - **State**: PUBLISHED - **Published Date**: September 22, 2014 at 10:00 UTC - **Last Updated**: August 06, 2024 at 12:03 UTC - **Reserved Date**: August 30, 2014 at 00:00 UTC - **Assigned By**: certcc ### Vulnerability Description The Gratta & Vinci? (aka com.dreamstep.wGrattaevinci) application 0.21.13167.93474 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [VU#993633](http://www.kb.cert.org/vuls/id/993633) 2. [VU#582497](http://www.kb.cert.org/vuls/id/582497) 3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-2124, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-2124 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-2124 - **State**: PUBLISHED - **Published Date**: May 15, 2023 at 00:00 UTC - **Last Updated**: August 02, 2024 at 06:12 UTC - **Reserved Date**: April 17, 2023 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. ### Weakness Classification (CWE) - CWE-787: Out-of-bounds Write ### Affected Products **n/a - Kernel** Affected versions: - Linux kernel 6.4-rc1 (Status: affected) ### References 1. [](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210) 2. [](https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e) 3. [](https://security.netapp.com/advisory/ntap-20230622-0010/) 4. [DSA-5448](https://www.debian.org/security/2023/dsa-5448) 5. [DSA-5480](https://www.debian.org/security/2023/dsa-5480) 6. [[debian-lts-announce] 20231019 [SECURITY] [DLA 3623-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-21501, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-21501 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-21501 - **State**: PUBLISHED - **Published Date**: January 21, 2025 at 20:52 UTC - **Last Updated**: January 23, 2025 at 16:36 UTC - **Reserved Date**: December 24, 2024 at 23:18 UTC - **Assigned By**: oracle ### Vulnerability Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Affected Products **Oracle Corporation - MySQL Server** Affected versions: - * (Status: affected) - * (Status: affected) - * (Status: affected) ### References 1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2025.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-3166, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-3166 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-3166 - **State**: PUBLISHED - **Published Date**: November 20, 2019 at 20:50 UTC - **Last Updated**: August 06, 2024 at 05:39 UTC - **Reserved Date**: April 10, 2015 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error. ### Affected Products **PostgreSQL Global Development Group - PostgreSQL** Affected versions: - before 9.0.20 (Status: affected) - 9.1.x before 9.1.16 (Status: affected) - 9.2.x before 9.2.11 (Status: affected) - 9.3.x before 9.3.7 (Status: affected) - and 9.4.x before 9.4.2 (Status: affected) ### References 1. [](http://www.postgresql.org/about/news/1587/) 2. [](http://www.postgresql.org/docs/9.0/static/release-9-0-20.html) 3. [](http://www.postgresql.org/docs/9.1/static/release-9-1-16.html) 4. [](http://www.postgresql.org/docs/9.2/static/release-9-2-11.html) 5. [](http://www.postgresql.org/docs/9.3/static/release-9-3-7.html) 6. [](http://www.postgresql.org/docs/9.4/static/release-9-4-2.html) 7. [](http://www.debian.org/security/2015/dsa-3269) 8. [](http://www.debian.org/security/2015/dsa-3270) 9. [](http://ubuntu.com/usn/usn-2621-1)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-10129, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-10129 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-10129 - **State**: PUBLISHED - **Published Date**: February 04, 2024 at 04:31 UTC - **Last Updated**: August 06, 2024 at 08:58 UTC - **Reserved Date**: February 02, 2024 at 13:35 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability was found in planet-freo up to 20150116 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/inc/auth.inc.php. The manipulation of the argument auth leads to incorrect comparison. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 6ad38c58a45642eb8c7844e2f272ef199f59550d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-252716. ### CVSS Metrics - **CVSS Base Score**: 3.7/10.0 - **Severity**: LOW - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-697: Security Weakness ### Affected Products **n/a - planet-freo** Affected versions: - 20150116 (Status: affected) ### References 1. [](https://vuldb.com/?id.252716) 2. [](https://vuldb.com/?ctiid.252716) 3. [](https://github.com/samwilson/planet-freo/commit/6ad38c58a45642eb8c7844e2f272ef199f59550d) ### Credits - VulDB GitHub Commit Analyzer
