System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37184, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37184 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37184
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:21 UTC
- **Last Updated**: January 15, 2025 at 21:05 UTC
- **Reserved Date**: June 28, 2024 at 16:07 UTC
- **Assigned By**: talos
### Vulnerability Description
A buffer overflow vulnerability exists in the adm.cgi rep_as_bridge() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**Wavlink - Wavlink AC3000**
Affected versions:
- M33A8.V5030.210505 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2024-2025](https://talosintelligence.com/vulnerability_reports/TALOS-2024-2025)
### Credits
- Discovered by Lilith >_> of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31630, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31630 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31630
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 00:00 UTC
- **Last Updated**: January 23, 2025 at 19:50 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/openlink/virtuoso-opensource/issues/1138) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7689
- **State**: PUBLISHED
- **Published Date**: July 01, 2020 at 13:55 UTC
- **Last Updated**: September 17, 2024 at 01:22 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
Data is truncated wrong when its length is greater than 255 bytes.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**n/a - bcrypt**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-BCRYPT-572911)
2. [](https://github.com/kelektiv/node.bcrypt.js/issues/776)
3. [](https://github.com/kelektiv/node.bcrypt.js/pull/806)
4. [](https://github.com/kelektiv/node.bcrypt.js/pull/807)
### Credits
- pool683 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2695, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2695 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2695
- **State**: PUBLISHED
- **Published Date**: June 13, 2008 at 19:19 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 13, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in entry.php in phpInv 0.8.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29597](http://www.securityfocus.com/bid/29597)
2. [phpinv-entry-file-include(42926)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42926)
3. [5754](https://www.exploit-db.com/exploits/5754) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6053
- **State**: PUBLISHED
- **Published Date**: June 21, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 15:18 UTC
- **Reserved Date**: February 16, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
A Cross-Site Scripting issue was discovered in Trihedral VTScada Versions prior to 11.2.26. A cross-site scripting vulnerability may allow JavaScript code supplied by the attacker to execute within the user's browser.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**n/a - Trihedral VTScada**
Affected versions:
- Trihedral VTScada (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-164-01)
2. [99066](http://www.securityfocus.com/bid/99066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2171
- **State**: PUBLISHED
- **Published Date**: March 25, 2020 at 16:05 UTC
- **Last Updated**: August 04, 2024 at 07:01 UTC
- **Reserved Date**: December 05, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
### Affected Products
**Jenkins project - Jenkins RapidDeploy Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1677)
2. [[oss-security] 20200325 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/03/25/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-4871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-4871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-4871
- **State**: REJECTED
- **Published Date**: December 30, 2019 at 16:19 UTC
- **Last Updated**: December 30, 2019 at 16:19 UTC
- **Reserved Date**: January 03, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28140, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28140 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28140
- **State**: PUBLISHED
- **Published Date**: March 29, 2022 at 12:30 UTC
- **Last Updated**: August 03, 2024 at 05:48 UTC
- **Reserved Date**: March 29, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
### Affected Products
**Jenkins project - Jenkins Flaky Test Handler Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896)
2. [[oss-security] 20220329 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/03/29/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47317
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 14:35 UTC
- **Last Updated**: May 04, 2025 at 07:08 UTC
- **Reserved Date**: May 21, 2024 at 14:28 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/bpf: Fix detecting BPF atomic instructions
Commit 91c960b0056672 ("bpf: Rename BPF_XADD and prepare to encode other
atomics in .imm") converted BPF_XADD to BPF_ATOMIC and added a way to
distinguish instructions based on the immediate field. Existing JIT
implementations were updated to check for the immediate field and to
reject programs utilizing anything more than BPF_ADD (such as BPF_FETCH)
in the immediate field.
However, the check added to powerpc64 JIT did not look at the correct
BPF instruction. Due to this, such programs would be accepted and
incorrectly JIT'ed resulting in soft lockups, as seen with the atomic
bounds test. Fix this by looking at the correct immediate value.
### Affected Products
**Linux - Linux**
Affected versions:
- 91c960b0056672e74627776655c926388350fa30 (Status: affected)
- 91c960b0056672e74627776655c926388350fa30 (Status: affected)
- 91c960b0056672e74627776655c926388350fa30 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.12.19 (Status: unaffected)
- 5.13.4 (Status: unaffected)
- 5.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f)
2. [](https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2)
3. [](https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1911, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1911 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1911
- **State**: PUBLISHED
- **Published Date**: March 06, 2019 at 20:00 UTC
- **Last Updated**: September 17, 2024 at 03:48 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM DOORS Next Generation (DNG/RRC) 5.0 through 5.0.2 and 6.0 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152735.
### Affected Products
**IBM - Rational DOORS Next Generation**
Affected versions:
- 5.0.2 (Status: affected)
- 5.0 (Status: affected)
- 5.0.1 (Status: affected)
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 6.0.2 (Status: affected)
- 6.0.3 (Status: affected)
- 6.0.4 (Status: affected)
- 6.0.5 (Status: affected)
- 6.0.6 (Status: affected)
### References
1. [ibm-dng-cve20181911-xss(152735)](https://exchange.xforce.ibmcloud.com/vulnerabilities/152735)
2. [](http://www.ibm.com/support/docview.wss?uid=ibm10873256) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-3987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-3987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3987
- **State**: PUBLISHED
- **Published Date**: October 14, 2008 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 10:00 UTC
- **Reserved Date**: September 09, 2008 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Discoverer Desktop component in Oracle Application Server 10.1.2.3 allows local users to affect confidentiality via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oracle-appserver-discdesk-info-disclosure(45890)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45890)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html)
3. [1021054](http://www.securitytracker.com/id?1021054)
4. [32291](http://secunia.com/advisories/32291)
5. [ADV-2008-2825](http://www.vupen.com/english/advisories/2008/2825) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24639, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24639 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24639
- **State**: PUBLISHED
- **Published Date**: September 20, 2021 at 10:06 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The OMGF WordPress plugin before 4.5.4 does not enforce path validation, authorisation and CSRF checks in the omgf_ajax_empty_dir AJAX action, which allows any authenticated users to delete arbitrary files or folders on the server.
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
- CWE-22: Path Traversal
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - OMGF | Host Google Fonts Locally**
Affected versions:
- 4.5.4 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/1ada2a96-32aa-4e37-809c-705db6026e0b)
### Credits
- apple502j |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13472
- **State**: PUBLISHED
- **Published Date**: July 09, 2019 at 21:57 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHPWind 9.1.0 has XSS vulnerabilities in the c and m parameters of the index.php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vulnerability-lab.com/get_content.php?id=2184) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30922, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30922 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30922
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 08:31 UTC
- **Last Updated**: December 04, 2024 at 15:38 UTC
- **Reserved Date**: April 21, 2023 at 08:42 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0603, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0603 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0603
- **State**: PUBLISHED
- **Published Date**: June 26, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Cross-site scripting vulnerability in Site Reviews versions prior to 2.15.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**Gemini Labs - Site Reviews**
Affected versions:
- prior to version 2.15.3 (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9102)
2. [JVN#60978548](http://jvn.jp/en/jp/JVN60978548/index.html)
3. [](https://wordpress.org/plugins/site-reviews/#developers) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5212
- **State**: PUBLISHED
- **Published Date**: May 26, 2025 at 23:00 UTC
- **Last Updated**: May 27, 2025 at 13:51 UTC
- **Reserved Date**: May 26, 2025 at 13:22 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Employee Record Management System 1.3. It has been classified as critical. Affected is an unknown function of the file /admin/editempexp.php. The manipulation of the argument emp1name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Employee Record Management System**
Affected versions:
- 1.3 (Status: affected)
### References
1. [VDB-310308 | PHPGurukul Employee Record Management System editempexp.php sql injection](https://vuldb.com/?id.310308)
2. [VDB-310308 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.310308)
3. [Submit #582812 | PHPGurukul Employee Record Management System V1.3 SQL Injection](https://vuldb.com/?submit.582812)
4. [](https://github.com/ting-06a/myCVE/issues/3)
5. [](https://phpgurukul.com/)
### Credits
- ting-06a (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48422, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48422
- **State**: REJECTED
- **Last Updated**: May 21, 2025 at 02:55 UTC
- **Reserved Date**: May 20, 2025 at 11:27 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4250
- **State**: PUBLISHED
- **Published Date**: May 20, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 16:38 UTC
- **Reserved Date**: June 12, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The (1) file upload component and (2) File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.8 and 6.1.x before 6.1.3 do not properly check file extensions, which allow remote authenticated editors to execute arbitrary PHP code by uploading a .php file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5763, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5763
- **State**: PUBLISHED
- **Published Date**: February 19, 2019 at 17:00 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 09, 2019 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [106767](http://www.securityfocus.com/bid/106767)
2. [](https://crbug.com/914731)
3. [RHSA-2019:0309](https://access.redhat.com/errata/RHSA-2019:0309)
4. [DSA-4395](https://www.debian.org/security/2019/dsa-4395)
5. [](https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html)
6. [FEDORA-2019-561eae4626](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/)
7. [FEDORA-2019-05a780936d](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0372
- **State**: PUBLISHED
- **Published Date**: February 05, 2024 at 21:21 UTC
- **Last Updated**: August 01, 2024 at 18:04 UTC
- **Reserved Date**: January 09, 2024 at 20:13 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Views for WPForms – Display & Edit WPForms Entries on your site frontend plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_form_fields' function in all versions up to, and including, 3.2.2. This makes it possible for authenticated attackers, with subscriber access and above, to create form views.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**aman086 - Views for WPForms – Display & Edit WPForms Entries on your site frontend**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2ab58add-ab81-4c84-b773-7daf382492b0?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?old_path=%2Fviews-for-wpforms-lite%2Ftags%2F3.2.2&old=3026471&new_path=%2Fviews-for-wpforms-lite%2Ftags%2F3.2.3&new=3026471&sfp_email=&sfph_mail=)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16219
- **State**: PUBLISHED
- **Published Date**: August 06, 2020 at 23:10 UTC
- **Last Updated**: August 04, 2024 at 13:37 UTC
- **Reserved Date**: July 31, 2020 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**n/a - Delta Electronics TPEditor**
Affected versions:
- TPEditor Versions 1.97 and prior (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-20-219-04)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-20-961/)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-963/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21052
- **State**: PUBLISHED
- **Published Date**: April 08, 2020 at 17:43 UTC
- **Last Updated**: August 05, 2024 at 12:19 UTC
- **Reserved Date**: April 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with N(7.x) and O(8.X) (Exynos chipsets) software. There is incorrect usage of shared memory in the vaultkeeper Trustlet, leading to arbitrary code execution. The Samsung ID is SVE-2018-12855 (October 2018).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3700, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3700 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3700
- **State**: PUBLISHED
- **Published Date**: July 11, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 14:28 UTC
- **Reserved Date**: July 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sun Java System Access Manager (formerly Java System Identity Server) before 20070710, when the message debug level is configured in the com.iplanet.services.debug.level property in AMConfig.properties, logs cleartext login passwords, which allows local users to gain privileges by reading /var/opt/SUNWam/debug/amAuth.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24859](http://www.securityfocus.com/bid/24859)
2. [ADV-2007-2496](http://www.vupen.com/english/advisories/2007/2496)
3. [26030](http://secunia.com/advisories/26030)
4. [37249](http://osvdb.org/37249)
5. [1018370](http://www.securitytracker.com/id?1018370)
6. [101918](http://sunsolve.sun.com/search/document.do?assetkey=1-26-101918-1)
7. [200386](http://sunsolve.sun.com/search/document.do?assetkey=1-66-200386-1)
8. [sun-jsam-message-information-disclosure(35339)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35339) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31953, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31953 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31953
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 17:42 UTC
- **Last Updated**: February 13, 2025 at 15:48 UTC
- **Reserved Date**: April 08, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Samsung Magician 8.0.0 on macOS. Because it is possible to tamper with the directory and executable files used during the installation process, an attacker can escalate privileges through arbitrary code execution. (The attacker must already have user privileges, and an administrator password must be entered during the program installation stage for privilege escalation.)
### CVSS Metrics
- **CVSS Base Score**: 6.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:R`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31953/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56497, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56497
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 14:09 UTC
- **Last Updated**: January 14, 2025 at 20:55 UTC
- **Reserved Date**: December 26, 2024 at 15:39 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Fortinet - FortiMail**
Affected versions:
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
**Fortinet - FortiRecorder**
Affected versions:
- 7.0.0 (Status: affected)
- 6.4.0 (Status: affected)
### References
1. [https://fortiguard.fortinet.com/psirt/FG-IR-23-170](https://fortiguard.fortinet.com/psirt/FG-IR-23-170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6660
- **State**: PUBLISHED
- **Published Date**: December 20, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 20:33 UTC
- **Reserved Date**: December 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The nodeType function in KDE libkhtml 4.2.0 and earlier, as used by Konquerer, KMail, and other programs, allows remote attackers to cause a denial of service (crash) via malformed HTML tags, possibly involving a COL SPAN tag embedded in a RANGE tag.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://downloads.securityfocus.com/vulnerabilities/exploits/21662.html)
2. [21662](http://www.securityfocus.com/bid/21662)
3. [ADV-2006-5071](http://www.vupen.com/english/advisories/2006/5071) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14224
- **State**: PUBLISHED
- **Published Date**: December 18, 2020 at 22:11 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 17, 2020 at 00:00 UTC
- **Assigned By**: HCL
### Vulnerability Description
A vulnerability in the MIME message handling of the HCL Notes v9 client could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the Notes application or inject code into the system which would execute with the privileges of the currently logged-in user.