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1503, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1503 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1503 - **State**: PUBLISHED - **Published Date**: October 25, 2007 at 19:00 UTC - **Last Updated**: August 08, 2024 at 02:28 UTC - **Reserved Date**: October 25, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in AOL Instant Messenger (AIM) 5.2.3292 allows remote attackers to execute arbitrary code via an aim:getfile URL with a long screen name. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [8825](http://www.securityfocus.com/bid/8825) 2. [](http://www.digitalpranksters.com/advisories/aol/AIMProtocolBO.html) 3. [20031015 Buffer Overflow in AOL Instant Messager](http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0059.html) 4. [aim-getfile-screenname-bo(13443)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13443)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0030, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0030 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0030 - **State**: PUBLISHED - **Published Date**: January 21, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 04:17 UTC - **Reserved Date**: December 15, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2009:0057](https://rhn.redhat.com/errata/RHSA-2009-0057.html) 2. [33611](http://secunia.com/advisories/33611) 3. [](https://bugzilla.redhat.com/show_bug.cgi?id=480488) 4. [](https://bugzilla.redhat.com/show_bug.cgi?id=480224) 5. [oval:org.mitre.oval:def:10366](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10366) 6. [squirrelmail-sessionid-session-hijacking(48115)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48115) 7. [SUSE-SR:2009:004](http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html) 8. [1021611](http://securitytracker.com/id?1021611) 9. [33354](http://www.securityfocus.com/bid/33354)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24692, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24692 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24692 - **State**: PUBLISHED - **Published Date**: September 25, 2020 at 03:43 UTC - **Last Updated**: August 04, 2024 at 15:19 UTC - **Reserved Date**: August 26, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The Ignite portal in Mitel MiContact Center Business before 9.3.0.0 could allow an attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to gain access to a user session. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.mitel.com/support/security-advisories) 2. [](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0011)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5150 - **State**: PUBLISHED - **Published Date**: November 18, 2008 at 15:00 UTC - **Last Updated**: August 07, 2024 at 10:40 UTC - **Reserved Date**: November 18, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description sample.sh in maildirsync 1.1 allows local users to append data to arbitrary files via a symlink attack on a /tmp/maildirsync-*.#####.log temporary file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [maildirsync-sample-symlink(46711)](https://exchange.xforce.ibmcloud.com/vulnerabilities/46711) 2. [32403](http://www.securityfocus.com/bid/32403) 3. [[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages](http://lists.debian.org/debian-devel/2008/08/msg00347.html) 4. [](http://uvw.ru/report.sid.txt)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-2812, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-2812 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-2812 - **State**: PUBLISHED - **Published Date**: May 22, 2007 at 19:00 UTC - **Last Updated**: August 07, 2024 at 13:49 UTC - **Reserved Date**: May 22, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in hlstats.php in HLstats 1.35, and possibly earlier, allows remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO or (2) the action parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [24063](http://www.securityfocus.com/bid/24063) 2. [ADV-2007-1882](http://www.vupen.com/english/advisories/2007/1882) 3. [hlstats-unspecified-xss(34382)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34382) 4. [2724](http://securityreason.com/securityalert/2724) 5. [hlstats-action-xss(34383)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34383) 6. [36215](http://osvdb.org/36215) 7. [20070519 RedLevel Advisory #017 - HLstats v1.35 Cross-Site Scripting Vulnerability #2](http://www.securityfocus.com/archive/1/469088/100/0/threaded) 8. [25340](http://secunia.com/advisories/25340) 9. [24102](http://www.securityfocus.com/bid/24102) 10. [20070519 RedLevel Advisory #016 - HLstats v1.35 Cross-Site Scripting Vulnerability](http://www.securityfocus.com/archive/1/469087/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-27916, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-27916 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-27916 - **State**: PUBLISHED - **Published Date**: September 17, 2024 at 14:20 UTC - **Last Updated**: September 18, 2024 at 21:29 UTC - **Reserved Date**: March 02, 2021 at 15:53 UTC - **Assigned By**: Mautic ### Vulnerability Description Prior to the patched version, logged in users of Mautic are vulnerable to Relative Path Traversal/Arbitrary File Deletion. Regardless of the level of access the Mautic user had, they could delete files other than those in the media folders such as system files, libraries or other important files. This vulnerability exists in the implementation of the GrapesJS builder in Mautic. ### CVSS Metrics - **CVSS Base Score**: 8.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-22: Path Traversal ### Affected Products **Mautic - Mautic** Affected versions: - >= 3.3.0 (Status: affected) - >= 5.0.0 (Status: affected) ### References 1. [](https://github.com/mautic/mautic/security/advisories/GHSA-9fcx-cv56-w58p) ### Credits - Mattias Michaux - Lenon Leite - Adrian Schimpf - Avikarsha Saha - John Linhart