### Affected Products
**n/a - HCL Notes**
Affected versions:
- v9 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085913) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-39908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-39908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39908
- **State**: PUBLISHED
- **Published Date**: April 01, 2022 at 22:17 UTC
- **Last Updated**: August 04, 2024 at 02:20 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
In all versions of GitLab CE/EE starting from 0.8.0 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 certain Unicode characters can be abused to commit malicious code into projects without being noticed in merge request or source code viewer UI.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=0.8.0, <14.2.6 (Status: affected)
- >=14.3, <14.3.4 (Status: affected)
- >=14.4, <14.4.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/337193)
2. [](https://hackerone.com/reports/1280077)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39908.json)
### Credits
- Thanks @nickboucher, for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34163, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34163 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34163
- **State**: PUBLISHED
- **Published Date**: August 01, 2022 at 15:41 UTC
- **Last Updated**: September 16, 2024 at 17:47 UTC
- **Reserved Date**: June 20, 2022 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM CICS TX 11.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 229333.
### Affected Products
**IBM - CICS TX Standard**
Affected versions:
- 11.1 (Status: affected)
**IBM - CICS TX Advanced**
Affected versions:
- 11.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6608200)
2. [](https://www.ibm.com/support/pages/node/6608202)
3. [ibm-cics-cve202234163-header-injection (229333)](https://exchange.xforce.ibmcloud.com/vulnerabilities/229333) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-0884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-0884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0884
- **State**: PUBLISHED
- **Published Date**: April 05, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 13:18 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a creation of folders in read-only folders despite lacking permissions issue. Due to a logical error in the file caching layer an authenticated adversary is able to create empty folders inside a shared folder. Note that this only affects folders and files that the adversary has at least read-only permissions for.
### Weakness Classification (CWE)
- CWE-275: Security Weakness
### Affected Products
**Nextcloud - Nextcloud Server**
Affected versions:
- All versions before 9.0.55 and 10.0.2 (Status: affected)
### References
1. [](https://nextcloud.com/security/advisory/?id=nc-sa-2017-002)
2. [](https://hackerone.com/reports/169680) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3595
- **State**: PUBLISHED
- **Published Date**: January 20, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The OpenManage web application 2.5 build 1.19 on Dell PowerConnect 3348 1.2.1.3, 3524p 2.0.0.48, and 5324 2.0.1.4 switches allows remote authenticated users to cause a denial of service (device reset) via a direct request to an unspecified OSPF URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#122582](http://www.kb.cert.org/vuls/id/122582)
2. [openmanage-cve20133595-dos(90597)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90597) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3198
- **State**: PUBLISHED
- **Published Date**: June 23, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2006:038](http://www.novell.com/linux/security/advisories/2006_38_opera.html)
2. [20897](http://secunia.com/advisories/20897)
3. [18594](http://www.securityfocus.com/bid/18594)
4. [20060622 VigilantMinds Advisory: Opera JPEG Processing Integer Overflow Vulnerability (VMSA-20060621-01)](http://www.securityfocus.com/archive/1/438074/100/0/threaded)
5. [ADV-2006-2491](http://www.vupen.com/english/advisories/2006/2491)
6. [20787](http://secunia.com/advisories/20787)
7. [1133](http://securityreason.com/securityalert/1133)
8. [1016362](http://securitytracker.com/id?1016362)
9. [](http://www.vigilantminds.com/advi_detail.php?id=45)
10. [opera-jpeg-bo(27318)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27318) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49453
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:13 UTC
- **Last Updated**: May 04, 2025 at 08:38 UTC
- **Reserved Date**: February 26, 2025 at 02:08 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc
The allocation funciton devm_kcalloc may fail and return a null pointer,
which would cause a null-pointer dereference later.
It might be better to check it and directly return -ENOMEM just like the
usage of devm_kcalloc in previous code.
### Affected Products
**Linux - Linux**
Affected versions:
- 52835d59fc6cc7f3c3cfdb4a194ddc9ebd6c0c31 (Status: affected)
- 52835d59fc6cc7f3c3cfdb4a194ddc9ebd6c0c31 (Status: affected)
- 52835d59fc6cc7f3c3cfdb4a194ddc9ebd6c0c31 (Status: affected)
- 52835d59fc6cc7f3c3cfdb4a194ddc9ebd6c0c31 (Status: affected)
- 52835d59fc6cc7f3c3cfdb4a194ddc9ebd6c0c31 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.12 (Status: affected)
- 0 (Status: unaffected)
- 5.10.121 (Status: unaffected)
- 5.15.46 (Status: unaffected)
- 5.17.14 (Status: unaffected)
- 5.18.3 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/05efc4591f80582b6fe53366b70b6a35a42fd255)
2. [](https://git.kernel.org/stable/c/7cef9274fa1b8506949d74bc45aef072b890824a)
3. [](https://git.kernel.org/stable/c/c4e188869406b47ac3350920bf165be303cb1c96)
4. [](https://git.kernel.org/stable/c/01ba41a359622ab256ce4d4f8b94c67165ae3daf)
5. [](https://git.kernel.org/stable/c/ba56291e297d28aa6eb82c5c1964fae2d7594746) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1231, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1231 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1231
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: October 21, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SCO UnixWare 7.1.1 and Open UNIX 8.0.0 allows local users to cause a denial of service via an rcp call on /proc.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [6025](http://www.securityfocus.com/bid/6025)
2. [openunix-unixware-rcp-dos(10425)](http://www.iss.net/security_center/static/10425.php)
3. [CSSA-2002-SCO.41](ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2002-SCO.41) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0702
- **State**: PUBLISHED
- **Published Date**: February 12, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 07:54 UTC
- **Reserved Date**: February 11, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3639](http://securityreason.com/securityalert/3639)
2. [ADV-2008-0393](http://www.vupen.com/english/advisories/2008/0393)
3. [20080201 Titan FTP Server Remote Heap Overflow (USER/PASS)](http://www.securityfocus.com/archive/1/487431/100/0/threaded)
4. [5036](https://www.exploit-db.com/exploits/5036)
5. [28760](http://secunia.com/advisories/28760)
6. [27568](http://www.securityfocus.com/bid/27568) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40578
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 21:13 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Authenticated Blind & Error-based SQL injection vulnerability was discovered in Online Enrollment Management System in PHP and PayPal Free Source Code 1.0, that allows attackers to obtain sensitive information and execute arbitrary SQL commands via IDNO parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40J03KR/cve-2021-40578-127ceaf3f1bb)
2. [](https://www.nu11secur1ty.com/2021/12/online-enrollment-management-system-sql.html)
3. [](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3886
- **State**: PUBLISHED
- **Published Date**: April 11, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 23:20 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
A memory corruption vulnerability exists in the PCX-parsing functionality of Computerinsel Photoline 20.53. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code execution.
### Affected Products
**Talos - Computerinsel Photoline**
Affected versions:
- Computerinsel Photoline 20.53 for OS X (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0561) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-10083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-10083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-10083
- **State**: PUBLISHED
- **Published Date**: February 21, 2023 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 08:58 UTC
- **Reserved Date**: February 19, 2023 at 19:39 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in harrystech Dynosaur-Rails and classified as critical. Affected by this vulnerability is the function basic_auth of the file app/controllers/application_controller.rb. The manipulation leads to improper authentication. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 04b223813f0e336aab50bff140d0f5889c31dbec. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221503.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**harrystech - Dynosaur-Rails**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.221503)
2. [](https://vuldb.com/?ctiid.221503)
3. [](https://github.com/harrystech/dynosaur-rails/pull/11)
4. [](https://github.com/harrystech/dynosaur-rails/commit/04b223813f0e336aab50bff140d0f5889c31dbec)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13573, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13573
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:07 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for TripPay, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TripPay) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-30823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-30823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30823
- **State**: PUBLISHED
- **Published Date**: May 31, 2022 at 17:32 UTC
- **Last Updated**: August 03, 2024 at 07:03 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\blog_events_edit.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/k0xx11/bug_report/blob/main/vendors/codeastro.com/wedding-management-system/SQLi-1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34062
- **State**: PUBLISHED
- **Published Date**: November 15, 2023 at 09:46 UTC
- **Last Updated**: August 29, 2024 at 17:47 UTC
- **Reserved Date**: May 25, 2023 at 17:21 UTC
- **Assigned By**: vmware
### Vulnerability Description
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**n/a - Reactor Netty**
Affected versions:
- 1.1.0 (Status: affected)
- 1.0.0 (Status: affected)
- older unsupported versions (Status: affected)
### References
1. [](https://spring.io/security/cve-2023-34062) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0985, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0985 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0985
- **State**: PUBLISHED
- **Published Date**: February 16, 2007 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 16, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in nickpage.php in phpCC 4.2 beta and earlier allows remote attackers to execute arbitrary SQL commands via the npid parameter in a sign_gb action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3299](https://www.exploit-db.com/exploits/3299)
2. [ADV-2007-0602](http://www.vupen.com/english/advisories/2007/0602)
3. [22540](http://www.securityfocus.com/bid/22540)
4. [35129](http://osvdb.org/35129) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-26705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-26705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26705
- **State**: PUBLISHED
- **Published Date**: October 31, 2021 at 19:51 UTC
- **Last Updated**: August 04, 2024 at 15:56 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/darkfoxprime/python-easy_xml/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3099
- **State**: PUBLISHED
- **Published Date**: June 08, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 10, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2016-85e9f2e3cd](http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1319052)
3. [FEDORA-2016-8b28358b72](http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183129.html)
4. [RHSA-2016:2602](http://rhn.redhat.com/errata/RHSA-2016-2602.html)
5. [FEDORA-2016-1eaaf1ed0f](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49552, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49552
- **State**: PUBLISHED
- **Published Date**: January 02, 2024 at 00:00 UTC
- **Last Updated**: April 17, 2025 at 18:39 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/cesanta/mjs/issues/256) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7723
- **State**: PUBLISHED
- **Published Date**: September 01, 2020 at 09:45 UTC
- **Last Updated**: September 16, 2024 at 17:09 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
All versions of package promisehelpers are vulnerable to Prototype Pollution via the insert function.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**n/a - promisehelpers**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686)
### Credits
- NerdJS |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31852, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31852
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:52 UTC
- **Last Updated**: April 01, 2025 at 15:43 UTC
- **Reserved Date**: April 01, 2025 at 13:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in N-Media Bulk Product Sync allows Cross Site Request Forgery. This issue affects Bulk Product Sync: from n/a through 8.6.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**N-Media - Bulk Product Sync**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sync-wc-google/vulnerability/wordpress-bulk-product-sync-plugin-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3601, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3601 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3601
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 04, 2024 at 19:18 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle API Gateway component of Oracle Fusion Middleware (subcomponent: Oracle API Gateway). The supported version that is affected is 11.1.2.4.0. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle API Gateway. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle API Gateway accessible data as well as unauthorized access to critical data or complete access to all Oracle API Gateway accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
### Affected Products
**Oracle Corporation - API Gateway**
Affected versions:
- 11.1.2.4.0 (Status: affected)
### References
1. [1038291](http://www.securitytracker.com/id/1038291)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
3. [97817](http://www.securityfocus.com/bid/97817) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6761, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6761 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6761
- **State**: PUBLISHED
- **Published Date**: January 12, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 01:43 UTC
- **Reserved Date**: August 11, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in Qualcomm media codecs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29421682. References: QC-CR#1055792.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Kernel-3.10 (Status: affected)
- Kernel-3.18 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2016-12-01.html)
2. [94677](http://www.securityfocus.com/bid/94677) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42545, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42545 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42545
- **State**: PUBLISHED
- **Published Date**: November 30, 2021 at 11:28 UTC
- **Last Updated**: August 04, 2024 at 03:38 UTC
- **Reserved Date**: October 15, 2021 at 00:00 UTC
- **Assigned By**: NCSC.ch
### Vulnerability Description
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-613: Security Weakness
### Affected Products
**Business-DNA Solutions GmbH - TopEase**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://confluence.topease.ch/confluence/display/DOC/Release+Notes)
### Credits
- SIX Group Services AG, Cyber Controls |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-27817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-27817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27817
- **State**: REJECTED
- **Published Date**: March 08, 2021 at 15:03 UTC
- **Last Updated**: March 08, 2021 at 15:03 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29030, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29030 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29030
- **State**: PUBLISHED
- **Published Date**: April 19, 2024 at 15:13 UTC
- **Last Updated**: August 02, 2024 at 01:03 UTC
- **Reserved Date**: March 14, 2024 at 16:59 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
### CVSS Metrics
- **CVSS Base Score**: 5.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**usememos - memos**
Affected versions:
- < 0.22.0 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/](https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/)
2. [https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5](https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5)
3. [https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83](https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1697, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1697 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1697
- **State**: PUBLISHED
- **Published Date**: March 27, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:06 UTC
- **Reserved Date**: March 26, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in header.inc.php in Philex 0.2.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the CssFile parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [philex-header-file-include(33179)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33179)
2. [23111](http://www.securityfocus.com/bid/23111)
3. [ADV-2007-1099](http://www.vupen.com/english/advisories/2007/1099)
4. [3552](https://www.exploit-db.com/exploits/3552)
5. [37220](http://osvdb.org/37220) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16220
- **State**: PUBLISHED
- **Published Date**: September 11, 2019 at 13:06 UTC
- **Last Updated**: August 21, 2024 at 16:00 UTC
- **Reserved Date**: September 11, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect if a provided URL path does not start with a forward slash.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wpvulndb.com/vulnerabilities/9863)
2. [](https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/)
3. [](https://core.trac.wordpress.org/changeset/45971)
4. [](https://github.com/WordPress/WordPress/commit/c86ee39ff4c1a79b93c967eb88522f5c09614a28)
5. [[debian-lts-announce] 20191017 [SECURITY] [DLA 1960-1] wordpress security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html)
6. [20200108 [SECURITY] [DSA 4599-1] wordpress security update](https://seclists.org/bugtraq/2020/Jan/8)
7. [DSA-4599](https://www.debian.org/security/2020/dsa-4599)
8. [DSA-4677](https://www.debian.org/security/2020/dsa-4677) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54500, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54500
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 22:57 UTC
- **Last Updated**: December 20, 2024 at 19:01 UTC
- **Reserved Date**: December 03, 2024 at 22:50 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. Processing a maliciously crafted image may result in disclosure of process memory.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/121844)
2. [](https://support.apple.com/en-us/121845)
3. [](https://support.apple.com/en-us/121839)
4. [](https://support.apple.com/en-us/121842)
5. [](https://support.apple.com/en-us/121843)
6. [](https://support.apple.com/en-us/121838)
7. [](https://support.apple.com/en-us/121837)
8. [](https://support.apple.com/en-us/121840) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-10028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-10028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-10028
- **State**: PUBLISHED
- **Published Date**: January 13, 2015 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 18:43 UTC
- **Reserved Date**: January 13, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in D-Link DAP-1360 router with firmware 2.5.4 and later allows remote attackers to inject arbitrary web script or HTML via the res_buf parameter to index.cgi when res_config_id is set to 41.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://websecurity.com.ua/7215/)
2. [20141129 CSRF and XSS vulnerabilities in D-Link DAP-1360](http://seclists.org/fulldisclosure/2014/Nov/100) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5520, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5520 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5520
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 11:10 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: May 30, 2024 at 07:36 UTC
- **Assigned By**: INCIBE
### Vulnerability Description
Two Cross-Site Scripting vulnerabilities have been discovered in Alkacon's OpenCMS affecting version 16, which could allow a user with sufficient privileges to create and modify web pages through the admin panel, can execute malicious JavaScript code, after inserting code in the “title” field.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Alkacon - OpenCMS**
Affected versions:
- 16 (Status: affected)
### References
1. [](https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-stored-alkacon-opencms)
### Credits
- Miguel Segovia Gil |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1402, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1402 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1402
- **State**: PUBLISHED
- **Published Date**: February 14, 2013 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 00:52 UTC
- **Reserved Date**: January 19, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DigiLIBE 3.4 and possibly other versions sends a redirect but does not exit, which allows remote attackers to obtain sensitive configuration information via a direct request to configuration/general_configuration.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130122 CVE-2013-1402 - DigiLIBE Management Console - Execution After Redirect (EAR) Vulnerability](http://archives.neohapsis.com/archives/bugtraq/2013-01/0095.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0131, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0131 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0131
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 21:08 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 13, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
### Affected Products
**n/a - Intel(R) AMT**
Affected versions:
- See provided reference (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24793, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24793
- **State**: PUBLISHED
- **Published Date**: November 01, 2021 at 08:46 UTC
- **Last Updated**: August 03, 2024 at 19:42 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The WPeMatico RSS Feed Fetcher WordPress plugin before 2.6.12 does not escape the Feed URL added to a campaign before outputting it in an attribute, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - WPeMatico RSS Feed Fetcher**
Affected versions:
- 2.6.12 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/eeedbb3b-ae10-4472-a1d3-f196f95b9d96)
### Credits
- Huy Nguyen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0440
- **State**: PUBLISHED
- **Published Date**: January 15, 2025 at 10:58 UTC
- **Last Updated**: March 18, 2025 at 20:45 UTC
- **Reserved Date**: January 13, 2025 at 22:09 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Fullscreen in Google Chrome on Windows prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 132.0.6834.83 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html)
2. [](https://issues.chromium.org/issues/40067914) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4562
- **State**: PUBLISHED
- **Published Date**: November 30, 2012 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 20:42 UTC
- **Reserved Date**: August 21, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2012:1520](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00015.html)
2. [DSA-2577](http://www.debian.org/security/2012/dsa-2577)
3. [MDVSA-2012:175](http://www.mandriva.com/security/advisories?name=MDVSA-2012:175)
4. [USN-1640-1](http://www.ubuntu.com/usn/USN-1640-1)
5. [openSUSE-SU-2013:0130](http://lists.opensuse.org/opensuse-updates/2013-01/msg00021.html)
6. [openSUSE-SU-2012:1622](http://lists.opensuse.org/opensuse-updates/2012-12/msg00016.html)
7. [](https://bugzilla.redhat.com/show_bug.cgi?id=871620)
8. [FEDORA-2012-18610](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093313.html)
9. [openSUSE-SU-2012:1620](http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00002.html)
10. [[oss-security] 20121120 libssh 0.5.3 release fixes multiple security issues](http://www.openwall.com/lists/oss-security/2012/11/20/3)
11. [libssh-buffer-bo(80221)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80221)
12. [FEDORA-2012-18677](http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093474.html)
13. [56604](http://www.securityfocus.com/bid/56604)
14. [](http://www.libssh.org/2012/11/20/libssh-0-5-3-security-release/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5051, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5051 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5051
- **State**: PUBLISHED
- **Published Date**: July 20, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**n/a - Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions**
Affected versions:
- Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-21.html)
2. [104699](http://www.securityfocus.com/bid/104699)
3. [1041250](http://www.securitytracker.com/id/1041250) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-7873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-7873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7873
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 06:31 UTC
- **Last Updated**: August 06, 2024 at 02:13 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier**
Affected versions:
- Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier (Status: affected)
### References
1. [SUSE-SU-2016:3148](http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html)
2. [MS16-154](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154)
3. [GLSA-201701-17](https://security.gentoo.org/glsa/201701-17)
4. [1037442](http://www.securitytracker.com/id/1037442)
5. [94866](http://www.securityfocus.com/bid/94866)
6. [RHSA-2016:2947](http://rhn.redhat.com/errata/RHSA-2016-2947.html)
7. [](https://helpx.adobe.com/security/products/flash-player/apsb16-39.html)
8. [openSUSE-SU-2016:3160](http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-2913, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-2913 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2913
- **State**: PUBLISHED
- **Published Date**: November 07, 2017 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 22:41 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
### Affected Products
**Circle Media - Circle**
Affected versions:
- firmware 2.0.1 (Status: affected)
### References
1. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0420) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30740, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30740 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30740
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 20:31 UTC
- **Last Updated**: April 16, 2025 at 14:51 UTC
- **Reserved Date**: March 25, 2025 at 20:11 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - JD Edwards EnterpriseOne Tools**
Affected versions:
- 9.2.0.0 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-6831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-6831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6831
- **State**: PUBLISHED
- **Published Date**: May 26, 2020 at 17:05 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 10, 2020 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2020-18/)
2. [](https://www.mozilla.org/security/advisories/mfsa2020-16/)
3. [](https://www.mozilla.org/security/advisories/mfsa2020-17/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1632241)
5. [USN-4373-1](https://usn.ubuntu.com/4373-1/)
6. [](https://security.gentoo.org/glsa/202005-03)
7. [](https://security.gentoo.org/glsa/202005-04)
8. [DSA-4714](https://www.debian.org/security/2020/dsa-4714)
9. [openSUSE-SU-2020:0917](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html)
10. [](http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3032, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3032 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3032
- **State**: PUBLISHED
- **Published Date**: June 15, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 15, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Xtreme ASP Photo Gallery 1.05 and earlier, and possibly 2.0 (trial), allow remote attackers to inject arbitrary web script or HTML via the (1) catname and (2) total parameters in (a) displaypic.asp, and the (3) catname parameter in (b) displaythumbs.asp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26398](http://www.osvdb.org/26398)
2. [20604](http://secunia.com/advisories/20604)
3. [](http://pridels0.blogspot.com/2006/06/xtreme-asp-photo-gallery-xss-vuln.html)
4. [26399](http://www.osvdb.org/26399)
5. [xtremeasp-displaypic-xss(27033)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27033)
6. [ADV-2006-2292](http://www.vupen.com/english/advisories/2006/2292) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4970
- **State**: PUBLISHED
- **Published Date**: July 27, 2010 at 18:39 UTC
- **Last Updated**: September 16, 2024 at 19:19 UTC
- **Reserved Date**: July 27, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the t3m_affiliate extension 0.5.0 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36138](http://www.securityfocus.com/bid/36138)
2. [ADV-2009-2411](http://www.vupen.com/english/advisories/2009/2411)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-013/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28041
- **State**: PUBLISHED
- **Published Date**: June 23, 2023 at 09:25 UTC
- **Last Updated**: November 08, 2024 at 16:32 UTC
- **Reserved Date**: March 10, 2023 at 04:59 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
### CVSS Metrics
- **CVSS Base Score**: 5.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Dell - CPG BIOS**
Affected versions:
- All Versions (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-1810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-1810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1810
- **State**: PUBLISHED
- **Published Date**: August 01, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 15, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2008-2267](http://www.vupen.com/english/advisories/2008/2267/references)
2. [31318](http://secunia.com/advisories/31318)
3. [30474](http://www.securityfocus.com/bid/30474)
4. [20080730 SAP MaxDB dbmsrv Untrusted Execution Path Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729)
5. [1020585](http://www.securitytracker.com/id?1020585)
6. [maxdb-dbmsrv-code-execution(44125)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44125) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11476
- **State**: PUBLISHED
- **Published Date**: July 28, 2020 at 20:31 UTC
- **Last Updated**: August 04, 2024 at 11:28 UTC
- **Reserved Date**: April 01, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://herolab.usd.de/security-advisories/)
2. [](https://herolab.usd.de/security-advisories/usd-2020-0041/)
3. [](https://github.com/concrete5/concrete5/pull/8713)
4. [](https://github.com/concrete5/concrete5/releases/tag/8.5.3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2794
- **State**: PUBLISHED
- **Published Date**: April 19, 2018 at 02:00 UTC
- **Last Updated**: October 03, 2024 at 20:18 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
### Affected Products
**Oracle Corporation - Java**
Affected versions:
- Java SE: 6u181 (Status: affected)
- 7u171 (Status: affected)
- 8u162 (Status: affected)
- 10 (Status: affected)
- JRockit: R28.3.17 (Status: affected)
### References
1. [RHSA-2018:1278](https://access.redhat.com/errata/RHSA-2018:1278)
2. [DSA-4185](https://www.debian.org/security/2018/dsa-4185)
3. [RHSA-2018:1975](https://access.redhat.com/errata/RHSA-2018:1975)
4. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us)
5. [GLSA-201903-14](https://security.gentoo.org/glsa/201903-14)
6. [DSA-4225](https://www.debian.org/security/2018/dsa-4225)
7. [1040697](http://www.securitytracker.com/id/1040697)
8. [RHSA-2018:1724](https://access.redhat.com/errata/RHSA-2018:1724)
9. [RHSA-2018:1203](https://access.redhat.com/errata/RHSA-2018:1203)
10. [USN-3644-1](https://usn.ubuntu.com/3644-1/)
11. [RHSA-2018:1723](https://access.redhat.com/errata/RHSA-2018:1723)
12. [](https://security.netapp.com/advisory/ntap-20180419-0001/)
13. [RHSA-2018:1201](https://access.redhat.com/errata/RHSA-2018:1201)
14. [](https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0)
15. [RHSA-2018:1204](https://access.redhat.com/errata/RHSA-2018:1204)
16. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html)
17. [RHSA-2018:1722](https://access.redhat.com/errata/RHSA-2018:1722)
18. [RHSA-2018:1974](https://access.redhat.com/errata/RHSA-2018:1974)
19. [RHSA-2018:1205](https://access.redhat.com/errata/RHSA-2018:1205)
20. [RHSA-2018:1721](https://access.redhat.com/errata/RHSA-2018:1721)
21. [USN-3691-1](https://usn.ubuntu.com/3691-1/)
22. [103817](http://www.securityfocus.com/bid/103817)
23. [RHSA-2018:1202](https://access.redhat.com/errata/RHSA-2018:1202)
24. [RHSA-2018:1191](https://access.redhat.com/errata/RHSA-2018:1191)
25. [RHSA-2018:1188](https://access.redhat.com/errata/RHSA-2018:1188)
26. [RHSA-2018:1206](https://access.redhat.com/errata/RHSA-2018:1206)
27. [RHSA-2018:1270](https://access.redhat.com/errata/RHSA-2018:1270)
28. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23056, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23056 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23056
- **State**: REJECTED
- **Last Updated**: December 30, 2022 at 00:00 UTC
- **Reserved Date**: January 06, 2021 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-19046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-19046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-19046
- **State**: PUBLISHED
- **Published Date**: August 31, 2021 at 13:15 UTC
- **Last Updated**: August 04, 2024 at 14:08 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) in S-CMS v1.0 allows remote attackers to execute arbitrary code via the component '/admin/tpl.php?page='.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Aoyanm/audit/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4537
- **State**: PUBLISHED
- **Published Date**: December 27, 2011 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 22, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Multiple buffer overflows in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11355 and earlier allow remote attackers to execute arbitrary code or cause a denial of service via a crafted packet to TCP port (1) 12397 or (2) 12399.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-01-7.pdf)
2. [77977](http://www.osvdb.org/77977)
3. [igss-packets-bo(71931)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71931) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39301
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 17:18 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
sra-admin is a background rights management system that separates the front and back end. sra-admin version 1.1.1 has a storage cross-site scripting (XSS) vulnerability. After logging into the sra-admin background, an attacker can upload an html page containing xss attack code in "Personal Center" - "Profile Picture Upload" allowing theft of the user's personal information. This issue has been patched in 1.1.2. There are no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-80: Security Weakness
- CWE-434: Security Weakness
### Affected Products
**momofoolish - sra-admin**
Affected versions:
- < 1.1.2 (Status: affected)
### References
1. [](https://github.com/momofoolish/sra-admin/security/advisories/GHSA-v7r9-qx74-h3v8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1457
- **State**: PUBLISHED
- **Published Date**: May 12, 2010 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 allows local users to read arbitrary files via a (1) -c or (2) -a option, which prints file contents in an error message.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39746](http://secunia.com/advisories/39746)
2. [[oss-security] 20100507 CVE Assignment (gnustep)](http://www.openwall.com/lists/oss-security/2010/05/07/6)
3. [](http://savannah.gnu.org/bugs/?29755)
4. [](http://thread.gmane.org/gmane.comp.lib.gnustep.bugs/12336)
5. [](http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-base-1.20.0.tar.gz)
6. [40005](http://www.securityfocus.com/bid/40005)
7. [](https://bugs.launchpad.net/ubuntu/+source/gnustep-base/+bug/573108) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2946, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2946 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2946
- **State**: PUBLISHED
- **Published Date**: June 02, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 10:28 UTC
- **Reserved Date**: April 21, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in api/sms/send-sms in the Web UI 11.010.06.01.858 on Huawei E303 modems with software 22.157.18.00.858 allows remote attackers to hijack the authentication of administrators for requests that perform API operations and send SMS messages via a request element in an XML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#325636](http://www.kb.cert.org/vuls/id/325636)
2. [](http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html)
3. [58992](http://secunia.com/advisories/58992) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6864
- **State**: PUBLISHED
- **Published Date**: December 19, 2023 at 13:38 UTC
- **Last Updated**: August 02, 2024 at 08:42 UTC
- **Reserved Date**: December 15, 2023 at 17:42 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015)
2. [](https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html)
3. [](https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html)
4. [](https://security.gentoo.org/glsa/202401-10)
5. [](https://www.debian.org/security/2023/dsa-5581)
6. [](https://www.debian.org/security/2023/dsa-5582)
7. [](https://www.mozilla.org/security/advisories/mfsa2023-54/)
8. [](https://www.mozilla.org/security/advisories/mfsa2023-55/)
9. [](https://www.mozilla.org/security/advisories/mfsa2023-56/)
### Credits
- Andrew McCreight, Karl Tomlinson, Valentin Gosu, Randell Jesup, Yury Delendik, and the Mozilla Fuzzing Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44631, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44631 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44631
- **State**: PUBLISHED
- **Published Date**: April 23, 2023 at 08:48 UTC
- **Last Updated**: January 10, 2025 at 18:49 UTC
- **Reserved Date**: November 02, 2022 at 13:01 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in 1app Technologies, Inc 1app Business Forms plugin <= 1.0.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**1app Technologies, Inc - 1app Business Forms**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/1app-business-forms/wordpress-1app-business-forms-plugin-1-0-0-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- sk4rl1ghT (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-7826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-7826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7826
- **State**: PUBLISHED
- **Published Date**: April 10, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 07:59 UTC
- **Reserved Date**: October 14, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
botan 1.11.x before 1.11.22 improperly handles wildcard matching against hostnames, which might allow remote attackers to have unspecified impact via a valid X.509 certificate, as demonstrated by accepting *.example.com as a match for bar.foo.example.com.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1311620)
2. [](https://botan.randombit.net/security.html#id3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-3904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-3904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3904
- **State**: PUBLISHED
- **Published Date**: January 16, 2023 at 15:37 UTC
- **Last Updated**: April 08, 2025 at 19:34 UTC
- **Reserved Date**: November 09, 2022 at 01:13 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The MonsterInsights WordPress plugin before 8.9.1 does not sanitize or escape page titles in the top posts/pages section, allowing an unauthenticated attacker to inject arbitrary web scripts into the titles by spoofing requests to google analytics.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - MonsterInsights**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad)
### Credits
- Grzegorz Niedziela
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21400
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 16:57 UTC
- **Last Updated**: May 03, 2025 at 00:46 UTC
- **Reserved Date**: December 08, 2023 at 22:45 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Microsoft - Azure Kubernetes Service**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3067, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3067 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3067
- **State**: PUBLISHED
- **Published Date**: September 27, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: September 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in perldiver.cgi in PerlDiver 2.x allows remote attackers to inject arbitrary web script or HTML via the module parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.scriptsolutions.com/support/showthreaded.pl?Cat=&Board=PDBugs&Number=443&Search=true&Forum=All_Forums&Words=werner&Match=Entire%20Phrase&Searchpage=0&Limit=25&Old=1month&Main=443)
2. [](http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt)
3. [20050920 perldiver](http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0543.html)
4. [1015146](http://securitytracker.com/id?1015146) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4859
- **State**: REJECTED
- **Last Updated**: May 23, 2024 at 15:37 UTC
- **Reserved Date**: September 08, 2023 at 20:39 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8399
- **State**: PUBLISHED
- **Published Date**: August 15, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 06:54 UTC
- **Reserved Date**: March 14, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8404.
### Affected Products
**Microsoft - Windows 10 Servers**
Affected versions:
- version 1709 (Server Core Installation) (Status: affected)
- version 1803 (Server Core Installation) (Status: affected)
**Microsoft - Windows 10**
Affected versions:
- Version 1703 for 32-bit Systems (Status: affected)
- Version 1703 for x64-based Systems (Status: affected)
- Version 1709 for 32-bit Systems (Status: affected)
- Version 1709 for x64-based Systems (Status: affected)
- Version 1803 for 32-bit Systems (Status: affected)
- Version 1803 for x64-based Systems (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8399)
2. [1041466](http://www.securitytracker.com/id/1041466)
3. [104998](http://www.securityfocus.com/bid/104998) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1939, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1939 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1939
- **State**: PUBLISHED
- **Published Date**: June 20, 2022 at 10:26 UTC
- **Last Updated**: August 03, 2024 at 00:24 UTC
- **Reserved Date**: May 30, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Unknown - Allow svg files**
Affected versions:
- 1.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f)
### Credits
- Luan Pedersini |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4709
- **State**: REJECTED
- **Published Date**: January 27, 2020 at 14:22 UTC
- **Last Updated**: January 27, 2020 at 14:22 UTC
- **Reserved Date**: June 22, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1264
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in mkacct in HP-UX 11.04 running Virtualvault Operating System (VVOS) 4.0 and 4.5 allows attackers to elevate privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX0107-161](http://www.securityfocus.com/advisories/3459)
2. [hp-virtualvault-mkacct-privilege-elevation(6867)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6867)
3. [VU#420475](http://www.kb.cert.org/vuls/id/420475)
4. [3072](http://www.securityfocus.com/bid/3072)
5. [L-119](http://ciac.llnl.gov/ciac/bulletins/l-119.shtml) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14361, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14361 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14361
- **State**: PUBLISHED
- **Published Date**: December 13, 2017 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 23:05 UTC
- **Reserved Date**: September 12, 2017 at 00:00 UTC
- **Assigned By**: microfocus
### Vulnerability Description
Man-In-The-Middle vulnerability in Micro Focus Project and Portfolio Management Center, version 9.32. This vulnerability could be exploited to allow a Man-in-the-middle attack.
### Affected Products
**Micro Focus - Project and Portfolio Management Center**
Affected versions:
- 9.32 (Status: affected)
### References
1. [1040088](http://www.securitytracker.com/id/1040088)
2. [](https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03014426)
### Credits
- Micro Focus would like to thank Xiaoran Wang for reporting this issue to security-alert@hpe.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41162
- **State**: PUBLISHED
- **Published Date**: September 13, 2023 at 00:00 UTC
- **Last Updated**: September 25, 2024 at 20:34 UTC
- **Reserved Date**: August 24, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://webmin.com/tags/webmin-changelog/)
2. [](https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37445
- **State**: PUBLISHED
- **Published Date**: July 25, 2021 at 20:13 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via logprop?file=/.. for file reading.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md)
2. [](https://www.nch.com.au/conference/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23496
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 13:30 UTC
- **Last Updated**: March 05, 2025 at 17:17 UTC
- **Reserved Date**: January 16, 2025 at 11:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP FPO allows Reflected XSS. This issue affects WP FPO: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - WP FPO**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-fpo/vulnerability/wordpress-wp-fpo-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25322
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 16:58 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 18, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ZEROF Web Server 2.0 allows /HandleEvent SQL Injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://awillix.ru)
2. [](https://github.com/landigv/research/blob/main/cve/CVE-2022-25322.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4191
- **State**: PUBLISHED
- **Published Date**: June 17, 2014 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 02:05 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TLS implementation in EMC RSA BSAFE-C Toolkits (aka Share for C and C++) sends a long series of random bytes during use of the Dual_EC_DRBG algorithm, which makes it easier for remote attackers to obtain plaintext from TLS sessions by recovering the algorithm's inner state, a different issue than CVE-2007-6755.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://dualec.org/DualECTLS.pdf)
2. [](http://dualec.org/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11499, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11499 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11499
- **State**: PUBLISHED
- **Published Date**: July 25, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 18:12 UTC
- **Reserved Date**: July 20, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [99959](http://www.securityfocus.com/bid/99959)
2. [](https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/)
3. [RHSA-2017:3002](https://access.redhat.com/errata/RHSA-2017:3002)
4. [RHSA-2017:2908](https://access.redhat.com/errata/RHSA-2017:2908) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35478
- **State**: PUBLISHED
- **Published Date**: July 27, 2021 at 11:44 UTC
- **Last Updated**: August 04, 2024 at 00:40 UTC
- **Reserved Date**: June 24, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nagios.com/downloads/nagios-log-server/change-log/)
2. [](https://research.nccgroup.com/?research=Technical%20advisories)
3. [](https://research.nccgroup.com/2021/07/22/technical-advisory-stored-and-reflected-xss-vulnerability-in-nagios-log-server-cve-2021-35478cve-2021-35479/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40113
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 00:00 UTC
- **Last Updated**: June 02, 2025 at 19:34 UTC
- **Reserved Date**: July 05, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before is vulnerable to Use of Default Credentials.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads)
2. [](https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40113) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2616
- **State**: PUBLISHED
- **Published Date**: August 12, 2022 at 19:37 UTC
- **Last Updated**: August 03, 2024 at 00:46 UTC
- **Reserved Date**: August 02, 2022 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1302159)
3. [GLSA-202208-35](https://security.gentoo.org/glsa/202208-35)
4. [FEDORA-2022-3f28aa88cf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.